Abstract

In the global village era, several competitions require pre-checkups for the participants who are qualified to participate that must be passed before the competition, so the accuracy of the checkup data must be confirmed and must not be leaked or tampered with. This is a new challenge to the accuracy of medical checkups data in the information and communication era. How to protect the rights of participants and the non-repudiation of participants are the main issues of this study. We have designed a two-phase user identity embedding and authentication scheme for pre-checkups and subsequent validations. A participant’s private key is added to the physical examination data, and the identity of the examinations data is confirmed by the contestant before the competitions. Our work integrates lightweight Exclusive-OR (XOR) operations, fuzzy extractor biometric personal passwords, and a fixed-length hash operation accords with post-quantum operations to solve the problem of two-stage medical pre-checkup and subsequent validation key agreement authentication. The random oracle authentication mechanism proves the security of the protocols, and the security analysis proves that the protocols can resist the vulnerability attacks.

Highlights

  • With the efforts of countries around the world, advances in communications and technology are obvious to all

  • The random oracle authentication mechanism proves the security of the protocols, and the security analysis proves that the protocols can resist the vulnerability attacks

  • In such a global village era, several competitions require pre-checkups for the participants, and must be passed prior to being entitled to participate in competitions, so the accuracy of the checkup data must be confirmed and must not be leaked or tampered with. Issues such as the adoption of a specimen related to the law and the ex-post evidence, the process of taking the specimen must be confirmed by the party

Read more

Summary

Introduction

With the efforts of countries around the world, advances in communications and technology are obvious to all. Many security technologies with cloud computing as the core issue have been proposed, such as several different protocols provided in the literature [1,2,3,4,5] In such a global village era, several competitions require pre-checkups for the participants, and must be passed prior to being entitled to participate in competitions, so the accuracy of the checkup data must be confirmed and must not be leaked or tampered with. Issues such as the adoption of a specimen related to the law and the ex-post evidence, the process of taking the specimen must be confirmed by the party. Our proposed two-phase pre-checkup and subsequent validation key authentication agreement authentication mechanism (TCVK).

Related Work
Our study uses a combination of smart cards and hash functions
Our TCVK Mechanism
Checkups Station Registration Phase
Pre-Checkups Phase
Subsequent Validation Phase
Random Oracles Proof for the Security of Our Protocols
Privileged Insider Attack
Perfect Forward Secrecy Attack
Checkups Station Impersonation Attack
Offline Password Guessing Attack
Stolen Smart Card Attack
Session Key Security
Man-in-the-Middle Attack
Tampering Attack n o
Performance Comparisons
Functionality Comparisons
Efficacy Comparisons
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.