首页 | 本学科首页   官方微博 | 高级检索  
     


An efficient and authenticated key establishment scheme based on fog computing for healthcare system
Authors:Xinghua LI  Ting CHEN  Qingfeng CHENG  Jianfeng MA
Affiliation:1. School of Cyber Engineering, Xidian University, Xi’an 710071, China2. Strategic Support Force Information Engineering University, Zhengzhou 450001, China
Abstract:Because of its closeness to users, fog computing responds faster than cloud computing. Thus, it has been deployed to various applications, such as healthcare system. Recently, to ensure the secure communication of the fog-based healthcare system, Jia et al. proposed an authenticated key agreement scheme. Moreover, in view of the high computation cost existing in Jia et al.’s scheme, Ma et al. presented an efficient one using elliptic curve cryptography. In this paper, we observe that both the two schemes may potentially risk ephemeral key compromise attacks and need improving. Therefore, to overcome this potential risk, we propose a new authenticated scheme based on Jia et al.’s scheme using elliptic curve computational Diffie-Hellman hypothesis and hash functions. Additionally, we provide provable security under the adopted adversarial model and ProVerif simulation, and also analyze the performance in terms of computation and communication costs by comparisons. The analysis results show that the improved scheme resists the common attacks, reduces computation overhead, and has a certain significance.
Keywords:authenticated key establishment  ephemeral key compromise attack  fog-driven healthcare system  elliptic curve cryptography  provable security  ProVerif simulation  
点击此处可从《Frontiers of Computer Science》浏览原始摘要信息
点击此处可从《Frontiers of Computer Science》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号