TY - CHAP
T1 - QPTA
T2 - 21st International Conference on Security and Cryptography, SECRYPT 2024
AU - Palaniswamy, Basker
AU - Karati, Arijit
N1 - Publisher Copyright:
© 2024 by SCITEPRESS – Science and Technology Publications, Lda.
PY - 2024
Y1 - 2024
N2 - Smart healthcare is ubiquitous to lift the convenience of managing patients’ medical records. Accessibility of patients’ sensitive data stored in medical servers needs source authenticity. To ensure this, (Karati et al., 2023) proposed a three-factor authentication scheme using physical uncolonable functions. However, the scheme is vulnerable to a quantum adversary. To this end, we design a multi-factor authentication scheme called QPTA resistant to quantum adversaries for a healthcare scenario involving a user and a medical server. QPTA enables choice within the same factor in multi-factor authentication. The security of QPTA is formally analyzed using the “Attack Detection Logic.” QPTA is safe from known attacks, including unknown key share and man-in-the-middle attacks. We perform an informal security analysis of QPTA to ensure various security goals and privacy properties, namely anonymity, unlinkability, and conditional traceability. QPTA satisfies comprehensive security features and is suitable for the post-quantum era.
AB - Smart healthcare is ubiquitous to lift the convenience of managing patients’ medical records. Accessibility of patients’ sensitive data stored in medical servers needs source authenticity. To ensure this, (Karati et al., 2023) proposed a three-factor authentication scheme using physical uncolonable functions. However, the scheme is vulnerable to a quantum adversary. To this end, we design a multi-factor authentication scheme called QPTA resistant to quantum adversaries for a healthcare scenario involving a user and a medical server. QPTA enables choice within the same factor in multi-factor authentication. The security of QPTA is formally analyzed using the “Attack Detection Logic.” QPTA is safe from known attacks, including unknown key share and man-in-the-middle attacks. We perform an informal security analysis of QPTA to ensure various security goals and privacy properties, namely anonymity, unlinkability, and conditional traceability. QPTA satisfies comprehensive security features and is suitable for the post-quantum era.
KW - Attack Detection Logic
KW - Authenticated Key Agreement
KW - Multi-Factor Authentication
KW - Post-Quantum Authentication
KW - Privacy
KW - Quantum-Safe Authentication
KW - Smart Healthcare
KW - System Administrator
UR - https://www.scopus.com/pages/publications/85202804613
U2 - 10.5220/0012835100003767
DO - 10.5220/0012835100003767
M3 - Chapter
AN - SCOPUS:85202804613
T3 - Proceedings of the International Conference on Security and Cryptography
SP - 804
EP - 811
BT - Proceedings of the 21st International Conference on Security and Cryptography, SECRYPT 2024
A2 - Di Vimercati, Sabrina De Capitani
A2 - Samarati, Pierangela
PB - Science and Technology Publications, Lda
Y2 - 8 July 2024 through 10 July 2024
ER -