透過您的圖書館登入
IP:3.15.3.154
  • 學位論文

植基於通行碼式的金鑰協議認證法和遠距醫療資訊系統認證法之研究

Authentication Schemes for Password Oriented Key Agreement and Telecare Medical Information Systems

指導教授 : 張真誠
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


在現今的智慧卡使用中,有越來越多學者想出許多新方法來達到智慧卡的目的,智慧卡充斥在我們的生活當中,舉凡學校、住宅、交通等等藉此改變了我們消費的生活型態,在學校方面,可以進出圖書館,體育館,宿舍,學校大門等等一卡多用的功能;在住宅方面,有的智慧卡結合了生物資訊,包含指紋、掌紋、虹膜來增加住宅的安全需求;在交通方面,我們平常使用的悠遊卡可以搭乘大眾交通運輸舉凡捷運、公車甚至可以利用存錢機制到各地都有的24小時便利商店消費。有鑑於此,第一篇論文針對Lee學者提出的方法來做修改,發現錯誤的地方並修改之,第二篇論文我們發現智慧卡存在於手機當中,可藉由手機的智慧卡來提供登入和認證服務,我們藉由手機裡的智慧卡應用在醫療資訊系統中,來達成病人免跨出家門即可得到醫療服務,透過手機輸入身分和密碼即可在家中得到醫療服務,這點大大提高了看診的方便性。這兩篇論文中都和其他相近的論文相比較,在不違背安全的條件下,而提出新的方法。

並列摘要


There are more and more researchers come up with new method to achieve the goal of smart card around using smart card environment. The smart card surround our life such as school, home, and public transport and so on. The smart card change our type of life. In school, people can enter the library, the gymnasium, the dormitory, and the door of school by using a smart card. Smart cards functionally use everywhere. In the residential, the smart cards (easy cards) have biometric features include fingerprint, palm print, iris to increase the security of housing. In transport, the smart card can use to take public transportation like MRT and bus. Moreover, you can use easy cards to go to 24 hours convenient stores everywhere. In view of this, we focus on and modify Lee’s scheme in the first paper. We find out that we can use smart card which stores in the mobile phone provides login and authentication service and apply in the telecare medical information systems. To achieve the goal that people do not go out and achieve medical service is accomplished by entering identity and password in the mobile phone. This is more convenient to see the doctor than traditional method. Without prejudice to safe condition, both papers compare other related papers and provide new protocol to improve scheme.

參考文獻


2. Kocarev L, Tasev Z. Public-key encryption based on Chebyshev maps. Proceedings of the 2003 International Symposium on Circuits and Systems (ISCAS ’03), Vol. 3, Bangkok, Thailand, May 2003;3:28-31.
3. Bergamo P, D'Arco P, De Santis A, Kocarev L. Security of publickey cryptosystems based on Chebyshev polynomials. IEEE Transactions on Circuits and Systems 2005; 52-I(7):1382-1393.
4. Bose R. Novel public key encryption technique based on multiple chaotic systems. Physical Review Letters 2005; 95(9):ID 098702.
5. Xiao D, Liao X, Deng S. A novel key agreement protocol based on chaotic maps. Information Sciences 2007; 177(4):1136-1142.
6. Han S. Security of a key agreement protocol based on chaotic maps. Chaos Solitons & Fractals 2008; 38(3):764-768.

延伸閱讀