{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T03:48:44Z","timestamp":1768016924562,"version":"3.49.0"},"reference-count":47,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T00:00:00Z","timestamp":1731456000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>With the rapid development of information technology from one side and the experience of the COVID-19 pandemic from the other side, people presently prefer to access healthcare services remotely. Telecare Medical Information System (TMIS) provides more flexible, faster, and more convenient e-healthcare services available to all people, particularly those who lack access to physicians due to their geographical restrictions. However, due to the sensitivity of medical information, preventing unauthorized access to patient data and preserving patient privacy is crucial. In this paper, we propose an authenticated key agreement scheme for TMIS to preserve the privacy of the patient\u2019s identity from all internal (even the health server and the physician) and external entities. Moreover, the physician\u2019s identity is kept secret from all external entities. Formal and informal security analysis of the proposed scheme indicates that it is secure against all attacks in the context.<\/jats:p>","DOI":"10.3390\/cryptography8040052","type":"journal-article","created":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T06:10:48Z","timestamp":1731478248000},"page":"52","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An Anonymous Authenticated Key Agreement Scheme for Telecare Medical Information Systems"],"prefix":"10.3390","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-6818-2009","authenticated-orcid":false,"given":"Ghassan Hameed","family":"Faraj","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, University of Isfahan, Azadi Square, Isfahan 81746-73441, Iran"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3425-8846","authenticated-orcid":false,"given":"Kamal","family":"Shahtalebi","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, University of Isfahan, Azadi Square, Isfahan 81746-73441, Iran"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7789-452X","authenticated-orcid":false,"given":"Hamid","family":"Mala","sequence":"additional","affiliation":[{"name":"Department of Information Technology Engineering, University of Isfahan, Azadi Square, Isfahan 81746-73441, Iran"}]}],"member":"1968","published-online":{"date-parts":[[2024,11,13]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/s10916-021-01750-7","article-title":"Construction of a chaotic map-based authentication protocol for TMIS","volume":"45","author":"Dharminder","year":"2021","journal-title":"J. Med. Syst."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"2531","DOI":"10.1007\/s40747-021-00441-7","article-title":"A construction of a conformal Chebyshev chaotic map based authentication protocol for healthcare telemedicine services","volume":"7","author":"Dharminder","year":"2021","journal-title":"Complex Intell. Syst."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"100035","DOI":"10.1016\/j.csa.2024.100035","article-title":"A three-factor mutual authentication scheme for telecare medical information system based on ECC","volume":"2","author":"Manickam","year":"2024","journal-title":"Cyber Secur. Appl."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1016\/j.dcan.2021.07.002","article-title":"An enhanced scheme for mutual authentication for healthcare services","volume":"8","author":"Shamshad","year":"2022","journal-title":"Digit. Commun. Netw."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"2590","DOI":"10.1109\/JSYST.2016.2544805","article-title":"Anonymous authentication for wireless body area networks with provable security","volume":"11","author":"He","year":"2016","journal-title":"IEEE Syst. J."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1016\/j.comnet.2017.03.013","article-title":"Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks","volume":"129","author":"Li","year":"2017","journal-title":"Comput. Netw."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"534","DOI":"10.1016\/j.compeleceng.2017.08.003","article-title":"An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks","volume":"69","author":"Challa","year":"2018","journal-title":"Comput. Electr. Eng."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Li, C.-T., Wu, T.-Y., Chen, C.-L., Lee, C.-C., and Chen, C.-M. (2017). An efficient user authentication and user anonymity scheme with provably security for IoT-based medical care system. Sensors, 17.","DOI":"10.3390\/s17071482"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1016\/j.compeleceng.2016.01.002","article-title":"Secure user authentication scheme for wireless healthcare sensor networks","volume":"59","author":"Liu","year":"2017","journal-title":"Comput. Electr. Eng."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"125","DOI":"10.7763\/IJCTE.2018.V10.1212","article-title":"Enhanced user authentication with privacy for IoT-based medical care system","volume":"10","author":"Ku","year":"2018","journal-title":"Int. J. Comput. Theory Eng."},{"key":"ref_11","first-page":"8145087","article-title":"Lightweight and secure three-factor authentication scheme for remote patient monitoring using on-body wireless networks","volume":"1","author":"Shuai","year":"2019","journal-title":"Secur. Commun. Netw."},{"key":"ref_12","first-page":"5047379","article-title":"Cryptanalysis and security improvement of two authentication schemes for healthcare systems using wireless medical sensor networks","volume":"1","author":"Mo","year":"2020","journal-title":"Secur. Commun. Netw."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Joshitta, R.S.M., and Arockiam, L. (2017, January 16\u201318). Device authentication mechanism for IoT enabled healthcare system. Proceedings of the 2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET), Chennai, India.","DOI":"10.1109\/ICAMMAET.2017.8186646"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Lara, E., Aguilar, L., Sanchez, M.A., and Garc\u00eda, J.A. (2020). Lightweight authentication protocol for M2M communications of resource-constrained devices in industrial Internet of Things. Sensors, 20.","DOI":"10.3390\/s20020501"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1016\/j.future.2017.08.042","article-title":"A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks","volume":"82","author":"Wu","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1016\/j.future.2016.05.032","article-title":"A robust and anonymous patient monitoring system using wireless medical sensor networks","volume":"80","author":"Amin","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1165","DOI":"10.1007\/s12652-018-1015-9","article-title":"An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring","volume":"15","author":"Ali","year":"2018","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1007\/s10916-017-0720-9","article-title":"A mutual authentication framework for wireless medical sensor networks","volume":"41","author":"Srinivas","year":"2017","journal-title":"J. Med. Syst."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1109\/JSYST.2018.2866067","article-title":"Secure-anonymous user authentication scheme for e-healthcare application using wireless medical sensor networks","volume":"13","author":"Ever","year":"2018","journal-title":"IEEE Syst. J."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1656","DOI":"10.1109\/TII.2018.2794996","article-title":"Lightweight RFID protocol for medical privacy protection in IoT","volume":"14","author":"Fan","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1016\/j.future.2019.07.004","article-title":"SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT","volume":"101","author":"Aghili","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_22","first-page":"851","article-title":"On Designing Lightweight RFID Security Protocols for Medical IoT","volume":"2019","author":"Safkhani","year":"2019","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1310","DOI":"10.1109\/JBHI.2017.2753464","article-title":"Design of secure and lightweight authentication protocol for wearable devices environment","volume":"22","author":"Das","year":"2017","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.comnet.2018.11.021","article-title":"A lightweight anonymous user authentication and key establishment scheme for wearable devices","volume":"149","author":"Gupta","year":"2019","journal-title":"Comput. Netw."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"2643","DOI":"10.1002\/sec.1214","article-title":"A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity","volume":"9","author":"Li","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/s00530-013-0346-9","article-title":"Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks","volume":"21","author":"He","year":"2015","journal-title":"Multimed. Syst."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1899","DOI":"10.1007\/s11277-016-3718-6","article-title":"A secure smartcard-based anonymous user authentication scheme for healthcare applications using wireless medical sensor networks","volume":"94","author":"Das","year":"2017","journal-title":"Wirel. Pers. Commun."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1634","DOI":"10.1109\/JIOT.2017.2706752","article-title":"Secure authentication scheme for medicine anti-counterfeiting system in IoT environment","volume":"4","author":"Wazid","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"135632","DOI":"10.1109\/ACCESS.2019.2941575","article-title":"An authentic-based privacy preservation protocol for smart e-healthcare systems in IoT","volume":"7","author":"Deebak","year":"2019","journal-title":"IEEE Access"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1368","DOI":"10.1109\/JSEN.2015.2502401","article-title":"BSN-Care: A secure IoT-based modern healthcare system using body sensor network","volume":"16","author":"Gope","year":"2015","journal-title":"IEEE Sens. J."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Soni, P., Pal, A.K., and Islam, S.H. (2019). An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system. Comput. Methods Programs Biomed., 182.","DOI":"10.1016\/j.cmpb.2019.105054"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"47282","DOI":"10.1109\/ACCESS.2020.2978891","article-title":"Efficient and provably secure anonymous user authentication scheme for patient monitoring using wireless medical sensor networks","volume":"8","author":"Xu","year":"2020","journal-title":"IEEE Access"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1693","DOI":"10.1007\/s11227-020-03313-y","article-title":"A lightweight anonymous authentication scheme for secure cloud computing services","volume":"77","author":"Hammami","year":"2021","journal-title":"J. Supercomput."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/s00779-021-01566-9","article-title":"Computationally efficient and secure anonymous authentication scheme for cloud users","volume":"28","author":"Arasan","year":"2021","journal-title":"Pers. Ubiquitous Comput."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"4009","DOI":"10.1007\/s11276-021-02652-9","article-title":"End-to-end privacy preserving scheme for IoT-based healthcare systems","volume":"27","year":"2021","journal-title":"Wirel. Netw."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"516","DOI":"10.1007\/s12083-021-01260-w","article-title":"An efficient and privacy-preserving mutual authentication with key agreement scheme for telecare medicine information system","volume":"15","author":"Chen","year":"2021","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2020\/8829319","article-title":"An identity-based anonymous three-party authenticated protocol for iot infrastructure","volume":"2020","author":"Shafiq","year":"2020","journal-title":"J. Sens."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2017.03.003","article-title":"A survey and taxonomy of the authentication schemes in Telecare Medicine Information Systems","volume":"87","author":"Masdari","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/s10916-014-0016-2","article-title":"A user anonymity preserving three-factor authentication scheme for telecare medicine information systems","volume":"38","author":"Tan","year":"2014","journal-title":"J. Med. Syst."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"2649","DOI":"10.1109\/JIOT.2021.3080461","article-title":"Lightweight and anonymity-preserving user authentication scheme for IoT-based healthcare","volume":"9","author":"Masud","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Lee, J., Oh, J., and Park, Y. (2023). A secure and anonymous authentication protocol based on three-factor wireless medical sensor networks. Electronics, 12.","DOI":"10.3390\/electronics12061368"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1051\/wujns\/2023286531","article-title":"Analysis and improvement of a privacy-preserving authentication scheme for telecare medical information system environment","volume":"28","author":"Niu","year":"2023","journal-title":"Wuhan Univ. J. Nat. Sci."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"1529","DOI":"10.1007\/s10916-010-9614-9","article-title":"A secure authentication scheme for telecare medicine information systems","volume":"36","author":"Wu","year":"2012","journal-title":"J. Med. Syst."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"1328","DOI":"10.1109\/TR.2018.2850966","article-title":"Efficient design of a novel ECC-based public key scheme for medical data protection by utilization of NanoPi fire","volume":"67","author":"Nikooghadam","year":"2018","journal-title":"IEEE Trans. Reliab."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Yeh, K.-H. (2016). BSNCare+: A robust IoT-oriented healthcare system with non-repudiation transactions. Appl. Sci., 6.","DOI":"10.3390\/app6120418"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"5340","DOI":"10.1109\/JSEN.2015.2441113","article-title":"Untraceable sensor movement in distributed IoT infrastructure","volume":"15","author":"Gope","year":"2015","journal-title":"IEEE Sens. J."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Calle, M., and Kabara, J. (2006, January 11\u201314). Measuring energy consumption in wireless sensor networks using GSP. Proceedings of the 2006 IEEE 17th International Symposium on Personal, Indoor and Mobile Radio Communications, Helsinki, Finland.","DOI":"10.1109\/PIMRC.2006.254184"}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/8\/4\/52\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T16:31:07Z","timestamp":1760113867000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/8\/4\/52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,13]]},"references-count":47,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["cryptography8040052"],"URL":"https:\/\/doi.org\/10.3390\/cryptography8040052","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,13]]}}}