Abstract
The Internet has become an increasingly appealing medium for telecare medicine information systems (TMISs). However, the open nature of the Internet poses serious security threats and vulnerabilities to TMISs and privacy concerns to the patients and medical personnel. This work proposes a hybrid quantum key distribution protocol to provide security in TMISs, leveraging the key agreement of classical and quantum key distribution. Our protocol induces low energy and computation overheads to achieve privacy and trusted operations for TMISs. This is because quantum key distribution employs the principles of quantum mechanics rather than computational complexity, to avoid various attacks such as the man-in-the-middle attacks, the replay attacks and the passive attacks. Meanwhile, classical cryptography can be used to achieve user authentication efficiently. Therefore, our protocol may be available with the rapid developments of extensive experiments for quantum key distribution.



Similar content being viewed by others
References
Wen, F., & Guo, D. (2015). An improved anonymous authentication scheme for telecare medical information systems. Journal of Medical Systems, 36(5), 1–11.
Pu, Q., Wang, J., & Zhao, R. Y. (2012). Strong authentication scheme for telecare medicine information systems. Journal of Medical Systems, 36(4), 2609–2619.
Arshad, H., & Nikooghadam, M. (2014). Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems. Journal of Medical Systems, 38, 136.
Xie, Q., Zhang, J., & Dong, N. (2013). Robust anonymous authentication scheme for telecare medical information systems. Journal of Medical Systems, 37, 9911.
He, D., Chen, J., & Zhang, R. (2012). A more secure authentication scheme for telecare medicine information systems. Journal of Medical Systems, 36(3), 1989–1995.
Nikooghadam, M., & Zakerolhosseini, A. (2012). Secure communication of medical information using mobile agents. Journal of Medical Systems, 36(6), 3839–3850.
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., & Ren, K. (2016). A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 11(11), 2594–608.
Zhou, Z. L., Yang, C. N., Chen, B. J., Sun, X. M., Liu, Q., & Wu, Q. J. (2016). Effective and efficient image copy detection with resistance to rrbitrary rotation. IEICE Transactions on Information and Systems., 99(6), 1531–1540.
Yuan, C. S., Sun, X. M., & Rui, L. V. (2016). Fingerprint liveness detection based on multi-scale LPQ and PCA. China Communications, 13(7), 60–65.
Fu, Z. J., Ren, K., Shu, J. G., Sun, X. M., & Huang, F. X. (2016). Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Transactions on Parallel and Distributed Systems, 27(9), 2546C2559.
Zhou, Z. L., Wang, Y. L., Wu, Q. J., Yang, C. N., & Sun, X. M. (2017). Effective and efficient global context verification for image copy detection. IEEE Transactions on Information Forensics and Security, 12(1), 48–63.
Li, J., Li, X. J., Yang, B., & Sun, X. M. (2015). Segmentation-based image copy-move forgery detection scheme. IEEE Transactions on Information Forensics and Security, 10(3), 507–518.
Lee, T. F., & Liu, C. M. (2013). A secure smart-card based authentication and key agreement scheme for telecare medicine information systems. Journal of Medical Systems, 37, 9933.
Xu, X., Zhu, P., Wen, Q., Jin, Z., Zhang, H., & He, L. (2014). A secure and efficient authentication and key agreement scheme based on ECC for telecare medicine information systems. Journal of Medical Systems, 38(1), 1–7.
Xia, Z. H., Wang, X. H., Sun, X. M., & Wang, Q. (2015). A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 27(2), 340–352.
Bennett, C. H., & Brassard, G. (1984). Quantum cryptography: public-key distribution and coin tossing. In Proceedings of the IEEE international conference on computers, systems and signal processing (Bangalore, India) (pp. 175-179). New York: IEEE.
Muller, A., Breguet, J., & Gisin, N. (1993). Experimental demonstration of quantum cryptography using polarized photons in optical fibre over more than 1 km. Europhysics Letter, 23(6), 383–388.
Inagaki, T., Matsuda, N., Tadanaga, O., Nishida, Y., Asobe, M., & Takesue, H. (2013). Long distance distribution of entangled photon pair over 300 km of fiber. Optics Express, 21(20), 23241–23249.
Wootters, W. K., & Zurek, W. H. (1982). A single quantum cannot be cloned. Nature, 299(5886), 802–803.
Gisin, N., Ribordy, G., Tittel, W., & Zbinden, H. (2002). Quantum cryptography. Reviews of Modern Physics, 74(1), 145.
Merkle, R. C. (1989). One way hash functions and DES. Conference on the theory and application of cryptology (pp. 428–446). New York: Springer.
Chen, L. X., & She, W. L. (2009). Encoding orbital angular momentum onto multiple spin states based on a Huffman tree. New Journal of Physics, 11, 1–8.
Lai, H., Orgun, M. A., Xiao, J. H., Pieprzyk, J., Xue, L., & YYang, Y. X. (2014). Provably secure three-party key agreement protocol using Chebyshev maps in the standard model. Nonlinear Dynamics, 4, 1427–1439.
Jain, N., Stiller, B., Khan, I., Makarov, V., Marquardt, Ch., & Leuchs, G. (2015). Risk analysis of Trojan-horse attacks on practical quantum key distribution systems. IEEE Journal of Selected Topics in Quantum Electronics, 21, 6600710.
Acknowledgements
Hong Lai has been supported by the National Natural Science Foundation of China (No. 61702427), the Fundamental Research Funds for the Central Universities (No. XDJK2016C043) and the Doctoral Program of Higher Education (No. SWU115091), and the financial support in part by the 1000-Plan of Chongqing by Southwest University (No. SWU116007). Mingxing Luo is supported by the National Natural Science Foundation of China (No. 61772437, 61303039), and Sichuan Youth Science & Technique Foundation (No. 2017JQ0048). Fuyuan Xiao is supported by the Fundamental Research Funds for the Central Universities (No. XDJK2015C107) and the Doctoral Program of Higher Education (No. SWU115008). The paper is also supported by A Project Funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology (CICAEET).
Author information
Authors and Affiliations
Corresponding authors
Rights and permissions
About this article
Cite this article
Lai, H., Luo, M., Qu, Z. et al. A Hybrid Quantum Key Distribution Protocol for Tele-care Medicine Information Systems. Wireless Pers Commun 98, 929–943 (2018). https://doi.org/10.1007/s11277-017-4902-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-017-4902-z