Skip to main content
Top
Published in: Wireless Personal Communications 2/2023

20-03-2023

Cross Domain Heterogeneous Signcryption Scheme with Equality Test for WBAN

Authors: Ming Luo, Yusi Pei, Minrong Qiu

Published in: Wireless Personal Communications | Issue 2/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The rapid development of wireless sensors has accelerated the popularity of wireless body area network (WBAN). WBAN use multiple sensors to collect the patient’s body data, and the data is transferred to the medical cloud for processing and analyzing. In order to protect the data in the medical cloud, some heterogeneous signcryption schemes that support equality test have been proposed. However, we observe that these schemes use the same cryptographic parameters in different cryptographic systems. In addition, most of these schemes cannot resist the replay attack (RRA) or know session temporary key attack (RKSTKA). To deal with these problems, this paper presents a cross domain heterogeneous signcryption scheme with equality test (CDSCET) for WBAN. In CDSCET, the ciphertexts are from certificateless cryptographic system to public key infrastructure, where two different cryptosystems use different cryptographic parameters. CDSCET can realize confidentiality, integrity, authentication, RRA and RKSTKA. Moreover, compared with three latest schemes, CDSCET has reduced the total computation cost by at least 56.46%.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Cornet, B., Fang, H., & Ngo, H. (2022). An overview of wireless body area networks for mobile health applications. IEEE Network, 36(1), 76–82.CrossRef Cornet, B., Fang, H., & Ngo, H. (2022). An overview of wireless body area networks for mobile health applications. IEEE Network, 36(1), 76–82.CrossRef
2.
go back to reference Ananthi, J. V., & Jose, P. (2021). A perspective review of security challenges in body area networks for healthcare applications. International Journal of Wireless Information Networks, 28(4), 451–466.CrossRef Ananthi, J. V., & Jose, P. (2021). A perspective review of security challenges in body area networks for healthcare applications. International Journal of Wireless Information Networks, 28(4), 451–466.CrossRef
3.
go back to reference Azees, M., Vijayakumar, P., & Karuppiah, M. (2021). An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks. Wireless Networks, 27(3), 2119–2130.CrossRef Azees, M., Vijayakumar, P., & Karuppiah, M. (2021). An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks. Wireless Networks, 27(3), 2119–2130.CrossRef
4.
go back to reference Cheng, Q., Li, Y., & Shi, W. (2021). A certificateless authentication and key agreement scheme for secure cloud-assisted wireless body area network. Mobile Networks and Applications, 27, 1–11. Cheng, Q., Li, Y., & Shi, W. (2021). A certificateless authentication and key agreement scheme for secure cloud-assisted wireless body area network. Mobile Networks and Applications, 27, 1–11.
5.
go back to reference Narwal, B., & Mohapatra, A. K. (2021). SAMAKA: Secure and anonymous mutual authentication and key agreement scheme for wireless body area networks. Arabian Journal for Science and Engineering, 46, 1–23.CrossRef Narwal, B., & Mohapatra, A. K. (2021). SAMAKA: Secure and anonymous mutual authentication and key agreement scheme for wireless body area networks. Arabian Journal for Science and Engineering, 46, 1–23.CrossRef
6.
go back to reference Izza, S., Benssalah, M., & Drouiche, K. (2021). An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment. Journal of Information Security and Applications, 58, 102705.CrossRef Izza, S., Benssalah, M., & Drouiche, K. (2021). An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment. Journal of Information Security and Applications, 58, 102705.CrossRef
7.
go back to reference Boneh, D., Di Crescenzo, G., & Ostrovsky, R. (2004). Public key encryption with keyword search. In International conference on the theory and applications of cryptographic techniques (pp. 506–522). Boneh, D., Di Crescenzo, G., & Ostrovsky, R. (2004). Public key encryption with keyword search. In International conference on the theory and applications of cryptographic techniques (pp. 506–522).
8.
go back to reference Yang, G., Tan, C. H., & Huang, Q. (2010). Probabilistic public key encryption with equality test. In Cryptographers’ track at the RSA conference (pp. 119–131). Yang, G., Tan, C. H., & Huang, Q. (2010). Probabilistic public key encryption with equality test. In Cryptographers’ track at the RSA conference (pp. 119–131).
9.
go back to reference Ramadan, M., Liao, Y., & Li, F. (2020). IBEET-RSA: Identity-based encryption with equality test over RSA for wireless body area networks. Mobile Networks and Applications, 25(1), 223–233.CrossRef Ramadan, M., Liao, Y., & Li, F. (2020). IBEET-RSA: Identity-based encryption with equality test over RSA for wireless body area networks. Mobile Networks and Applications, 25(1), 223–233.CrossRef
10.
go back to reference Zheng, Y. (1997). Digital signcryption or how to achieve cost (signature & encryption)≪ cost (signature) + cost (encryption). In Annual international cryptology conference (pp. 165–179). Zheng, Y. (1997). Digital signcryption or how to achieve cost (signature & encryption)≪ cost (signature) + cost (encryption). In Annual international cryptology conference (pp. 165–179).
11.
go back to reference Xiong, H., Hou, Y., & Huang, X. (2020). Secure message classification services through identity-based signcryption with equality test towards the Internet of vehicles. Vehicular Communications, 26, 100264.CrossRef Xiong, H., Hou, Y., & Huang, X. (2020). Secure message classification services through identity-based signcryption with equality test towards the Internet of vehicles. Vehicular Communications, 26, 100264.CrossRef
12.
go back to reference Hou, Y., Huang, X., & Chen, Y. (2021). Heterogeneous signcryption scheme supporting equality test from PKI to CLC toward IoT. Transactions on Emerging Telecommunications Technologies, 32(8), e4190.CrossRef Hou, Y., Huang, X., & Chen, Y. (2021). Heterogeneous signcryption scheme supporting equality test from PKI to CLC toward IoT. Transactions on Emerging Telecommunications Technologies, 32(8), e4190.CrossRef
15.
go back to reference Lin, H., Zhao, Z., & Gao, F. (2021). Lightweight public key encryption with equality test supporting partial authorization in cloud storage. The Computer Journal, 64(8), 1226–1238.MathSciNetCrossRef Lin, H., Zhao, Z., & Gao, F. (2021). Lightweight public key encryption with equality test supporting partial authorization in cloud storage. The Computer Journal, 64(8), 1226–1238.MathSciNetCrossRef
16.
go back to reference Deverajan, G. G., Muthukumaran, V., & Hsu, C. H. (2022). Public key encryption with equality test for Industrial Internet of Things system in cloud computing. Transactions on Emerging Telecommunications Technologies, 33(4), e4202.CrossRef Deverajan, G. G., Muthukumaran, V., & Hsu, C. H. (2022). Public key encryption with equality test for Industrial Internet of Things system in cloud computing. Transactions on Emerging Telecommunications Technologies, 33(4), e4202.CrossRef
17.
go back to reference Lin, X. J., Sun, L., & Qu, H. (2021). Public key encryption supporting equality test and flexible authorization without bilinear pairings. Computer Communications, 170, 190–199.CrossRef Lin, X. J., Sun, L., & Qu, H. (2021). Public key encryption supporting equality test and flexible authorization without bilinear pairings. Computer Communications, 170, 190–199.CrossRef
18.
go back to reference Hassan, A., Elhabob, R., & Eltayieb, N. (2021). An authorized equality test on identity-based cryptosystem for mobile social networking applications. Transactions on Emerging Telecommunications Technologies, 32, e4361.CrossRef Hassan, A., Elhabob, R., & Eltayieb, N. (2021). An authorized equality test on identity-based cryptosystem for mobile social networking applications. Transactions on Emerging Telecommunications Technologies, 32, e4361.CrossRef
19.
go back to reference Xu, Y., Wang, M., & Zhong, H. (2021). IBEET-AOK: ID-based encryption with equality test against off-line KGAs for cloud medical services. Frontiers of Computer Science, 15(6), 1–3.CrossRef Xu, Y., Wang, M., & Zhong, H. (2021). IBEET-AOK: ID-based encryption with equality test against off-line KGAs for cloud medical services. Frontiers of Computer Science, 15(6), 1–3.CrossRef
20.
go back to reference Elhabob, R., Zhao, Y., & Sella, I. (2020). An efficient certificateless public key cryptography with authorized equality test in IIoT. Journal of Ambient Intelligence and Humanized Computing, 11(3), 1065–1083.CrossRef Elhabob, R., Zhao, Y., & Sella, I. (2020). An efficient certificateless public key cryptography with authorized equality test in IIoT. Journal of Ambient Intelligence and Humanized Computing, 11(3), 1065–1083.CrossRef
21.
go back to reference Alornyo, S., Mohammed, M. A., & Anibrika, B. S. (2021). ID-based plaintext checkable signcryption with equality test in healthcare systems. SN Computer Science, 2(1), 1–9.CrossRef Alornyo, S., Mohammed, M. A., & Anibrika, B. S. (2021). ID-based plaintext checkable signcryption with equality test in healthcare systems. SN Computer Science, 2(1), 1–9.CrossRef
22.
go back to reference Le, H. Q., Duong, D. H., & Roy, P. S. (2021). Lattice-based signcryption with equality test in standard model. Computer Standards & Interfaces, 76, 103515.CrossRef Le, H. Q., Duong, D. H., & Roy, P. S. (2021). Lattice-based signcryption with equality test in standard model. Computer Standards & Interfaces, 76, 103515.CrossRef
Metadata
Title
Cross Domain Heterogeneous Signcryption Scheme with Equality Test for WBAN
Authors
Ming Luo
Yusi Pei
Minrong Qiu
Publication date
20-03-2023
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2023
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-023-10322-6

Other articles of this Issue 2/2023

Wireless Personal Communications 2/2023 Go to the issue