Skip to main content
Top
Published in: Mobile Networks and Applications 1/2020

30-04-2019

IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks

Authors: Mohammed Ramadan, Yongjian Liao, Fagen Li, Shijie Zhou, Hisham Abdalla

Published in: Mobile Networks and Applications | Issue 1/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Wireless body area network (WBAN) constitutes a widely implemented technique for remote acquisition and monitoring of patient health-related information via the use of embodied sensors. Given that security and privacy protection, including, but not limited to user authentication, integrity, and confidentiality, are both key challenges and a matter of deep concern when it comes to the deployment of emerging technologies in healthcare applications, state-of-the-art measures and solutions are needed to fully address security and privacy concerns in an effective and sensible manner by considering all the benefits and limitation of remote healthcare systems. In this paper, we proposed an efficient and secure identity-based encryption scheme under the RSA assumption providing equality test. We then proved the security of our scheme for one-way secure against chosen-identity and chosen-ciphertext attacks (OW-ID-CCA) by means of the random oracle model. The performance evaluation results indicated that our scheme outperforms other security schemes in terms of providing relatively low computational cost and stable compatibility with WBAN applications.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Show more products
Literature
1.
go back to reference Chen M, Gonzalez S, Vasilakos A, Cao H, Leung VC (2011) Body area networks: a survey. Mobile Netw Appl 16:171–93CrossRef Chen M, Gonzalez S, Vasilakos A, Cao H, Leung VC (2011) Body area networks: a survey. Mobile Netw Appl 16:171–93CrossRef
2.
go back to reference Latr B, Braem B, Moerman I, Blondia C, Demeester P (2011) A survey on wireless body area networks. Wireless Netw 17(1):1–8CrossRef Latr B, Braem B, Moerman I, Blondia C, Demeester P (2011) A survey on wireless body area networks. Wireless Netw 17(1):1–8CrossRef
3.
go back to reference Alemdar H, Ersoy C (2010) Wireless sensor networks for healthcare: a survey. Comput Netw 54(15):2688–2710CrossRef Alemdar H, Ersoy C (2010) Wireless sensor networks for healthcare: a survey. Comput Netw 54(15):2688–2710CrossRef
4.
go back to reference Latr B, Braem B, Moerman I, Blondia C, Demeester P (2011) A survey on wireless body area networks. Wireless Netw 17(1):1–8CrossRef Latr B, Braem B, Moerman I, Blondia C, Demeester P (2011) A survey on wireless body area networks. Wireless Netw 17(1):1–8CrossRef
5.
go back to reference Al Ameen M, Liu J, Kwak K (2012) Security and privacy issues in wireless sensor networks for healthcare applications. J Med Syst 36(1):93–101CrossRef Al Ameen M, Liu J, Kwak K (2012) Security and privacy issues in wireless sensor networks for healthcare applications. J Med Syst 36(1):93–101CrossRef
6.
go back to reference Javadi SS, Razzaque MA (2013) Security and privacy in wireless body area networks for health care applications. In: Wireless networks and security. Springer, Berlin, pp 165–87 Javadi SS, Razzaque MA (2013) Security and privacy in wireless body area networks for health care applications. In: Wireless networks and security. Springer, Berlin, pp 165–87
7.
go back to reference Zhao Z (2014) An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J Med Syst 38(2):1–7CrossRef Zhao Z (2014) An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J Med Syst 38(2):1–7CrossRef
8.
go back to reference Xiong H, Qin Z (2015) Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Trans Inf Forensics Secur 10:1442–55CrossRef Xiong H, Qin Z (2015) Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Trans Inf Forensics Secur 10:1442–55CrossRef
9.
go back to reference Ma S (2016) Identity-based encryption with outsourced equality test in cloud computing. Inform Sci 328:389–402MATHCrossRef Ma S (2016) Identity-based encryption with outsourced equality test in cloud computing. Inform Sci 328:389–402MATHCrossRef
10.
go back to reference Lee HT, Ling S, Seo JH, Wang H (2016) Semi-generic construction of public key encryption and identity-based encryption with equality test. Inform Sci 373:419–440MATHCrossRef Lee HT, Ling S, Seo JH, Wang H (2016) Semi-generic construction of public key encryption and identity-based encryption with equality test. Inform Sci 373:419–440MATHCrossRef
11.
go back to reference Wu L, Zhang Y, Choo K-KR, He D (2017) Efficient and secure identity-based encryption scheme with equality test in cloud computing. Futur Gener Comput Syst 73:22–31CrossRef Wu L, Zhang Y, Choo K-KR, He D (2017) Efficient and secure identity-based encryption scheme with equality test in cloud computing. Futur Gener Comput Syst 73:22–31CrossRef
12.
go back to reference Tang Q (2012) Public key encryption scheme supporting equality test with authorization of different granularity. Int J Appl Cryptogr 2(4):304–321MathSciNetMATHCrossRef Tang Q (2012) Public key encryption scheme supporting equality test with authorization of different granularity. Int J Appl Cryptogr 2(4):304–321MathSciNetMATHCrossRef
13.
go back to reference Yang G, Tan C, Huang Q, Wong DS (2010) Probabilistic public key encryption with equality test, The Cryptographers? Track at the RSA conference, (CT-RSA 2010) San Francisco, CA, USA, LNCS, 5985. Springer, Berlin Yang G, Tan C, Huang Q, Wong DS (2010) Probabilistic public key encryption with equality test, The Cryptographers? Track at the RSA conference, (CT-RSA 2010) San Francisco, CA, USA, LNCS, 5985. Springer, Berlin
14.
go back to reference Tang Q (2011) Towards public key encryption scheme supporting equality test with finegrained authorization, 16th Australasian Conference on Information Security and Privacy (ACISP2011), Melbourne, Australia, LNCS, 6812. Springer, Berlin Tang Q (2011) Towards public key encryption scheme supporting equality test with finegrained authorization, 16th Australasian Conference on Information Security and Privacy (ACISP2011), Melbourne, Australia, LNCS, 6812. Springer, Berlin
15.
go back to reference Tang Q (2012) Public key encryption supporting plaintext equality test and user-specified authorization. Sec Commun Netw 5(12):1351–1362CrossRef Tang Q (2012) Public key encryption supporting plaintext equality test and user-specified authorization. Sec Commun Netw 5(12):1351–1362CrossRef
16.
go back to reference Ma S, Huang Q, Zhang M, Yang B (2015) Efficient public key encryption with equality test supporting flexible authorization. IEEE Trans Inf Foren Sec 10(3):458–470CrossRef Ma S, Huang Q, Zhang M, Yang B (2015) Efficient public key encryption with equality test supporting flexible authorization. IEEE Trans Inf Foren Sec 10(3):458–470CrossRef
18.
go back to reference Ma S, Zhang M, Huang Q, Yang B (2015) Public key encryption with delegated equality test in a multi-user setting. Comput J 58(4):986–1002CrossRef Ma S, Zhang M, Huang Q, Yang B (2015) Public key encryption with delegated equality test in a multi-user setting. Comput J 58(4):986–1002CrossRef
19.
go back to reference Si H, et al. (2010) An improved RSA signature algorithm based on complex numeric operation function. International Conference on Challenges in Environmental Science and Computer Engineering 2:397–400CrossRef Si H, et al. (2010) An improved RSA signature algorithm based on complex numeric operation function. International Conference on Challenges in Environmental Science and Computer Engineering 2:397–400CrossRef
20.
go back to reference da Silva JCL (2010) Factoring semi primes and possible implications. In: IEEE in Israel, 26th Convention, pp 182–183 da Silva JCL (2010) Factoring semi primes and possible implications. In: IEEE in Israel, 26th Convention, pp 182–183
21.
go back to reference Aboud SJ (2009) An efficient method for attack RSA scheme. ICADIWT Second International Conference 4-6:587–591 Aboud SJ (2009) An efficient method for attack RSA scheme. ICADIWT Second International Conference 4-6:587–591
22.
go back to reference Scripcariu L, Frunza MD (2005) A new character encryption algorithm. ICMCS 2005, pp 83–86 Scripcariu L, Frunza MD (2005) A new character encryption algorithm. ICMCS 2005, pp 83–86
23.
25.
go back to reference Brent RP (1980) MR 82a:10007, Zbl 439.65001. rpb051, BIT, 20, 176–184 Brent RP (1980) MR 82a:10007, Zbl 439.65001. rpb051, BIT, 20, 176–184
26.
go back to reference Bell E (1986) The prince of amateurs: fermat. New York: Simon and Schuster, pp 56–72 Bell E (1986) The prince of amateurs: fermat. New York: Simon and Schuster, pp 56–72
27.
go back to reference Tan CC, Wang H, Zhong S, Li Q (2009) IBE-lite: a lightweight identity-based cryptography for body sensor networks. IEEE Trans Inf Technol Biomed 13(6), art. No. 5272415: 926–932CrossRef Tan CC, Wang H, Zhong S, Li Q (2009) IBE-lite: a lightweight identity-based cryptography for body sensor networks. IEEE Trans Inf Technol Biomed 13(6), art. No. 5272415: 926–932CrossRef
30.
go back to reference Yu Y, Xue L, Au MH, Susilo W, Ni J, Zhang Y, Vasilakos AV, Shen J (2016) Cloud data integrity checking with an identity-based auditing mechanism from RSA. Futur Gener Comput Syst 62:85–91CrossRef Yu Y, Xue L, Au MH, Susilo W, Ni J, Zhang Y, Vasilakos AV, Shen J (2016) Cloud data integrity checking with an identity-based auditing mechanism from RSA. Futur Gener Comput Syst 62:85–91CrossRef
31.
go back to reference Wu L, Zhang Y, Choo K-K, He D (2017) Efficient and secure identity-based encryption scheme with equality test in cloud computing. Futur Gener Comput Syst 73:22–31CrossRef Wu L, Zhang Y, Choo K-K, He D (2017) Efficient and secure identity-based encryption scheme with equality test in cloud computing. Futur Gener Comput Syst 73:22–31CrossRef
32.
go back to reference Boneh D, Goh E, Nissim K (2005) Evaluating 2-DNF formulas on ciphertexts. In: Proceedings of theory of cryptography (TCC)’05, LNCS 3378, pp 325–341CrossRef Boneh D, Goh E, Nissim K (2005) Evaluating 2-DNF formulas on ciphertexts. In: Proceedings of theory of cryptography (TCC)’05, LNCS 3378, pp 325–341CrossRef
34.
go back to reference He D, Chen J (2013) An efficient certificate-less designated verifier signature scheme. The International Arab Journal of Information Technology 10(4):389–396 He D, Chen J (2013) An efficient certificate-less designated verifier signature scheme. The International Arab Journal of Information Technology 10(4):389–396
35.
go back to reference Hea D, Chen J, Zhang R (2011) An efficient identity-based blind signature scheme without bilinear pairings. Comput Electr Eng 37(4):444–450MATHCrossRef Hea D, Chen J, Zhang R (2011) An efficient identity-based blind signature scheme without bilinear pairings. Comput Electr Eng 37(4):444–450MATHCrossRef
36.
go back to reference Ramadan M, Du G, Li F, Xu CX (2016) A survey of public key infrastructure-based security for mobile communication systems. Symmetry 8(9):85MathSciNetCrossRef Ramadan M, Du G, Li F, Xu CX (2016) A survey of public key infrastructure-based security for mobile communication systems. Symmetry 8(9):85MathSciNetCrossRef
38.
go back to reference Ramadan M, Li F, Xu CX, Oteng K, Ibrahim H (2015) Authentication and key agreement scheme for CDMA cellular system. In: Proceedings of the 2015 IEEE international conference on communication software and networks (ICCSN), China, 6C7, p 118C124 Ramadan M, Li F, Xu CX, Oteng K, Ibrahim H (2015) Authentication and key agreement scheme for CDMA cellular system. In: Proceedings of the 2015 IEEE international conference on communication software and networks (ICCSN), China, 6C7, p 118C124
39.
go back to reference Ramadan M, Li F, Xu CX, Abdalla A, Abdalla H (2016) An efficient end-to-end mutual authentication scheme for 2G-GSM system. In: 2016 IEEE international conference on big data analysis (ICBDA 2016), Hangzhou, P.R.China, IEEE Xplore Digital Library, pp 1–6, https://doi.org/10.1109/ICBDA.2016.7509848 Ramadan M, Li F, Xu CX, Abdalla A, Abdalla H (2016) An efficient end-to-end mutual authentication scheme for 2G-GSM system. In: 2016 IEEE international conference on big data analysis (ICBDA 2016), Hangzhou, P.R.China, IEEE Xplore Digital Library, pp 1–6, https://​doi.​org/​10.​1109/​ICBDA.​2016.​7509848
40.
go back to reference Ramadan M, Li F, Xu CX, Mohamed A, Abdalla H, Abdalla A (2016) User-to-user mutual authentication and key agreement scheme for LTE cellular system. Int J Net Secur 18(4):769–781 Ramadan M, Li F, Xu CX, Mohamed A, Abdalla H, Abdalla A (2016) User-to-user mutual authentication and key agreement scheme for LTE cellular system. Int J Net Secur 18(4):769–781
Metadata
Title
IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks
Authors
Mohammed Ramadan
Yongjian Liao
Fagen Li
Shijie Zhou
Hisham Abdalla
Publication date
30-04-2019
Publisher
Springer US
Published in
Mobile Networks and Applications / Issue 1/2020
Print ISSN: 1383-469X
Electronic ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-019-01215-9

Other articles of this Issue 1/2020

Mobile Networks and Applications 1/2020 Go to the issue