Skip to main content

An Asymmetric Signcryption Scheme for Cloud-Assisted Wireless Body Area Network

  • Conference paper
  • First Online:
Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10067))

  • 930 Accesses

Abstract

Wireless body area network (WBAN) has emerged as one of the most promising technologies for e-healthcare. In recent years, cloud-assisted WBANs have attracted intensive attention from the academic and industrial communities. How to ensure data confidentiality, integrity, non-repudiation, and access control is an important and challenging issue for widespread deployment of cloud-assisted WBANs. In this paper, we introduce a new cryptographic primitive named key-policy attribute/identity-based signcryption (KP-AIBSC) scheme to address above challenge problem, which can fulfill the functionality of identity-based signature and key-policy attribute-based encryption in a logical step. We first give formal syntax and formulate security model of KP-AIBSC scheme. Next, we present a concrete KP-AIBSC construction from bilinear pairings. The proposed construction is proved to be indistinguishable against adaptive chosen plaintext attacks under the DBDH assumption and existentially unforgeable against adaptive chosen message and identity attacks under the CDH assumption in the random oracle model. Finally, we exhibit an efficient fine-grained cryptographic access framework for cloud-assisted WBANs by exploiting our proposed KP-AIBSC scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chen, M., Gonzalez, S., Vasilakos, A., et al.: Body area networks: a survey. Mob. Netw. Appl. 16(2), 171–193 (2011)

    Article  Google Scholar 

  2. Cordeiro, C., Fantacci, R., Gupta, S., et al.: Body area networking: Technology and applications. IEEE J. Sel. Areas Commun. 27(1), 1–4 (2009)

    Article  Google Scholar 

  3. Kupwade, P.H., Seshadri, R.: Big data security and privacy issues in health-care. In: IEEE International Congress on Big Data, pp. 762–765 (2014)

    Google Scholar 

  4. Sadiku, M.N.O., Musa, S.M., Momoh, O.D.: Cloud computing: opportunities and challenges. IEEE potentials 33(1), 34–36 (2014)

    Article  Google Scholar 

  5. Li, M., Yu, S.C., Guttman, J.D., et al.: Secure ad hoc trust initialization and key management in wireless body area networks. Acm Trans. Sensor Netw. 9(2), 1–35 (2013)

    Article  Google Scholar 

  6. Halperin, D., Heydt-Benjamin, T., Ransford, B., et al.: Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In: IEEE Symposium on Security and Privacy, pp. 129–142 (2008)

    Google Scholar 

  7. Malasri, K., Wang, L.: Design and implementation of a secure wireless mote-based medical sensor network. Sensors 9(8), 6273–6297 (2009)

    Article  Google Scholar 

  8. Hu, C.Q., Zhang, N., Li, H.J., et al.: Body area network security: a fuzzy attribute-based signcryption scheme. IEEE J. Sel. Areas Commun. 31(9), 37–46 (2013)

    Article  Google Scholar 

  9. Tan, Y.L., Goi, B.M., Komiya, R., Phan, R.: Design and implementation of key-policy attribute-based encryption in body sensor network. Int. J. Cryptol. Res. 4(1), 84–101 (2013)

    Google Scholar 

  10. Liu, J.W., Zhang, Z.H., Chen, X.F., et al.: Certificateless remote anonymous authentication schemes for wirelessbody area networks. IEEE Trans. Parallel Distrib. Syst. 25(2), 332–342 (2014)

    Article  Google Scholar 

  11. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). doi:10.1007/11426639_27

    Chapter  Google Scholar 

  12. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute based encryption for fine-grained access conrol of encrypted data. In: ACM conference on Computer and Communications Security, pp. 89–98 (2006)

    Google Scholar 

  13. Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011). doi:10.1007/978-3-642-19379-8_4

    Chapter  Google Scholar 

  14. Zheng, Y.: Digital signcryption or how to achieve cost(signature & encryption) \(\ll \) cost(signature) + cost(encryption). In: Kaliski Jr., B.S. (ed.) Advances in Cryptology—CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997). doi:10.1007/BFb0052234

    Google Scholar 

  15. Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.-J.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 515–532. Springer, Heidelberg (2005). doi:10.1007/11593447_28

    Chapter  Google Scholar 

  16. Wang, C.J., Huang, J.S.: Attribute-based signcryption with ciphertext-policy and claim-predicate mechanism. In: 2013 Ninth International Conference on Computational Intelligence and Security, pp. 905–909. IEEE Press (2011)

    Google Scholar 

  17. Choon, J.C., Hee Cheon, J.: An identity-based signature from gap diffie-hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18–30. Springer, Heidelberg (2003). doi:10.1007/3-540-36288-6_2

    Chapter  Google Scholar 

Download references

Acknowledgments

This research is funded by National Natural Science Foundation of China (Grant No. 61173189).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Changji Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Wang, C., Wu, J., Jiang, S. (2016). An Asymmetric Signcryption Scheme for Cloud-Assisted Wireless Body Area Network. In: Wang, G., Ray, I., Alcaraz Calero, J., Thampi, S. (eds) Security, Privacy and Anonymity in Computation, Communication and Storage. SpaCCS 2016. Lecture Notes in Computer Science(), vol 10067. Springer, Cham. https://doi.org/10.1007/978-3-319-49145-5_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49145-5_29

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49144-8

  • Online ISBN: 978-3-319-49145-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics