Abstract
Wireless body area network (WBAN) constitutes a widely implemented technique for remote acquisition and monitoring of patient health-related information via the use of embodied sensors. Given that security and privacy protection, including, but not limited to user authentication, integrity, and confidentiality, are both key challenges and a matter of deep concern when it comes to the deployment of emerging technologies in healthcare applications, state-of-the-art measures and solutions are needed to fully address security and privacy concerns in an effective and sensible manner by considering all the benefits and limitation of remote healthcare systems. In this paper, we proposed an efficient and secure identity-based encryption scheme under the RSA assumption providing equality test. We then proved the security of our scheme for one-way secure against chosen-identity and chosen-ciphertext attacks (OW-ID-CCA) by means of the random oracle model. The performance evaluation results indicated that our scheme outperforms other security schemes in terms of providing relatively low computational cost and stable compatibility with WBAN applications.
Similar content being viewed by others
References
Chen M, Gonzalez S, Vasilakos A, Cao H, Leung VC (2011) Body area networks: a survey. Mobile Netw Appl 16:171–93
Latr B, Braem B, Moerman I, Blondia C, Demeester P (2011) A survey on wireless body area networks. Wireless Netw 17(1):1–8
Alemdar H, Ersoy C (2010) Wireless sensor networks for healthcare: a survey. Comput Netw 54(15):2688–2710
Latr B, Braem B, Moerman I, Blondia C, Demeester P (2011) A survey on wireless body area networks. Wireless Netw 17(1):1–8
Al Ameen M, Liu J, Kwak K (2012) Security and privacy issues in wireless sensor networks for healthcare applications. J Med Syst 36(1):93–101
Javadi SS, Razzaque MA (2013) Security and privacy in wireless body area networks for health care applications. In: Wireless networks and security. Springer, Berlin, pp 165–87
Zhao Z (2014) An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J Med Syst 38(2):1–7
Xiong H, Qin Z (2015) Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Trans Inf Forensics Secur 10:1442–55
Ma S (2016) Identity-based encryption with outsourced equality test in cloud computing. Inform Sci 328:389–402
Lee HT, Ling S, Seo JH, Wang H (2016) Semi-generic construction of public key encryption and identity-based encryption with equality test. Inform Sci 373:419–440
Wu L, Zhang Y, Choo K-KR, He D (2017) Efficient and secure identity-based encryption scheme with equality test in cloud computing. Futur Gener Comput Syst 73:22–31
Tang Q (2012) Public key encryption scheme supporting equality test with authorization of different granularity. Int J Appl Cryptogr 2(4):304–321
Yang G, Tan C, Huang Q, Wong DS (2010) Probabilistic public key encryption with equality test, The Cryptographers? Track at the RSA conference, (CT-RSA 2010) San Francisco, CA, USA, LNCS, 5985. Springer, Berlin
Tang Q (2011) Towards public key encryption scheme supporting equality test with finegrained authorization, 16th Australasian Conference on Information Security and Privacy (ACISP2011), Melbourne, Australia, LNCS, 6812. Springer, Berlin
Tang Q (2012) Public key encryption supporting plaintext equality test and user-specified authorization. Sec Commun Netw 5(12):1351–1362
Ma S, Huang Q, Zhang M, Yang B (2015) Efficient public key encryption with equality test supporting flexible authorization. IEEE Trans Inf Foren Sec 10(3):458–470
Huang K, Tso R, Chen Y-C, Rahman SMM, Almogren A, Alamri A (2015) PKE-AET: public key encryption with authorized equality test. Comput J. https://doi.org/10.1093/comjnl/bxv025
Ma S, Zhang M, Huang Q, Yang B (2015) Public key encryption with delegated equality test in a multi-user setting. Comput J 58(4):986–1002
Si H, et al. (2010) An improved RSA signature algorithm based on complex numeric operation function. International Conference on Challenges in Environmental Science and Computer Engineering 2:397–400
da Silva JCL (2010) Factoring semi primes and possible implications. In: IEEE in Israel, 26th Convention, pp 182–183
Aboud SJ (2009) An efficient method for attack RSA scheme. ICADIWT Second International Conference 4-6:587–591
Scripcariu L, Frunza MD (2005) A new character encryption algorithm. ICMCS 2005, pp 83–86
Pollard J (1978) Monte Carlo methods for index computation (mod p). Math Comp 32:918–924
Pollard J (1974) Theorems on factorization and primality testing. Proc Cambridge Philos Soc 76:521–528
Brent RP (1980) MR 82a:10007, Zbl 439.65001. rpb051, BIT, 20, 176–184
Bell E (1986) The prince of amateurs: fermat. New York: Simon and Schuster, pp 56–72
Tan CC, Wang H, Zhong S, Li Q (2009) IBE-lite: a lightweight identity-based cryptography for body sensor networks. IEEE Trans Inf Technol Biomed 13(6), art. No. 5272415: 926–932
Lin X-J, et al. (2017) An efficient RSA-based certificateless public key encryption scheme. Discret Appl Math. https://doi.org/10.1016/j.dam.2017.02.019
Boneh D, Franklin M (2003) Identity-based encryption from the weil pairing. SIAM J Comput 3(32):586–615
Yu Y, Xue L, Au MH, Susilo W, Ni J, Zhang Y, Vasilakos AV, Shen J (2016) Cloud data integrity checking with an identity-based auditing mechanism from RSA. Futur Gener Comput Syst 62:85–91
Wu L, Zhang Y, Choo K-K, He D (2017) Efficient and secure identity-based encryption scheme with equality test in cloud computing. Futur Gener Comput Syst 73:22–31
Boneh D, Goh E, Nissim K (2005) Evaluating 2-DNF formulas on ciphertexts. In: Proceedings of theory of cryptography (TCC)’05, LNCS 3378, pp 325–341
Scott M (2003) MIRACLE-Multiprecision integer and rational arithmetic C/C++ Library, Shamus Software Ltd, Dublin, Ireland, (http://www.shamus.ie)
He D, Chen J (2013) An efficient certificate-less designated verifier signature scheme. The International Arab Journal of Information Technology 10(4):389–396
Hea D, Chen J, Zhang R (2011) An efficient identity-based blind signature scheme without bilinear pairings. Comput Electr Eng 37(4):444–450
Ramadan M, Du G, Li F, Xu CX (2016) A survey of public key infrastructure-based security for mobile communication systems. Symmetry 8(9):85
Ramadan M, Du G, Li F, Xu CX (2016) EEE-GSM: end-to-end encryption scheme over GSM system. International Journal of Security and Its Applications 10(6):229–240. ISSN: 1738-9976 IJSIA, (https://doi.org/10.14257/ijsia.2016.10.6.22)
Ramadan M, Li F, Xu CX, Oteng K, Ibrahim H (2015) Authentication and key agreement scheme for CDMA cellular system. In: Proceedings of the 2015 IEEE international conference on communication software and networks (ICCSN), China, 6C7, p 118C124
Ramadan M, Li F, Xu CX, Abdalla A, Abdalla H (2016) An efficient end-to-end mutual authentication scheme for 2G-GSM system. In: 2016 IEEE international conference on big data analysis (ICBDA 2016), Hangzhou, P.R.China, IEEE Xplore Digital Library, pp 1–6, https://doi.org/10.1109/ICBDA.2016.7509848
Ramadan M, Li F, Xu CX, Mohamed A, Abdalla H, Abdalla A (2016) User-to-user mutual authentication and key agreement scheme for LTE cellular system. Int J Net Secur 18(4):769–781
Acknowledgments
This work was supported in part by the National Natural Science Foundation of China under Grant 6147206 6, Sichuan Science and Technology Program (No. 2018GZ0180, 2018GZ0085, 2017GZDZX0001, 2017GZDZX0002).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Ramadan, M., Liao, Y., Li, F. et al. IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks. Mobile Netw Appl 25, 223–233 (2020). https://doi.org/10.1007/s11036-019-01215-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-019-01215-9