Skip to main content
Log in

IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

Wireless body area network (WBAN) constitutes a widely implemented technique for remote acquisition and monitoring of patient health-related information via the use of embodied sensors. Given that security and privacy protection, including, but not limited to user authentication, integrity, and confidentiality, are both key challenges and a matter of deep concern when it comes to the deployment of emerging technologies in healthcare applications, state-of-the-art measures and solutions are needed to fully address security and privacy concerns in an effective and sensible manner by considering all the benefits and limitation of remote healthcare systems. In this paper, we proposed an efficient and secure identity-based encryption scheme under the RSA assumption providing equality test. We then proved the security of our scheme for one-way secure against chosen-identity and chosen-ciphertext attacks (OW-ID-CCA) by means of the random oracle model. The performance evaluation results indicated that our scheme outperforms other security schemes in terms of providing relatively low computational cost and stable compatibility with WBAN applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Chen M, Gonzalez S, Vasilakos A, Cao H, Leung VC (2011) Body area networks: a survey. Mobile Netw Appl 16:171–93

    Article  Google Scholar 

  2. Latr B, Braem B, Moerman I, Blondia C, Demeester P (2011) A survey on wireless body area networks. Wireless Netw 17(1):1–8

    Article  Google Scholar 

  3. Alemdar H, Ersoy C (2010) Wireless sensor networks for healthcare: a survey. Comput Netw 54(15):2688–2710

    Article  Google Scholar 

  4. Latr B, Braem B, Moerman I, Blondia C, Demeester P (2011) A survey on wireless body area networks. Wireless Netw 17(1):1–8

    Article  Google Scholar 

  5. Al Ameen M, Liu J, Kwak K (2012) Security and privacy issues in wireless sensor networks for healthcare applications. J Med Syst 36(1):93–101

    Article  Google Scholar 

  6. Javadi SS, Razzaque MA (2013) Security and privacy in wireless body area networks for health care applications. In: Wireless networks and security. Springer, Berlin, pp 165–87

    Google Scholar 

  7. Zhao Z (2014) An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J Med Syst 38(2):1–7

    Article  Google Scholar 

  8. Xiong H, Qin Z (2015) Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Trans Inf Forensics Secur 10:1442–55

    Article  Google Scholar 

  9. Ma S (2016) Identity-based encryption with outsourced equality test in cloud computing. Inform Sci 328:389–402

    Article  MATH  Google Scholar 

  10. Lee HT, Ling S, Seo JH, Wang H (2016) Semi-generic construction of public key encryption and identity-based encryption with equality test. Inform Sci 373:419–440

    Article  MATH  Google Scholar 

  11. Wu L, Zhang Y, Choo K-KR, He D (2017) Efficient and secure identity-based encryption scheme with equality test in cloud computing. Futur Gener Comput Syst 73:22–31

    Article  Google Scholar 

  12. Tang Q (2012) Public key encryption scheme supporting equality test with authorization of different granularity. Int J Appl Cryptogr 2(4):304–321

    Article  MathSciNet  MATH  Google Scholar 

  13. Yang G, Tan C, Huang Q, Wong DS (2010) Probabilistic public key encryption with equality test, The Cryptographers? Track at the RSA conference, (CT-RSA 2010) San Francisco, CA, USA, LNCS, 5985. Springer, Berlin

    Google Scholar 

  14. Tang Q (2011) Towards public key encryption scheme supporting equality test with finegrained authorization, 16th Australasian Conference on Information Security and Privacy (ACISP2011), Melbourne, Australia, LNCS, 6812. Springer, Berlin

    Google Scholar 

  15. Tang Q (2012) Public key encryption supporting plaintext equality test and user-specified authorization. Sec Commun Netw 5(12):1351–1362

    Article  Google Scholar 

  16. Ma S, Huang Q, Zhang M, Yang B (2015) Efficient public key encryption with equality test supporting flexible authorization. IEEE Trans Inf Foren Sec 10(3):458–470

    Article  Google Scholar 

  17. Huang K, Tso R, Chen Y-C, Rahman SMM, Almogren A, Alamri A (2015) PKE-AET: public key encryption with authorized equality test. Comput J. https://doi.org/10.1093/comjnl/bxv025

    Article  Google Scholar 

  18. Ma S, Zhang M, Huang Q, Yang B (2015) Public key encryption with delegated equality test in a multi-user setting. Comput J 58(4):986–1002

    Article  Google Scholar 

  19. Si H, et al. (2010) An improved RSA signature algorithm based on complex numeric operation function. International Conference on Challenges in Environmental Science and Computer Engineering 2:397–400

    Article  Google Scholar 

  20. da Silva JCL (2010) Factoring semi primes and possible implications. In: IEEE in Israel, 26th Convention, pp 182–183

  21. Aboud SJ (2009) An efficient method for attack RSA scheme. ICADIWT Second International Conference 4-6:587–591

    Google Scholar 

  22. Scripcariu L, Frunza MD (2005) A new character encryption algorithm. ICMCS 2005, pp 83–86

  23. Pollard J (1978) Monte Carlo methods for index computation (mod p). Math Comp 32:918–924

    MathSciNet  MATH  Google Scholar 

  24. Pollard J (1974) Theorems on factorization and primality testing. Proc Cambridge Philos Soc 76:521–528

    Article  MathSciNet  MATH  Google Scholar 

  25. Brent RP (1980) MR 82a:10007, Zbl 439.65001. rpb051, BIT, 20, 176–184

  26. Bell E (1986) The prince of amateurs: fermat. New York: Simon and Schuster, pp 56–72

  27. Tan CC, Wang H, Zhong S, Li Q (2009) IBE-lite: a lightweight identity-based cryptography for body sensor networks. IEEE Trans Inf Technol Biomed 13(6), art. No. 5272415: 926–932

    Article  Google Scholar 

  28. Lin X-J, et al. (2017) An efficient RSA-based certificateless public key encryption scheme. Discret Appl Math. https://doi.org/10.1016/j.dam.2017.02.019

    Article  MathSciNet  MATH  Google Scholar 

  29. Boneh D, Franklin M (2003) Identity-based encryption from the weil pairing. SIAM J Comput 3(32):586–615

    Article  MathSciNet  MATH  Google Scholar 

  30. Yu Y, Xue L, Au MH, Susilo W, Ni J, Zhang Y, Vasilakos AV, Shen J (2016) Cloud data integrity checking with an identity-based auditing mechanism from RSA. Futur Gener Comput Syst 62:85–91

    Article  Google Scholar 

  31. Wu L, Zhang Y, Choo K-K, He D (2017) Efficient and secure identity-based encryption scheme with equality test in cloud computing. Futur Gener Comput Syst 73:22–31

    Article  Google Scholar 

  32. Boneh D, Goh E, Nissim K (2005) Evaluating 2-DNF formulas on ciphertexts. In: Proceedings of theory of cryptography (TCC)’05, LNCS 3378, pp 325–341

    Chapter  Google Scholar 

  33. Scott M (2003) MIRACLE-Multiprecision integer and rational arithmetic C/C++ Library, Shamus Software Ltd, Dublin, Ireland, (http://www.shamus.ie)

  34. He D, Chen J (2013) An efficient certificate-less designated verifier signature scheme. The International Arab Journal of Information Technology 10(4):389–396

    Google Scholar 

  35. Hea D, Chen J, Zhang R (2011) An efficient identity-based blind signature scheme without bilinear pairings. Comput Electr Eng 37(4):444–450

    Article  MATH  Google Scholar 

  36. Ramadan M, Du G, Li F, Xu CX (2016) A survey of public key infrastructure-based security for mobile communication systems. Symmetry 8(9):85

    Article  MathSciNet  Google Scholar 

  37. Ramadan M, Du G, Li F, Xu CX (2016) EEE-GSM: end-to-end encryption scheme over GSM system. International Journal of Security and Its Applications 10(6):229–240. ISSN: 1738-9976 IJSIA, (https://doi.org/10.14257/ijsia.2016.10.6.22)

    Article  Google Scholar 

  38. Ramadan M, Li F, Xu CX, Oteng K, Ibrahim H (2015) Authentication and key agreement scheme for CDMA cellular system. In: Proceedings of the 2015 IEEE international conference on communication software and networks (ICCSN), China, 6C7, p 118C124

  39. Ramadan M, Li F, Xu CX, Abdalla A, Abdalla H (2016) An efficient end-to-end mutual authentication scheme for 2G-GSM system. In: 2016 IEEE international conference on big data analysis (ICBDA 2016), Hangzhou, P.R.China, IEEE Xplore Digital Library, pp 1–6, https://doi.org/10.1109/ICBDA.2016.7509848

  40. Ramadan M, Li F, Xu CX, Mohamed A, Abdalla H, Abdalla A (2016) User-to-user mutual authentication and key agreement scheme for LTE cellular system. Int J Net Secur 18(4):769–781

    Google Scholar 

Download references

Acknowledgments

This work was supported in part by the National Natural Science Foundation of China under Grant 6147206 6, Sichuan Science and Technology Program (No. 2018GZ0180, 2018GZ0085, 2017GZDZX0001, 2017GZDZX0002).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yongjian Liao.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ramadan, M., Liao, Y., Li, F. et al. IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks. Mobile Netw Appl 25, 223–233 (2020). https://doi.org/10.1007/s11036-019-01215-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-019-01215-9

Keywords

Navigation