Abstract
Wireless body area networks (WBANs) are rapidly becoming a vital component of the medical industry, in which massive body data is encrypted and then uploaded to the cloud server. In order to search for the encrypted data, the concept of public key encryption adopting equality test has been presented. However, previous schemes of equality test require communication entities in different domain networks to share the same cryptographic parameters, which is not suitable for the cross-domain environment. To break this restraint, we propose a cross-domain encryption scheme with equality test using different parameters for WBANS, in which ciphertexts are from certificateless crypto system (CLC) to identity-based crypto system (IBC). Through the rigorous security analysis, our scheme can carry out the one-way security under a chosen identity attack (OW-ID-CCA) as well as the known session-specific temporary information security (KSTIS). Moreover, the detailed efficiency analysis shows that our scheme saves at least 11% of the total computation cost over four latest schemes.
Similar content being viewed by others
References
Punj, R., & Kumar, R. (2019). Technological aspects of WBANs for health monitoring: A comprehensive review. Wireless Networks, 25(3), 1125–1157. https://doi.org/10.1007/s11276-018-1694-3.
Hajar, M. S., Al-Kadri, M. O., & Kalutarage, H. K. (2021). A survey on wireless body area networks: Architecture, security challenges and research opportunities. Computers & Security. https://doi.org/10.1016/j.cose.2021.102211.
Abdalla, H., Xiong, H., Wahaballa, A., Ramadan, M., & Qin, Z. (2021). Equality test with an anonymous authorization in cloud computing. Wireless Networks, 27(2), 1063–1076. https://doi.org/10.1007/s11276-020-02462-5.
Yang, X., Yi, X., Nepal, S., Khalil, I., Huang, X., & Shen, J. (2021). Efficient and anonymous authentication for healthcare service with cloud based WBANs. IEEE Transactions on Services Computing. https://doi.org/10.1109/TSC.2021.3059856.
Fu, Z., Liu, Y., Sun, X., Liu, Y., & Tian, Z. (2020). Confusing-keyword based secure Search over encrypted cloud data. Mobile Networks and Applications, 25(1), 125–132. https://doi.org/10.1007/s11036-018-1195-8.
Eltayieb, N., Elhabob, R., Hassan, A., & Li, F. (2021). Secure mobile health system supporting search function and decryption verification. Journal of Ambient Intelligence and Humanized Computing, 12(2), 2221–2231. https://doi.org/10.1007/s12652-020-02321-3.
Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with keyword search. In International conference on the theory and applications of cryptographic techniques (pp. 506–522). Berlin, Heidelberg: Springer. https://doi.org/10.1007/978-3-540-24676-3_30.
Yang, G., Tan, C. H., Huang, Q., & Wong, D. S. (2010). Probabilistic public key encryption with equality test. In Cryptographers’Track at the RSA Conference (pp. 119–131). Berlin, Heidelberg: Springer. https://doi.org/10.1007/978-3-642-11925-5_9.
Ramadan, M., Liao, Y., Li, F., Zhou, S., & Abdalla, H. (2020). IBEET-RSA: Identity-based encryption with equality test over RSA for wireless body area networks. Mobile Networks and Applications, 25(1), 223–233. https://doi.org/10.1007/s11036-019-01215-9.
Hassan, A., Wang, Y., Elhabob, R., Eltayieb, N., & Li, F. (2020). An efficient certificateless public key encryption scheme with authorized equality test in healthcare environments. Journal of Systems Architecture, 109, 101776. https://doi.org/10.1016/j.sysarc.2020.101776.
Elhabob, R., Zhao, Y., Sella, I., & Xiong, H. (2020). An efficient certificateless public key cryptography with authorized equality test in IIoT. Journal of Ambient Intelligence and Humanized Computing, 11(3), 1065–1083. https://doi.org/10.1007/s12652-019-01365-4.
Elhabob, R., Zhao, Y., Hassan, A., & Xiong, H. (2020). PKE-ET-HS: Public key encryption with equality test for heterogeneous systems in IoT. Wireless Personal Communications, 113(1), 313–335. https://doi.org/10.1007/s11277-020-07190-9.
Lee, H. T., Ling, S., Seo, J. H., Wang, H., & Youn, T.-Y. (2020). Public key encryption with equality test in the standard model. Information Sciences, 516, 89–108. https://doi.org/10.1016/j.ins.2019.12.023.
Lin, X.-J., Sun, L., Qu, H., & Zhang, X. (2021). Public key encryption supporting equality test and flexible authorization without bilinear pairings. Computer Communications, 170, 190–199. https://doi.org/10.1016/j.comcom.2021.02.006.
Lin, X.-J., Sun, L., & Qu, H. (2018). Generic construction of public key encryption, identity-based encryption and signcryption with equality test. Information Sciences, 453, 111–126. https://doi.org/10.1016/j.ins.2018.04.035.
Lee, H. T., Ling, S., Seo, J. H., & Wang, H. (2019). Public key encryption with equality test from generic assumptions in the random oracle model. Information Sciences, 500, 15–33. https://doi.org/10.1016/j.ins.2019.05.026.
Ling, Y., Ma, S., Huang, Q., Li, X., Zhong, Y., & Ling, Y. (2021). Efficient group ID-based encryption with equality test against insider attack. The Computer Journal, 64(4), 661–674. https://doi.org/10.1093/comjnl/bxaa120.
Li, H., Huang, Q., Ma, S., Shen, J., & Susilo, W. (2019). Authorized equality test on identity-based ciphertexts for secret data sharing via cloud storage. IEEE Access, 7, 25409–25421. https://doi.org/10.1109/ACCESS.2019.2899680.
Qu, H., Yan, Z., Lin, X.-J., Zhang, Q., & Sun, L. (2018). Certificateless public key encryption with equality test. Information Sciences, 462, 76–92. https://doi.org/10.1016/j.ins.2018.06.025.
Elhabob, R., Sella, I., Zhao, Y., Zhu, G., & Xiong, H. (2018). A heterogeneous systems public key encryption with equality test in smart city. In Proceedings of the 18th international conference on electronic business. ICEB, Guilin.
Hassan, A., Elhabob, R., Ibrahim, U., & Wang, Y. (2020). Efficient public key cryptography scheme with equality test for heterogeneous systems in IIoT. In International conference on security, privacy and anonymity in computation, communication and storage, (pp. 108-121). Cham: Springer. https://doi.org/10.1007/978-3-030-68884-4_9.
Sun, J., Xiong, H., Zhang, H., & Peng, L. (2020). Mobile access and flexible search over encrypted cloud data in heterogeneous systems. Information Sciences, 507, 1–15. https://doi.org/10.1016/j.ins.2019.08.026.
Xiong, H., Zhao, Y., Hou, Y., Huang, X., Jin, C., Wang, L., & Kumari, S. (2020). Heterogeneous signcryption with equality test for IIoT environment. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2020.3008955.
Luo, M., Hu, X., & Luo, Y. (2020). An efficient cross-domain data transmission scheme for wireless body area networks. Journal of Medical Systems, 44(7), 1–13. https://doi.org/10.1007/s10916-020-01598-3.
Lin, X.-J., Sun, L., & Qu, H. (2018). An efficient RSA-based certificateless public key encryption scheme. Discrete Applied Mathematics, 241, 39–47. https://doi.org/10.1016/j.dam.2017.02.019.
Ramanjaneyareddy, N., Reddy, P.C., & Padmavathamma, M. (2016). Study the impact of Carmichael function on RSA. In International conference on smart trends for information technology and computer communications, (pp. 119-131). Singapore: Springer. https://doi.org/10.1007/978-981-10-3433-6_90.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This work is supported in part by the National Natural Science Foundation of China (Grant No. 61662046) and postgraduate innovation foundation of Nanchang University (No. YC2021-S167).
Rights and permissions
About this article
Cite this article
Luo, M., Pei, Y. & Chen, A. Cross-domain encryption scheme with equality test for wireless body area networks. Wireless Netw 28, 2105–2114 (2022). https://doi.org/10.1007/s11276-022-02969-z
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-022-02969-z