Skip to main content
Log in

Cross-domain encryption scheme with equality test for wireless body area networks

  • Original Paper
  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Wireless body area networks (WBANs) are rapidly becoming a vital component of the medical industry, in which massive body data is encrypted and then uploaded to the cloud server. In order to search for the encrypted data, the concept of public key encryption adopting equality test has been presented. However, previous schemes of equality test require communication entities in different domain networks to share the same cryptographic parameters, which is not suitable for the cross-domain environment. To break this restraint, we propose a cross-domain encryption scheme with equality test using different parameters for WBANS, in which ciphertexts are from certificateless crypto system (CLC) to identity-based crypto system (IBC). Through the rigorous security analysis, our scheme can carry out the one-way security under a chosen identity attack (OW-ID-CCA) as well as the known session-specific temporary information security (KSTIS). Moreover, the detailed efficiency analysis shows that our scheme saves at least 11% of the total computation cost over four latest schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Punj, R., & Kumar, R. (2019). Technological aspects of WBANs for health monitoring: A comprehensive review. Wireless Networks, 25(3), 1125–1157. https://doi.org/10.1007/s11276-018-1694-3.

    Article  Google Scholar 

  2. Hajar, M. S., Al-Kadri, M. O., & Kalutarage, H. K. (2021). A survey on wireless body area networks: Architecture, security challenges and research opportunities. Computers & Security. https://doi.org/10.1016/j.cose.2021.102211.

    Article  Google Scholar 

  3. Abdalla, H., Xiong, H., Wahaballa, A., Ramadan, M., & Qin, Z. (2021). Equality test with an anonymous authorization in cloud computing. Wireless Networks, 27(2), 1063–1076. https://doi.org/10.1007/s11276-020-02462-5.

    Article  Google Scholar 

  4. Yang, X., Yi, X., Nepal, S., Khalil, I., Huang, X., & Shen, J. (2021). Efficient and anonymous authentication for healthcare service with cloud based WBANs. IEEE Transactions on Services Computing. https://doi.org/10.1109/TSC.2021.3059856.

    Article  Google Scholar 

  5. Fu, Z., Liu, Y., Sun, X., Liu, Y., & Tian, Z. (2020). Confusing-keyword based secure Search over encrypted cloud data. Mobile Networks and Applications, 25(1), 125–132. https://doi.org/10.1007/s11036-018-1195-8.

    Article  Google Scholar 

  6. Eltayieb, N., Elhabob, R., Hassan, A., & Li, F. (2021). Secure mobile health system supporting search function and decryption verification. Journal of Ambient Intelligence and Humanized Computing, 12(2), 2221–2231. https://doi.org/10.1007/s12652-020-02321-3.

    Article  Google Scholar 

  7. Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with keyword search. In International conference on the theory and applications of cryptographic techniques (pp. 506–522). Berlin, Heidelberg: Springer. https://doi.org/10.1007/978-3-540-24676-3_30.

  8. Yang, G., Tan, C. H., Huang, Q., & Wong, D. S. (2010). Probabilistic public key encryption with equality test. In Cryptographers’Track at the RSA Conference (pp. 119–131). Berlin, Heidelberg: Springer. https://doi.org/10.1007/978-3-642-11925-5_9.

  9. Ramadan, M., Liao, Y., Li, F., Zhou, S., & Abdalla, H. (2020). IBEET-RSA: Identity-based encryption with equality test over RSA for wireless body area networks. Mobile Networks and Applications, 25(1), 223–233. https://doi.org/10.1007/s11036-019-01215-9.

    Article  Google Scholar 

  10. Hassan, A., Wang, Y., Elhabob, R., Eltayieb, N., & Li, F. (2020). An efficient certificateless public key encryption scheme with authorized equality test in healthcare environments. Journal of Systems Architecture, 109, 101776. https://doi.org/10.1016/j.sysarc.2020.101776.

    Article  Google Scholar 

  11. Elhabob, R., Zhao, Y., Sella, I., & Xiong, H. (2020). An efficient certificateless public key cryptography with authorized equality test in IIoT. Journal of Ambient Intelligence and Humanized Computing, 11(3), 1065–1083. https://doi.org/10.1007/s12652-019-01365-4.

    Article  Google Scholar 

  12. Elhabob, R., Zhao, Y., Hassan, A., & Xiong, H. (2020). PKE-ET-HS: Public key encryption with equality test for heterogeneous systems in IoT. Wireless Personal Communications, 113(1), 313–335. https://doi.org/10.1007/s11277-020-07190-9.

    Article  Google Scholar 

  13. Lee, H. T., Ling, S., Seo, J. H., Wang, H., & Youn, T.-Y. (2020). Public key encryption with equality test in the standard model. Information Sciences, 516, 89–108. https://doi.org/10.1016/j.ins.2019.12.023.

    Article  MathSciNet  MATH  Google Scholar 

  14. Lin, X.-J., Sun, L., Qu, H., & Zhang, X. (2021). Public key encryption supporting equality test and flexible authorization without bilinear pairings. Computer Communications, 170, 190–199. https://doi.org/10.1016/j.comcom.2021.02.006.

    Article  Google Scholar 

  15. Lin, X.-J., Sun, L., & Qu, H. (2018). Generic construction of public key encryption, identity-based encryption and signcryption with equality test. Information Sciences, 453, 111–126. https://doi.org/10.1016/j.ins.2018.04.035.

    Article  MathSciNet  MATH  Google Scholar 

  16. Lee, H. T., Ling, S., Seo, J. H., & Wang, H. (2019). Public key encryption with equality test from generic assumptions in the random oracle model. Information Sciences, 500, 15–33. https://doi.org/10.1016/j.ins.2019.05.026.

    Article  MathSciNet  MATH  Google Scholar 

  17. Ling, Y., Ma, S., Huang, Q., Li, X., Zhong, Y., & Ling, Y. (2021). Efficient group ID-based encryption with equality test against insider attack. The Computer Journal, 64(4), 661–674. https://doi.org/10.1093/comjnl/bxaa120.

    Article  MathSciNet  Google Scholar 

  18. Li, H., Huang, Q., Ma, S., Shen, J., & Susilo, W. (2019). Authorized equality test on identity-based ciphertexts for secret data sharing via cloud storage. IEEE Access, 7, 25409–25421. https://doi.org/10.1109/ACCESS.2019.2899680.

    Article  Google Scholar 

  19. Qu, H., Yan, Z., Lin, X.-J., Zhang, Q., & Sun, L. (2018). Certificateless public key encryption with equality test. Information Sciences, 462, 76–92. https://doi.org/10.1016/j.ins.2018.06.025.

    Article  MathSciNet  MATH  Google Scholar 

  20. Elhabob, R., Sella, I., Zhao, Y., Zhu, G., & Xiong, H. (2018). A heterogeneous systems public key encryption with equality test in smart city. In Proceedings of the 18th international conference on electronic business. ICEB, Guilin.

  21. Hassan, A., Elhabob, R., Ibrahim, U., & Wang, Y. (2020). Efficient public key cryptography scheme with equality test for heterogeneous systems in IIoT. In International conference on security, privacy and anonymity in computation, communication and storage, (pp. 108-121). Cham: Springer. https://doi.org/10.1007/978-3-030-68884-4_9.

  22. Sun, J., Xiong, H., Zhang, H., & Peng, L. (2020). Mobile access and flexible search over encrypted cloud data in heterogeneous systems. Information Sciences, 507, 1–15. https://doi.org/10.1016/j.ins.2019.08.026.

    Article  MathSciNet  MATH  Google Scholar 

  23. Xiong, H., Zhao, Y., Hou, Y., Huang, X., Jin, C., Wang, L., & Kumari, S. (2020). Heterogeneous signcryption with equality test for IIoT environment. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2020.3008955.

    Article  Google Scholar 

  24. Luo, M., Hu, X., & Luo, Y. (2020). An efficient cross-domain data transmission scheme for wireless body area networks. Journal of Medical Systems, 44(7), 1–13. https://doi.org/10.1007/s10916-020-01598-3.

    Article  Google Scholar 

  25. Lin, X.-J., Sun, L., & Qu, H. (2018). An efficient RSA-based certificateless public key encryption scheme. Discrete Applied Mathematics, 241, 39–47. https://doi.org/10.1016/j.dam.2017.02.019.

    Article  MathSciNet  MATH  Google Scholar 

  26. Ramanjaneyareddy, N., Reddy, P.C., & Padmavathamma, M. (2016). Study the impact of Carmichael function on RSA. In International conference on smart trends for information technology and computer communications, (pp. 119-131). Singapore: Springer. https://doi.org/10.1007/978-981-10-3433-6_90.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ming Luo.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This work is supported in part by the National Natural Science Foundation of China (Grant No. 61662046) and postgraduate innovation foundation of Nanchang University (No. YC2021-S167).

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Luo, M., Pei, Y. & Chen, A. Cross-domain encryption scheme with equality test for wireless body area networks. Wireless Netw 28, 2105–2114 (2022). https://doi.org/10.1007/s11276-022-02969-z

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-022-02969-z

Keywords

Navigation