Skip to main content
Log in

A pairing-free certificate-based key-insulated aggregate signature scheme for wireless medical sensor networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Wireless medical sensor networks (WMSNs) realize remote monitoring of patients’ health status through the combination of medical sensors and wireless communication. There is an urgent need to ensure the integrity, authenticity, authentication, and privacy of patients’ medical data and improve treatment outcomes. Currently, many aggregate signature schemes have been developed to protect patients’ medical data in WMSNs. Among them, the pairing operation and key exposure in some aggregate signature schemes can raise efficiency and security issues in medical data transmission, and some of them do not achieve equivalent security, which leads to healthcare professionals receiving inaccurate medical data. Aiming at these, this paper proposes a pairing-free certificate-based key-insulated aggregate signature scheme (CB-KIAS) in WMSNs, which introduces key-insulated technique that can effectively avoid the problem of key exposure. According to formal security proof, this scheme is unforgeable against adaptive-chosen message attacks and having the equivalent security of aggregate signature to ensure that the validity of the aggregate signature is equal to the validities of all single signatures to resist fully chosen-key attacks. The proposed CB-KIAS scheme, utilizing elliptic curves and the combination of online/offline cryptography mechanism, is effective and more suitable for resource-constrained medical sensors when compared with other related schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data availability

Not applicable.

References

  1. Wang Z, Xiong H, Zhang J, Yang S, Boukhechba M, Zhang D, Barnes LE, Dou D (2022) From personalized medicine to population health: a survey of mhealth sensing techniques. IEEE Internet Things J 9(17):15413–15434

    Article  Google Scholar 

  2. Al-Turjman F, Nawaz MH, Ulusar UD (2020) Intelligence in the internet of medical things era: A systematic review of current and future trends. Comput Commun 150:644–660

    Article  Google Scholar 

  3. Institute CRIR (2023) 2023–2029 China medical sensor market in-depth survey and industry outlook forecast report. Co-Research Industrial Research Institute

  4. Masud M, Gaba GS, Alqahtani S, Muhammad G, Gupta BB, Kumar P, Ghoneim A (2020) A lightweight and robust secure key establishment protocol for internet of medical things in COVID-19 patients care. IEEE Internet Things J 8(21):15694–15703

    Article  Google Scholar 

  5. Al Ameen M, Liu J, Kwak K (2012) Security and privacy issues in wireless sensor networks for healthcare applications. J Med Syst 36(1):93–101

    Article  Google Scholar 

  6. Subramani J, Maria A, Rajasekaran AS, Al-Turjman F (2021) Lightweight privacy and confidentiality preserving anonymous authentication scheme for WBANS. IEEE Trans Ind Informatics 18(5):3484–3491

    Article  Google Scholar 

  7. Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654

    Article  MathSciNet  Google Scholar 

  8. Shen L, Ma J, Liu X, Miao M (2016) A provably secure aggregate signature scheme for healthcare wireless sensor networks. J Medical Syst 40(11):1–10

    Article  Google Scholar 

  9. Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Blakley GR, Chaum D (eds) Advances in Cryptology, Proceedings of CRYPTO ’84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings, Lecture Notes in Computer Science, vol 196. Springer, pp 47–53

  10. Xie C, Weng J, Weng J, Hou L (2020) Scalable revocable identity-based signature over lattices in the standard model. Inf Sci 518:29–38

    Article  MathSciNet  Google Scholar 

  11. Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In: International conference on the theory and application of cryptology and information security. Springer, pp 452–473

  12. Xiong H, Mei Q, Zhao Y (2019) Efficient and provably secure certificateless parallel key-insulated signature without pairing for iiot environments. IEEE Syst J 14(1):310–320

    Article  Google Scholar 

  13. Liu J, Wang L, Yu Y (2020) Improved security of a pairing-free certificateless aggregate signature in healthcare wireless medical sensor networks. IEEE Internet Things J 7(6):5256–5266

    Article  Google Scholar 

  14. Gentry C (2003) Certificate-based encryption and the certificate revocation problem. In: International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 272–293

  15. Kang BG, Park JH, Hahn SG (2004) A certificate-based signature scheme. In: Cryptographers’ Track at the RSA Conference. Springer, pp 99–111

  16. Li J, Huang X, Mu Y, Susilo W, Wu Q (2007) Certificate-based signature: security model and efficient construction. In: European Public Key Infrastructure Workshop, Springer, pp 110–125

  17. Wu W, Mu Y, Susilo W, Huang X (2009) Certificate-based signatures revisited. J Univers Comput Sci 15(8):1659–1684

    Google Scholar 

  18. Li J, Huang X, Zhang Y, Xu L (2012) An efficient short certificate-based signature scheme. J Syst Softw 85(2):314–322

    Article  Google Scholar 

  19. Gao W, Wang G, Chen K, Wang X (2017) Generic construction of certificate-based signature from certificateless signature with provable security. Informatica 28(2):215–235

    Article  MathSciNet  Google Scholar 

  20. Liu JK, Baek J, Zhou J (2009) Certificate-based sequential aggregate signature. In: Proceedings of the second ACM conference on Wireless network security, pp 21–28

  21. Ma X, Shao J, Zuo C, Meng R (2017) Efficient certificate-based signature and its aggregation. In: International Conference on Information Security Practice and Experience. Springer, pp 391–408

  22. Verma GK, Singh B, Kumar N, Kaiwartya O, Obaidat MS (2019) PFCBAS: Pairing free and provable certificate-based aggregate signature scheme for the e-healthcare monitoring system. IEEE Syst J 14(2):1704–1715

    Article  Google Scholar 

  23. Verma GK, Singh B, Kumar N, Chamola V (2019) CB-CAS: Certificate-based efficient signature scheme with compact aggregation for industrial internet of things environment. IEEE Internet Things J 7(4):2563–2572

    Article  Google Scholar 

  24. Verma GK, Kumar N, Gope P, Singh B, Singh H (2021) SCBS: a short certificate-based signature scheme with efficient aggregation for industrial-internet-of-things environment. IEEE Internet Things J 8(11):9305–9316

    Article  Google Scholar 

  25. Zhu F, Yi X, Abuadbba A, Khalil I, Nepal S, Huang X, Yan X (2022) Certificate-based anonymous authentication with efficient aggregation for wireless medical sensor networks. IEEE Internet Things J 9(14):12209–12218

    Article  Google Scholar 

  26. Yao ACC, Zhao Y (2012) Online/offline signatures for low-power devices. IEEE Trans Inf Forensics Secur 8(2):283–294

    Article  Google Scholar 

  27. Khan MA, Rehman SU, Uddin MI, Nisar S, Noor F, Alzahrani A, Ullah I et al (2020) An online-offline certificateless signature scheme for internet of health things. J Healthc Eng 2020

  28. Liao Y, Liu Y, Liang Y, Wu Y, Nie X (2019) Revisit of certificateless signature scheme used to remote authentication schemes for wireless body area networks. IEEE Internet Things J 7(3):2160–2168

    Article  Google Scholar 

  29. Peng C, Luo M, Li L, Choo KKR, He D (2021) Efficient certificateless online/offline signature scheme for wireless body area networks. IEEE Internet Things J 8(18):14287–14298

    Article  Google Scholar 

  30. Chen X, Zhang F, Susilo W, Mu Y (2007) Efficient generic on-line/off-line signatures without key exposure. In: Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China, June 5–8, 2007. Proceedings 5. Springer, pp 18–30

  31. Dodis Y, Katz J, Xu S, Yung M (2002) Key-insulated public key cryptosystems. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 65–82

  32. Dodis Y, Katz J, Xu S, Yung M (2002) Strong key-insulated signature schemes. In: Public Key Cryptography—PKC 2003: 6th International Workshop on Practice and Theory in Public Key Cryptography Miami, FL, USA, January 6–8, 2003 Proceedings 6. Springer, pp 130–144

  33. Xiong H, Wu S, Geng J, Ahene E, Wu S, Qin Z (2015) A pairing-free key-insulated certificate-based signature scheme with provable security. KSII Trans Internet Inf Syst 9(3):1246–1259

    Google Scholar 

  34. Hwang YW, Lee Y (2021) A lightweight certificate-based aggregate signature scheme providing key insulation. Computers, Materials & Continua 69(2):1

    Article  Google Scholar 

  35. Hou Y, Xiong H, Huang X, Kumari S (2021) Certificate-based parallel key-insulated aggregate signature against fully chosen key attacks for industrial internet of things. IEEE Internet Things J 8(11):8935–8948

    Article  Google Scholar 

  36. Boneh D, Gentry C, Lynn B, Shacham H (2003) Aggregate and verifiably encrypted signatures from bilinear maps. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 416–432

  37. Wu G, Zhang F, Shen L, Guo F, Susilo W (2020) Certificateless aggregate signature scheme secure against fully chosen-key attacks. Inf Sci 514:288–301

    Article  MathSciNet  Google Scholar 

  38. Gayathri NB, Gowri T, Kumar PR, Rahman MZU, Reddy PV, Lay-Ekuakille A (2019) Efficient and secure pairing-free certificateless aggregate signature scheme for healthcare wireless medical sensor networks. IEEE Internet Things J 6(5):9064–9075

    Article  Google Scholar 

Download references

Funding

This study was supported by the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province (Grant No. SKLACSS-202311), the National Natural Science Foundation of China (U1936213, 62372285), and Shanghai Rising-Star Program (22QA1403800).

Author information

Authors and Affiliations

Authors

Contributions

Min Liu wrote the main manuscript text. Liangliang Wang, Kai Zhang, Yu Long, Baodong Qin assisted in the analysis and conducted constructive discussions. All authors reviewed the manuscript.

Corresponding author

Correspondence to Liangliang Wang.

Ethics declarations

Ethics approval

This paper does not contain any studies with human participants or animals performed by any of the authors.

Consent to publish

This manuscript is approved by all authors for publication.

Competing interests

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection: Special Issue on 2 - Track on Security and Privacy

Guest Editor: Rongxing Lu

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, M., Wang, L., Zhang, K. et al. A pairing-free certificate-based key-insulated aggregate signature scheme for wireless medical sensor networks. Peer-to-Peer Netw. Appl. 17, 685–700 (2024). https://doi.org/10.1007/s12083-023-01610-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-023-01610-w

Keywords

Navigation