Skip to main content
Log in

Cross-domain heterogeneous signcryption with keyword search for wireless body area network

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

The Wireless body area network (WBAN) is a network composed of sensors communicating through wireless technology, these sensors can capture and encrypt the physiological data of the human body and transmit it to a remote cloud server for use by authorized users. However, how to retrieve and obtain the encrypted data has become a problem that must be solved. Nowadays, searchable encryption with keywords (SEK) is a widely used technology to solve this problem. Nevertheless, there are some problems that need to be noted. First, SEK is vulnerable to keyword guessing attack (KGA) and inside keyword guessing attack (IKGA). Second, since the sender and receiver are likely to work under different cryptosystems, the designed scheme should satisfy heterogeneity. Third, the communication parties in heterogeneous domain usually use different cryptographic system parameters, achieving cross-domain authentication between these communication parties can greatly improve the practicability of the scheme. To address these issues, we put forward a new searchable signcryption scheme for WBAN. Under the complexity of computational assumptions, the proposed scheme is proved to simultaneously achieve ciphertext indistinguishability, trapdoor indistinguishability, ciphertext unforgeability and the resistance of KGA and IKGA in the random oracle model (ROM). Further, our scheme allows the WBAN sensors in the certificateless public key cryptography (CLC) environment and the receivers in the public key infrastructure (PKI) environment to realize cross-domain authentication and heterogeneous communication. Compared to the five existing schemes, the total computation cost of our scheme is reduced by at least 59.99%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

Data availability

No dataset was generated or analyzed during this study.

References

  1. Arfat Y, Usman S, Mehmood R, Katib I (2020) Big data tools, technologies, and applications: a survey. In: Smart Infrastructure and Applications. Springer, Switzerland, pp 453–490. https://doi.org/10.1007/978-3-030-13705-2_19

  2. Ashabi A, Sahibuddin, Bin S, Haghighi MS (2020) Big data: Current challenges and future scope. In: IEEE 10th Symposium on Computer Applications and Industrial Electronics (ISCAIE 2020). IEEE, pp 131–134. https://doi.org/10.1109/ISCAIE47305.2020.9108826

  3. Ullah I, Khan MA, Alkhalifah A, Nordin R, Alsharif MH, Alghtani AH, Aly AA (2021) A multi-message multi-receiver signcryption scheme with edge computing for secure and reliable wireless internet of medical things communications. Sustain. https://doi.org/10.3390/su132313184

    Article  Google Scholar 

  4. Ullah I, Alkhalifah A, Rehman SU, Kumar N, Khan MA (2021) An anonymous certificateless signcryption scheme for internet of health things. IEEE Access. https://doi.org/10.1109/ACCESS.2021.3097403

    Article  Google Scholar 

  5. Sadeeq MM, Abdulkareem NM, Zeebaree SRM, Ahmed DM, Sami AS, Zebari RR (2021) IoT and cloud computing issues, challenges and opportunities: a review. Qubahan Acad J. https://doi.org/10.48161/qaj.v1n2a36

  6. Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy. IEEE, pp 44–55. https://doi.org/10.1109/secpri.2000.848445

  7. Abdalla M, Bellare M, Catalano D, Kiltz E, Kohno T, Lange T, Malone-Lee J, Neven G, Paillier P, Shi H (2008) Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. J Cryptol 21:350–391. https://doi.org/10.1007/s00145-007-9006-6

    Article  MathSciNet  MATH  Google Scholar 

  8. Priya N, Ponnavaikko M (2020) Keyword search with two-side verification in encrypted data using blockchain. In: 2020 International Conference on Computer Communication and Informatics (ICCCI 2020). IEEE, pp 1–5. https://doi.org/10.1109/ICCCI48352.2020.9104169

  9. Das D, Amin R, Kalra S (2020) Algorithm for multi keyword search over encrypted data in cloud environment. In: 2020 International Wireless Communications and Mobile Computing (IWCMC). IEEE, pp 733–739. https://doi.org/10.1109/IWCMC48107.2020.9148472

  10. Salmani K (2022) An efficient, verifiable, and dynamic searchable symmetric encryption with forward privacy. In: 2022 19th Annual International Conference on Privacy, Security & Trust (PST). IEEE, pp 1–10. https://doi.org/10.1109/pst55820.2022.9851964

  11. Shi Z, Fu X, Li X, Zhu K (2020) ESVSSE: Enabling efficient, secure, verifiable searchable symmetric encryption. IEEE Trans Knowl Data Eng. https://doi.org/10.1109/tkde.2020.3025348

    Article  Google Scholar 

  12. Najafi A, Javadi HHS, Bayat M (2021) Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full security. Multimed Tools Appl. https://doi.org/10.1007/s11042-021-10844-w

    Article  Google Scholar 

  13. Zhang Y, Li Y, Wang Y (2020) Efficient searchable symmetric encryption supporting dynamic multikeyword ranked search. Secur Commun Netw. https://doi.org/10.1155/2020/7298518

    Article  Google Scholar 

  14. Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques. Springer, Berlin, Heidelberg, pp 506–522. https://doi.org/10.1007/978-3-540-24676-3_30

  15. Park DJ, Kim K, Lee PJ (2004) Public key encryption with conjunctive field keyword search. In: International Workshop on Information Security Applications. Springer, Berlin, Heidelberg, pp 73–86. https://doi.org/10.1007/978-3-540-31815-6_7

  16. Zhang B, Zhang F (2011) An efficient public key encryption with conjunctive-subset keywords search. J Netw Comput Appl 34:262–267. https://doi.org/10.1016/j.jnca.2010.07.007

    Article  Google Scholar 

  17. Byun JW, Rhee HS, Park HA, Lee DH (2006) Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Workshop on secure data management. Springer, Berlin, Heidelberg, pp 75–83. https://doi.org/10.1007/11844662_6

  18. Ullah I, Zahid H, Algarni F, Khan MA (2022) An access control scheme using heterogeneous signcryption for IoT environments. Comput Mater Contin 70:4307–4321. https://doi.org/10.32604/cmc.2022.017380

    Article  Google Scholar 

  19. Ma M, Luo M, Fan S, Feng D (2020) An efficient pairing-free certificateless searchable public key encryption for cloud-based IIoT. Wirel Commun Mob Comput. https://doi.org/10.1155/2020/8850520

    Article  Google Scholar 

  20. Liu ZY, Tseng YF, Tso R, Mambo M (2021) Designated-ciphertext searchable encryption. J Inf Secur Appl. https://doi.org/10.1016/j.jisa.2020.102709

    Article  Google Scholar 

  21. Baek J, Safavi-Naini R, Susilo W (2008) Public key encryption with keyword search revisited. In: International conference on Computational Science and its Applications. Springer, Heidelberg, pp 1249–1259. https://doi.org/10.1007/978-3-540-69839-5_96.

  22. Huang Q, Li H (2017) An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf Sci (Ny). https://doi.org/10.1016/j.ins.2017.03.038

    Article  MATH  Google Scholar 

  23. Guo J, Han L, Yang G, Liu X, Tian C (2022) An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability. J Cloud Comput. https://doi.org/10.1186/s13677-022-00287-5

    Article  Google Scholar 

  24. Chenam VB, Ali ST (2022) A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA. Comput Stand Interfaces. https://doi.org/10.1016/j.csi.2021.103603

    Article  Google Scholar 

  25. Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In: International Conference on the Theory and Application of Cryptology and Information Security. Springer, Berlin, Heidelberg, pp 452–473. https://doi.org/10.1007/978-3-540-40061-5_29

  26. Zhang Y, Liu X, Lang X, Zhang Y, Wang C (2020) VCLPKES: Verifiable certificateless public key searchable encryption scheme for industrial internet of things. IEEE Access 8:20849–20861. https://doi.org/10.1109/ACCESS.2020.2968501

    Article  Google Scholar 

  27. Cheng L, Meng F (2022) Certificateless public key authenticated searchable encryption with enhanced security model in IIoT applications. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2022.3207229

    Article  Google Scholar 

  28. Ma M, He D, Khan MK, Chen J (2018) Certificateless searchable public key encryption scheme for mobile healthcare system. Comput Electr Eng 65:413–424. https://doi.org/10.1016/j.compeleceng.2017.05.014

    Article  Google Scholar 

  29. Yang G, Guo J, Han L, Liu X, Tian C (2022) An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy. Peer-to-Peer Netw Appl 15:503–515. https://doi.org/10.1007/s12083-021-01253-9

    Article  Google Scholar 

  30. He D, Ma M, Zeadally S, Kumar N, Liang K (2018) Certificateless public key authenticated encryption with keyword search for industrial internet of things. IEEE Trans Ind Inform 14:3618–3627. https://doi.org/10.1109/TII.2017.2771382

    Article  Google Scholar 

  31. Omala AA, Ali I, Li F (2018) Heterogeneous signcryption with keyword search for wireless body area network. Secur Priv. https://doi.org/10.1002/spy2.25

  32. Lu Y, Li J, Wang F (2021) Pairing-free certificate-based searchable encryption supporting privacy-preserving keyword search function for IIoTs. IEEE Trans Ind Informatics 17:2696–2706. https://doi.org/10.1109/TII.2020.3006474

    Article  Google Scholar 

Download references

Acknowledgements

The authors thank the anonymous reviewers for their valuable suggestions and comments.

Funding

This study was funded by the National Natural Science Foundation of China (grant number 62262041).

Author information

Authors and Affiliations

Authors

Contributions

Ming Luo and Dashi Huang wrote the main manuscript text. Minrong Qiu prepared Tables 1, 2, 3, 4, and 5 and Figs. 1 and 2. All authors reviewed and approved the final version of the manuscript.

Corresponding author

Correspondence to Ming Luo.

Ethics declarations

Ethical approval and consent to participate

Not applicable.

Consent for publication

Not applicable.

Human and animal ethics

This article does not contain any studies with human participants or animals performed by any of the authors.

Competing interests

The authors have no competing interests to declare that are relevant to the content of this article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Luo, M., Huang, D. & Qiu, M. Cross-domain heterogeneous signcryption with keyword search for wireless body area network. Peer-to-Peer Netw. Appl. 16, 644–656 (2023). https://doi.org/10.1007/s12083-022-01417-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-022-01417-1

Keywords

Navigation