Abstract
The Wireless body area network (WBAN) is a network composed of sensors communicating through wireless technology, these sensors can capture and encrypt the physiological data of the human body and transmit it to a remote cloud server for use by authorized users. However, how to retrieve and obtain the encrypted data has become a problem that must be solved. Nowadays, searchable encryption with keywords (SEK) is a widely used technology to solve this problem. Nevertheless, there are some problems that need to be noted. First, SEK is vulnerable to keyword guessing attack (KGA) and inside keyword guessing attack (IKGA). Second, since the sender and receiver are likely to work under different cryptosystems, the designed scheme should satisfy heterogeneity. Third, the communication parties in heterogeneous domain usually use different cryptographic system parameters, achieving cross-domain authentication between these communication parties can greatly improve the practicability of the scheme. To address these issues, we put forward a new searchable signcryption scheme for WBAN. Under the complexity of computational assumptions, the proposed scheme is proved to simultaneously achieve ciphertext indistinguishability, trapdoor indistinguishability, ciphertext unforgeability and the resistance of KGA and IKGA in the random oracle model (ROM). Further, our scheme allows the WBAN sensors in the certificateless public key cryptography (CLC) environment and the receivers in the public key infrastructure (PKI) environment to realize cross-domain authentication and heterogeneous communication. Compared to the five existing schemes, the total computation cost of our scheme is reduced by at least 59.99%.
Similar content being viewed by others
Data availability
No dataset was generated or analyzed during this study.
References
Arfat Y, Usman S, Mehmood R, Katib I (2020) Big data tools, technologies, and applications: a survey. In: Smart Infrastructure and Applications. Springer, Switzerland, pp 453–490. https://doi.org/10.1007/978-3-030-13705-2_19
Ashabi A, Sahibuddin, Bin S, Haghighi MS (2020) Big data: Current challenges and future scope. In: IEEE 10th Symposium on Computer Applications and Industrial Electronics (ISCAIE 2020). IEEE, pp 131–134. https://doi.org/10.1109/ISCAIE47305.2020.9108826
Ullah I, Khan MA, Alkhalifah A, Nordin R, Alsharif MH, Alghtani AH, Aly AA (2021) A multi-message multi-receiver signcryption scheme with edge computing for secure and reliable wireless internet of medical things communications. Sustain. https://doi.org/10.3390/su132313184
Ullah I, Alkhalifah A, Rehman SU, Kumar N, Khan MA (2021) An anonymous certificateless signcryption scheme for internet of health things. IEEE Access. https://doi.org/10.1109/ACCESS.2021.3097403
Sadeeq MM, Abdulkareem NM, Zeebaree SRM, Ahmed DM, Sami AS, Zebari RR (2021) IoT and cloud computing issues, challenges and opportunities: a review. Qubahan Acad J. https://doi.org/10.48161/qaj.v1n2a36
Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy. IEEE, pp 44–55. https://doi.org/10.1109/secpri.2000.848445
Abdalla M, Bellare M, Catalano D, Kiltz E, Kohno T, Lange T, Malone-Lee J, Neven G, Paillier P, Shi H (2008) Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. J Cryptol 21:350–391. https://doi.org/10.1007/s00145-007-9006-6
Priya N, Ponnavaikko M (2020) Keyword search with two-side verification in encrypted data using blockchain. In: 2020 International Conference on Computer Communication and Informatics (ICCCI 2020). IEEE, pp 1–5. https://doi.org/10.1109/ICCCI48352.2020.9104169
Das D, Amin R, Kalra S (2020) Algorithm for multi keyword search over encrypted data in cloud environment. In: 2020 International Wireless Communications and Mobile Computing (IWCMC). IEEE, pp 733–739. https://doi.org/10.1109/IWCMC48107.2020.9148472
Salmani K (2022) An efficient, verifiable, and dynamic searchable symmetric encryption with forward privacy. In: 2022 19th Annual International Conference on Privacy, Security & Trust (PST). IEEE, pp 1–10. https://doi.org/10.1109/pst55820.2022.9851964
Shi Z, Fu X, Li X, Zhu K (2020) ESVSSE: Enabling efficient, secure, verifiable searchable symmetric encryption. IEEE Trans Knowl Data Eng. https://doi.org/10.1109/tkde.2020.3025348
Najafi A, Javadi HHS, Bayat M (2021) Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full security. Multimed Tools Appl. https://doi.org/10.1007/s11042-021-10844-w
Zhang Y, Li Y, Wang Y (2020) Efficient searchable symmetric encryption supporting dynamic multikeyword ranked search. Secur Commun Netw. https://doi.org/10.1155/2020/7298518
Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques. Springer, Berlin, Heidelberg, pp 506–522. https://doi.org/10.1007/978-3-540-24676-3_30
Park DJ, Kim K, Lee PJ (2004) Public key encryption with conjunctive field keyword search. In: International Workshop on Information Security Applications. Springer, Berlin, Heidelberg, pp 73–86. https://doi.org/10.1007/978-3-540-31815-6_7
Zhang B, Zhang F (2011) An efficient public key encryption with conjunctive-subset keywords search. J Netw Comput Appl 34:262–267. https://doi.org/10.1016/j.jnca.2010.07.007
Byun JW, Rhee HS, Park HA, Lee DH (2006) Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Workshop on secure data management. Springer, Berlin, Heidelberg, pp 75–83. https://doi.org/10.1007/11844662_6
Ullah I, Zahid H, Algarni F, Khan MA (2022) An access control scheme using heterogeneous signcryption for IoT environments. Comput Mater Contin 70:4307–4321. https://doi.org/10.32604/cmc.2022.017380
Ma M, Luo M, Fan S, Feng D (2020) An efficient pairing-free certificateless searchable public key encryption for cloud-based IIoT. Wirel Commun Mob Comput. https://doi.org/10.1155/2020/8850520
Liu ZY, Tseng YF, Tso R, Mambo M (2021) Designated-ciphertext searchable encryption. J Inf Secur Appl. https://doi.org/10.1016/j.jisa.2020.102709
Baek J, Safavi-Naini R, Susilo W (2008) Public key encryption with keyword search revisited. In: International conference on Computational Science and its Applications. Springer, Heidelberg, pp 1249–1259. https://doi.org/10.1007/978-3-540-69839-5_96.
Huang Q, Li H (2017) An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf Sci (Ny). https://doi.org/10.1016/j.ins.2017.03.038
Guo J, Han L, Yang G, Liu X, Tian C (2022) An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability. J Cloud Comput. https://doi.org/10.1186/s13677-022-00287-5
Chenam VB, Ali ST (2022) A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA. Comput Stand Interfaces. https://doi.org/10.1016/j.csi.2021.103603
Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In: International Conference on the Theory and Application of Cryptology and Information Security. Springer, Berlin, Heidelberg, pp 452–473. https://doi.org/10.1007/978-3-540-40061-5_29
Zhang Y, Liu X, Lang X, Zhang Y, Wang C (2020) VCLPKES: Verifiable certificateless public key searchable encryption scheme for industrial internet of things. IEEE Access 8:20849–20861. https://doi.org/10.1109/ACCESS.2020.2968501
Cheng L, Meng F (2022) Certificateless public key authenticated searchable encryption with enhanced security model in IIoT applications. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2022.3207229
Ma M, He D, Khan MK, Chen J (2018) Certificateless searchable public key encryption scheme for mobile healthcare system. Comput Electr Eng 65:413–424. https://doi.org/10.1016/j.compeleceng.2017.05.014
Yang G, Guo J, Han L, Liu X, Tian C (2022) An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy. Peer-to-Peer Netw Appl 15:503–515. https://doi.org/10.1007/s12083-021-01253-9
He D, Ma M, Zeadally S, Kumar N, Liang K (2018) Certificateless public key authenticated encryption with keyword search for industrial internet of things. IEEE Trans Ind Inform 14:3618–3627. https://doi.org/10.1109/TII.2017.2771382
Omala AA, Ali I, Li F (2018) Heterogeneous signcryption with keyword search for wireless body area network. Secur Priv. https://doi.org/10.1002/spy2.25
Lu Y, Li J, Wang F (2021) Pairing-free certificate-based searchable encryption supporting privacy-preserving keyword search function for IIoTs. IEEE Trans Ind Informatics 17:2696–2706. https://doi.org/10.1109/TII.2020.3006474
Acknowledgements
The authors thank the anonymous reviewers for their valuable suggestions and comments.
Funding
This study was funded by the National Natural Science Foundation of China (grant number 62262041).
Ethics declarations
Ethical approval and consent to participate
Not applicable.
Consent for publication
Not applicable.
Human and animal ethics
This article does not contain any studies with human participants or animals performed by any of the authors.
Competing interests
The authors have no competing interests to declare that are relevant to the content of this article.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Luo, M., Huang, D. & Qiu, M. Cross-domain heterogeneous signcryption with keyword search for wireless body area network. Peer-to-Peer Netw. Appl. 16, 644–656 (2023). https://doi.org/10.1007/s12083-022-01417-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-022-01417-1