An improved lightweight certificateless generalized signcryption scheme for mobile-health system

The mobile-health system, also known as the wireless body area network for remote patient monitoring, is a system used to remotely monitor the human body’s health status parameters in real time. The generalized signcryption can realize encryption, signature, and signcryption with only one key pair and one algorithm. To address the communication security requirement for the mobile-health system, Zhang et al. recently proposed a lightweight secure data transmission protocol for the mobile-health system, which uses a certificateless generalized signcryption scheme. However, Zhang et al.’s certificateless generalized signcryption scheme is insecure. In this article, we propose an improved certificateless generalized signcryption scheme and then give a rigorous security proof of it. The confidentiality of our improved scheme can be reduced to the computational Diffie–Hellman problem, and the unforgeability, the Elliptic Curve Discrete Logarithm problem. Performance evaluation shows that our scheme has only slightly increased computational and communicational costs compared with the original scheme, but it is more efficient than other certificateless generalized signcryption schemes existing at present. What is more, it is also an efficient scheme compared with those ones protecting the mobile-health system. Based on our scheme, the same lightweight secure data transmission protocol for the mobile-health system can also be constructed, just like the one based on the original scheme.

[1]  Hu Xiong,et al.  Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol , 2014, IEEE Transactions on Information Forensics and Security.

[2]  Xiaoyuan Yang,et al.  ECGSC: Elliptic Curve Based Generalized Signcryption , 2006, UIC.

[3]  Sandeep K. S. Gupta,et al.  Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..

[4]  Satyanarayana Vollala,et al.  High-radix Modular Exponentiation for hardware implementation of Public-Key Cryptography , 2016, 2016 International Conference on Computing, Analytics and Security Trends (CAST).

[5]  Yanmei Zhang,et al.  New Authentication Scheme for Wireless Body Area Networks Using the Bilinear Pairing , 2015, Journal of Medical Systems.

[6]  Yiliang Han,et al.  Adaptive secure multicast in wireless networks , 2009, Int. J. Commun. Syst..

[7]  Maged Hamada Ibrahim,et al.  Secure anonymous mutual authentication for star two-tier wireless body area networks , 2016, Comput. Methods Programs Biomed..

[8]  Chao Yang,et al.  A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth , 2016, Journal of Medical Systems.

[9]  Caixue Zhou,et al.  Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings , 2017, Secur. Commun. Networks.

[10]  Xiong Li,et al.  An enhanced 1-round authentication protocol for wireless body area networks with user anonymity , 2017, Comput. Electr. Eng..

[11]  Albert Levi,et al.  A Survey on the Development of Security Mechanisms for Body Area Networks , 2014, Comput. J..

[12]  Caixue Zhou Comments on “Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems” , 2018, IEEE Transactions on Information Forensics and Security.

[13]  Cai-Xue Zhou An Improved Multi-Receiver Generalized Signcryption Scheme , 2015 .

[14]  Rongxing Lu,et al.  Obtain confidentiality or/and authenticity in Big Data by ID-based generalized signcryption , 2015, Inf. Sci..

[15]  Yu-Fang Chung,et al.  Secure user authentication scheme for wireless healthcare sensor networks , 2017, Comput. Electr. Eng..

[16]  Sunder Lal,et al.  An efficient identity based generalized signcryption scheme , 2011, Theor. Comput. Sci..

[17]  Bogdan Warinschi,et al.  Secure Proxy Signature Schemes for Delegation of Signing Rights , 2010, Journal of Cryptology.

[18]  Dong-Yuan Shi,et al.  Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks , 2014, Inscrypt.

[19]  Han Yiliang,et al.  Attribute based generalized signcryption for online social network , 2015, 2015 34th Chinese Control Conference (CCC).

[20]  Caixue Zhou,et al.  Identity Based Generalized Proxy Signcryption Scheme , 2016, Inf. Technol. Control..

[21]  Tal Rabin,et al.  On the Security of Joint Signature and Encryption , 2002, EUROCRYPT.

[22]  Caixue Zhou,et al.  Provable certificateless generalized signcryption scheme , 2014, Des. Codes Cryptogr..

[23]  Zhiguang Qin,et al.  Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks , 2015, IEEE Transactions on Information Forensics and Security.

[24]  Aiqing Zhang,et al.  SeDS: Secure Data Sharing Strategy for D2D Communication in LTE-Advanced Networks , 2016, IEEE Transactions on Vehicular Technology.

[25]  Sherali Zeadally,et al.  Anonymous Authentication for Wireless Body Area Networks With Provable Security , 2017, IEEE Systems Journal.

[26]  Xiaodong Lin,et al.  Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems , 2009, IEEE Journal on Selected Areas in Communications.

[27]  Rong Sun,et al.  1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks , 2016, Sensors.

[28]  Zhenguo Zhao,et al.  An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem , 2014, Journal of Medical Systems.

[29]  Aiqing Zhang,et al.  Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems , 2017, IEEE Transactions on Information Forensics and Security.

[30]  Mihir Bellare,et al.  Multi-signatures in the plain public-Key model and a general forking lemma , 2006, CCS '06.

[31]  Zongmin Cui,et al.  Efficient Identity-Based Generalized Ring Signcryption Scheme , 2016, KSII Trans. Internet Inf. Syst..

[32]  Zongmin Cui,et al.  Certificateless Signcryption in the Standard Model , 2017, Wirel. Pers. Commun..

[33]  Fagen Li,et al.  Efficient Certificateless Access Control for Wireless Body Area Networks , 2016, IEEE Sensors Journal.

[34]  Fagen Li,et al.  An Efficient Remote Authentication Scheme for Wireless Body Area Network , 2017, Journal of Medical Systems.

[35]  Chunhua Jin,et al.  Identity-based deniable authenticated encryption and its application to e-mail system , 2015, Telecommunication Systems.

[36]  王春枝,et al.  New Authentication Scheme for Wireless Body Area Networks Using the Bilinear Pairing , 2015 .

[37]  Yi Mu,et al.  Malicious KGC attacks in certificateless cryptography , 2007, ASIACCS '07.

[38]  Hung-Ming Chen,et al.  An Authentication Protocol for Ubiquitous Health Monitoring Systems , 2013 .

[39]  Gang Yu,et al.  Provable secure identity based generalized signcryption scheme , 2010, Theor. Comput. Sci..

[40]  Sheng Zhong,et al.  Body sensor network security: an identity-based cryptography approach , 2008, WiSec '08.

[41]  Fagen Li,et al.  A Provably-Secure Transmission Scheme for Wireless Body Area Networks , 2016, Journal of Medical Systems.

[42]  Jing Liu,et al.  Attribute-Based Ring Signcryption Scheme and Its Application in Wireless Body Area Networks , 2015, ICA3PP.

[43]  Chunhua Jin,et al.  Certificateless online/offline signcryption for the Internet of Things , 2015, Wireless Networks.

[44]  Dong Hoon Lee,et al.  A Privacy-Strengthened Scheme for E-Healthcare Monitoring System , 2012, Journal of Medical Systems.

[45]  Kyung Sup Kwak,et al.  Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[46]  Pardeep Kumar,et al.  A User Authentication for Healthcare Application Using Wireless Medical Sensor Networks , 2011, 2011 IEEE International Conference on High Performance Computing and Communications.

[47]  Abbas Jamalipour,et al.  Wireless Body Area Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[48]  Xiong Li,et al.  Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks , 2017, Comput. Networks.

[49]  Srinivas Sampalli,et al.  A security suite for wireless body area networks , 2012, ArXiv.

[50]  Xu An Wang,et al.  Provable Secure Generalized Signcryption , 2007, IACR Cryptol. ePrint Arch..