用户名: 密码: 验证码:
An Asymmetric Signcryption Scheme for Cloud-Assisted Wireless Body Area Network
详细信息    查看全文
  • 关键词:Identity ; based signature ; Key ; policy attribute ; based encryption ; Signcryption ; Wireless body area network ; Cloud computing
  • 刊名:Lecture Notes in Computer Science
  • 出版年:2016
  • 出版时间:2016
  • 年:2016
  • 卷:10067
  • 期:1
  • 页码:288-296
  • 全文大小:829 KB
  • 参考文献:1.Chen, M., Gonzalez, S., Vasilakos, A., et al.: Body area networks: a survey. Mob. Netw. Appl. 16(2), 171–193 (2011)CrossRef
    2.Cordeiro, C., Fantacci, R., Gupta, S., et al.: Body area networking: Technology and applications. IEEE J. Sel. Areas Commun. 27(1), 1–4 (2009)CrossRef
    3.Kupwade, P.H., Seshadri, R.: Big data security and privacy issues in health-care. In: IEEE International Congress on Big Data, pp. 762–765 (2014)
    4.Sadiku, M.N.O., Musa, S.M., Momoh, O.D.: Cloud computing: opportunities and challenges. IEEE potentials 33(1), 34–36 (2014)CrossRef
    5.Li, M., Yu, S.C., Guttman, J.D., et al.: Secure ad hoc trust initialization and key management in wireless body area networks. Acm Trans. Sensor Netw. 9(2), 1–35 (2013)CrossRef
    6.Halperin, D., Heydt-Benjamin, T., Ransford, B., et al.: Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In: IEEE Symposium on Security and Privacy, pp. 129–142 (2008)
    7.Malasri, K., Wang, L.: Design and implementation of a secure wireless mote-based medical sensor network. Sensors 9(8), 6273–6297 (2009)CrossRef
    8.Hu, C.Q., Zhang, N., Li, H.J., et al.: Body area network security: a fuzzy attribute-based signcryption scheme. IEEE J. Sel. Areas Commun. 31(9), 37–46 (2013)CrossRef
    9.Tan, Y.L., Goi, B.M., Komiya, R., Phan, R.: Design and implementation of key-policy attribute-based encryption in body sensor network. Int. J. Cryptol. Res. 4(1), 84–101 (2013)
    10.Liu, J.W., Zhang, Z.H., Chen, X.F., et al.: Certificateless remote anonymous authentication schemes for wirelessbody area networks. IEEE Trans. Parallel Distrib. Syst. 25(2), 332–342 (2014)CrossRef
    11.Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). doi:10.​1007/​11426639_​27 CrossRef
    12.Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute based encryption for fine-grained access conrol of encrypted data. In: ACM conference on Computer and Communications Security, pp. 89–98 (2006)
    13.Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011). doi:10.​1007/​978-3-642-19379-8_​4 CrossRef
    14.Zheng, Y.: Digital signcryption or how to achieve cost(signature & encryption) \(\ll \) cost(signature) + cost(encryption). In: Kaliski Jr., B.S. (ed.) Advances in Cryptology—CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997). doi:10.​1007/​BFb0052234
    15.Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.-J.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 515–532. Springer, Heidelberg (2005). doi:10.​1007/​11593447_​28 CrossRef
    16.Wang, C.J., Huang, J.S.: Attribute-based signcryption with ciphertext-policy and claim-predicate mechanism. In: 2013 Ninth International Conference on Computational Intelligence and Security, pp. 905–909. IEEE Press (2011)
    17.Choon, J.C., Hee Cheon, J.: An identity-based signature from gap diffie-hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18–30. Springer, Heidelberg (2003). doi:10.​1007/​3-540-36288-6_​2 CrossRef
  • 作者单位:Changji Wang (17)
    Jiayuan Wu (18)
    Shengyi Jiang (17)

    17. Collaborative Innovation Center for 21st-Century Maritime Silk Road Studies, Cisco School of Informatics, Guangdong University of Foreign Studies, Guangzhou, 510006, China
    18. School of Data and Computer Science, Sun Yat-sen University, Guangzhou, 510006, China
  • 丛书名:Security, Privacy and Anonymity in Computation, Communication and Storage
  • ISBN:978-3-319-49145-5
  • 刊物类别:Computer Science
  • 刊物主题:Artificial Intelligence and Robotics
    Computer Communication Networks
    Software Engineering
    Data Encryption
    Database Management
    Computation by Abstract Devices
    Algorithm Analysis and Problem Complexity
  • 出版者:Springer Berlin / Heidelberg
  • ISSN:1611-3349
  • 卷排序:10067
文摘
Wireless body area network (WBAN) has emerged as one of the most promising technologies for e-healthcare. In recent years, cloud-assisted WBANs have attracted intensive attention from the academic and industrial communities. How to ensure data confidentiality, integrity, non-repudiation, and access control is an important and challenging issue for widespread deployment of cloud-assisted WBANs. In this paper, we introduce a new cryptographic primitive named key-policy attribute/identity-based signcryption (KP-AIBSC) scheme to address above challenge problem, which can fulfill the functionality of identity-based signature and key-policy attribute-based encryption in a logical step. We first give formal syntax and formulate security model of KP-AIBSC scheme. Next, we present a concrete KP-AIBSC construction from bilinear pairings. The proposed construction is proved to be indistinguishable against adaptive chosen plaintext attacks under the DBDH assumption and existentially unforgeable against adaptive chosen message and identity attacks under the CDH assumption in the random oracle model. Finally, we exhibit an efficient fine-grained cryptographic access framework for cloud-assisted WBANs by exploiting our proposed KP-AIBSC scheme.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700