Multi-receiver Certificateless Searchable Public Key Encryption Scheme for IoMT

被引:0
作者
Liu, Xiaoguang [1 ,2 ,3 ]
Liu, Peize [1 ,2 ,4 ]
Yang, Bo [1 ,2 ,4 ]
Chen, Yizhan [1 ,2 ,4 ]
Wang, Ziqing [2 ,5 ]
机构
[1] Southwest Minzu Univ, State Ethn Affairs Commiss, Key Lab Comp Syst, Chengdu 610041, Sichuan, Peoples R China
[2] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Guangxi, Peoples R China
[3] Southwest Minzu Univ, Sch Math, Chengdu 610041, Sichuan, Peoples R China
[4] Southwest Minzu Univ, Sch Comp Sci & Engn, Chengdu 610041, Sichuan, Peoples R China
[5] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Sichuan, Peoples R China
来源
FRONTIERS IN CYBER SECURITY, FCS 2024, PT I | 2024年 / 2315卷
关键词
Multi-Receiver; Certificateless; Searchable Public Key Encryption; IoMT; Proxy Re-Encryption; KEYWORD SEARCH; INTERNET; PRIVACY; SECURE; SERVER; THINGS;
D O I
10.1007/978-981-96-0151-6_32
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Medical Things (IoMT) is widely used in the medical industry. It uses various wearable medical devices and cloud servers to transfer data at high speeds over the network, significantly improving diagnostic efficiency. Searchable encryption has been proposed to keep sensitive information confidential. It helps to protect private data by encrypting it and allows for searching of encrypted data. Recently, many searchable public key encryption (SPE) schemes have been designed to balance security and efficiency. However, most existing SPE schemes have shortcomings, such as certificate management problem, key escrow problem, or the inability to realize multireceiver data sharing flexibly. To solve the above problems, we designed a multi-receiver certificateless searchable public key encryption (mCLSPE) scheme based on SPE and proxy re-encryption for IoMT. In the random oracle model, the scheme is proved to be secure. The performance analysis shows that it has an ideal comprehensive performance.
引用
收藏
页码:508 / 526
页数:19
相关论文
共 30 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3621, P205
[2]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[3]   Secure and lightweight multi user searchable encryption scheme [J].
Andola, Nitish ;
Prakash, Sourabh ;
Venkatesan, S. ;
Verma, Shekhar .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 35 (02) :1239-1251
[4]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[5]  
Baek J, 2005, LECT NOTES COMPUT SC, V3386, P380
[6]  
Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
[7]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[8]   A Survey of Provably Secure Searchable Encryption [J].
Bosch, Christoph ;
Hartel, Pieter ;
Jonker, Willem ;
Peter, Andreas .
ACM COMPUTING SURVEYS, 2015, 47 (02)
[9]   A designated tester-based certificateless public key encryption with conjunctive keyword search for cloud-based MIoT in dynamic multi-user environment [J].
Chenam, Venkata Bhikshapathi ;
Ali, Syed Taqi .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 72
[10]   A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA [J].
Chenam, Venkata Bhikshapathi ;
Ali, Syed Taqi .
COMPUTER STANDARDS & INTERFACES, 2022, 81