Efficient Certificateless Signcryption Scheme for Wireless Sensor Networks in Ubiquitous Healthcare Systems

被引:10
作者
Kasyoka, Philemon Nthenge [1 ,2 ]
Kimwele, Micheal [2 ]
Mbandu, Shem Angolo [3 ]
机构
[1] Jomo Kenyatta Univ Agr & Technol, Sch Comp & Informat Technol, POB 62000-00200, Nairobi, Kenya
[2] South Eastern Kenya Univ, Sch Informat & Commun Technol, POB 170-90200, Kitui, Kenya
[3] Cooperat Univ Kenya, Sch Comp & Math, POB 24814-00502, Nairobi, Kenya
关键词
Certificateless; Healthcare monitoring; Signcryption; Wireless body area network; Sensor networks;
D O I
10.1007/s11277-021-08183-y
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
With the current developments in wireless networks, the use of Wireless sensor networks (WSNs) in the medical field has attracted a lot of attention. WSNs are being used to collect and transmit patient physiological information in ubiquitous healthcare systems. One of the major challenges in healthcare systems is security and privacy of patients' vital data. By its very nature, a wireless sensor network provides a resource constrained environment and sensor nodes used in WSNs are limited in terms resource usage. Keeping data secure in a resource constraint environment is an important and challenging task. Hence, the need for secure and more efficient cryptosystems. In this paper, we are proposing a secure pairing-free certificateless signcryption scheme for use in ubiquitous healthcare systems. We compare the efficiency of our proposed scheme with other related signcryption schemes. A formal security proof for indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack for our scheme is presented in random oracle model.
引用
收藏
页码:3349 / 3366
页数:18
相关论文
共 47 条
[1]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]  
Alharbi K, 2016, IEEE GLOB COMM C GLO, V2016, P1, DOI [10.1109/GLOCOM.2016.7841770, DOI 10.1109/GLOCOM.2016.7841770]
[3]  
[Anonymous], 2006, TRANSD C DISTR DIAGN
[4]  
[Anonymous], 2011, 13 INT C ADV COMM TE
[5]  
Barreto PSLM, 2005, LECT NOTES COMPUT SC, V3788, P515
[6]  
Barreto PSLM, 2004, J CRYPTOL, V17, P321, DOI [10.1007/s00I45-004-03U-z, 10.1007/s00145-004-0311-z]
[7]  
Bellare M, 1996, LECT NOTES COMPUT SC, V1070, P399
[8]  
Bertino, 2015, ASIA CCS 15
[9]   Refinements of Miller's algorithm for computing the Weil/Tate pairing [J].
Blake, IF ;
Murty, VK ;
Xu, GW .
JOURNAL OF ALGORITHMS-COGNITION INFORMATICS AND LOGIC, 2006, 58 (02) :134-149
[10]  
Blum Manuel, 2019, Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, P227