A Multi-Message Multi-Receiver Signcryption Scheme with Edge Computing for Secure and Reliable Wireless Internet of Medical Things Communications
Abstract
:1. Introduction
1.1. Contributions
- Firstly, for an IoMT system, a multi-message and multi-receiver signcryption scheme has been proposed. In multicast channels under the Random Oracle Model (ROM), the proposed scheme guarantees confidentiality, unforgeability, and receiver anonymity.
- Secondly, for encryption and signature authentication, the proposed scheme makes use of hyperelliptic curve cryptography.
- Thirdly, we introduce a 5G architecture for IoMT with an edge computing facility.
- Finally, a thorough comparative analysis is performed to assess the performance of the proposed scheme. The findings show that the proposed scheme is efficient in terms of computation and communication costs from its counterpart schemes.
1.2. Organization of the Paper
2. Related Work
3. Preliminaries
- Hyper Elliptic Curve
- Hyper Elliptic Curve Discrete Logarithm Problem (HECDLP)
- Hyper Elliptic Curve Deffi–Helman Problem (HECDHP)
4. Network Model, Threat Model and Syntax
4.1. Network Model
4.2. Threat Model
4.3. Syntax
- Setup: A global parameter set is created by CA, then, CA selects δ and computes Υ, and sets Υ and δ is a public and private key.
- Set-Public-Variant: An entity with identity IDe chooses a random number νe, computes φe, and sends a tuple (φe,IDe) to CA.
- Set-Certificate: For an entity with identity IDe, CA selects a random number χe, calculates γe, computes a certificate CRe, calculates We and sends a tuple (We,CRe) to CA.
- Set-Public-and-Private-Key: An entity with identity IDe computes αe as a private key and computes his/her public key as βe.
- Multi-message-Multi-receiver Signcryption: A sender with identity (IDS) can take (IDS,CRS,βs,mi) as an in input and make a Multi-Message-Multi-receiver signcryption tuple ψ.
- Multi-message-Multi-receiver Un-signcryption: Each recipient with identity (IDi) can take the tuple ψ for verification of a multi-signature and for recovering multi-encryption data.
5. Proposed Scheme
- Setup: A global parameter set = {Hξ} is created by CA, where are the one-way hash functions, Hξ is a hyper elliptic curve, and is the devisor. Then, CA computes, where, and set is a public and private key.
- Set-Public-Variant: An entity with identity chooses , computes , and sends a tuple () to .
- Set-Certificate: For an entity with identity, selects calculates, computes , calculates and sends a tuple () to .
- Set-Public-and-Private-Key: An entity with identity computes as a private key and computes his/her public key as .
- Multi-message-Multi-receiver Signcryption: A sender with identity () can perform the following steps for generation of Multi-Message-Multi-receiver signcryption data.
- Choose and multiply with divisor as: .
- Compute ), where
- Make a Ciphertext as = and make a non-reversible hash value
- Compute a multi signature as and send Multi-message-Multi-receiver signcryption to the recipient group.
- Multi-message-Multi-receiver Un-signcryption: each recipient with identity () can perform the following steps for verification of multi-signature and recovering multi-encryption data.
- Calculateand)
- Compute=.
Correctness Analysis
6. Security Analysis
- (): maintains a list and initially stores and . Note that, for the hash of , the result is obtained as where (j = 1,2,3). If the requested value is not existing in then generates a new hash value for . The has access to .
- Create Entity (): if , then ς = and chooses a random number for . Further, it adds () into and () into . If is not previously added in , computes , where ℓ belongs to , then selects from , calculates , sets , and includes into . Furthermore, the values such as ,,, and are included to .
- Corrupt Entity (): If the requested value for does not belong to , calls the Create Entity () query for generating and dispatches it to .
- Multi-message-Multi-receiver Signcryption:Multi-Message-Multi-receiver Signcryption: will stop further processing, if or , otherwise search in , if the entry exists for and . If such entry is not existing in , then it calls Create Entity () and generates (,).
- wins in creating an entity query (), and its probability is .
- wins in the Multi-message-Multi-receiver Signcryption query (), and its probability is .
- processes the query () without any hurdles and its probability is .
- (): maintains a list and initially stored and . Note that, for the hash of , the result is obtained as where (j = 1,2,3). If the requested value is not existing in then generates a new hash value for . The has access to .
- Create Entity (): If is not previously added in , then we define two conditions, which are: the first condition is if , then ς = and chooses a random number for . Further, it adds () into and () into . The second condition is if is not equal to , then computes , where ℓ belongs to , then selects from , calculates , sets , and includes into . Furthermore, the values such as ,,, and are included to .
- Corrupt Entity (): If the requested value for does not belongs to , calls the Create Entity () query to generate and dispatches it to .
- Multi-message-Multi-receiver Signcryption: will stop further processing, if or , otherwise searches in , if the entry exists for and . If such entry does not exist in , then it calls Create Entity () and generates (,).
- Multi-message-Multi-receiver Un-signcryption: can check the validity of multi-ciphertext, which is basically generated by for and then it recovers the multi-plaintext.
- (): maintains a list and initially stores and . Note that for the hash of , the result obtained as where (j = 1,2,3). If the requested value does not exist in then generates a new hash value for . The has access to .
- Create Entity (): If , then ς = and chooses a random number for . Further, it adds () into and () into . If is not previously added in , computes , where ℓ belongs to , then selects from , calculates , sets , and includes into . Furthermore, the values such as ,,, and are included to .
- Corrupt Entity (): If the requested value for does not belong to , calls the Create Entity () query to generate and dispatches it to .
- Multi-message-Multi-receiver Signcryption: will stop further processing if or ; otherwise, searches in , if the entry exists for and . If such entry does not exist in , then it calls Create Entity () and generates (,).
7. Performance Comparison
8. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Alsharif, M.H.; Kelechi, A.H.; Albreem, M.A.; Chaudhry, S.A.; Zia, M.S.; Kim, S. Sixth Generation (6G) Wireless Networks: Vision, Research Activities, Challenges and Potential Solutions. Symmetry 2020, 12, 676. [Google Scholar] [CrossRef]
- Islam, S.M.R.; Kwak, D.; Kabir, H.; Hossain, M.; Kwak, K.-S. The Internet of Things for Health Care: A Comprehensive Survey. IEEE Access 2015, 3, 678–708. [Google Scholar] [CrossRef]
- Ullah, I.; AlOmari, A.; Amin, N.U.; Khan, M.A.; Khattak, H. An Energy Efficient and Formally Secured Certificate-Based Signcryption for Wireless Body Area Networks with the Internet of Things. Electronics 2019, 8, 1171. [Google Scholar] [CrossRef] [Green Version]
- Kumar, A.; Albreem, M.A.; Gupta, M.; Alsharif, M.H.; Kim, S. Future 5G Network Based Smart Hospitals: Hybrid Detection Technique for Latency Improvement. IEEE Access 2020, 8, 153240–153249. [Google Scholar] [CrossRef]
- Yin, Y.; Zeng, Y.; Chen, X.; Fan, Y. The internet of things in healthcare: An overview. J. Ind. Inf. Integr. 2016, 1, 3–13. [Google Scholar] [CrossRef]
- Woo, M.W.; Lee, J.; Park, K. A reliable IoT system for Personal Healthcare Devices. Futur. Gener. Comput. Syst. 2018, 78, 626–640. [Google Scholar] [CrossRef]
- Ullah, I.; Amin, N.U.; Khan, M.A.; Khattak, H.; Kumari, S. An Efficient and Provable Secure Certificate-Based Combined Signature, Encryption and Signcryption Scheme for Internet of Things (IoT) in Mobile Health (M-Health) System. J. Med. Syst. 2021, 45, 4. [Google Scholar] [CrossRef]
- Islam, S.H.; Khan, M.K.; Al-Khouri, A.M. Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing. Secur. Commun. Netw. 2014, 8, 2214–2231. [Google Scholar] [CrossRef]
- Amin, R.; Hafizul Islam, S.K.; Biswas, G.P.; Khan, M.K.; Kumar, N. A robust and anonymous patient monitoring system us-ing wireless medical sensor networks. Future Gener. Comput. Syst. 2018, 80, 483–495. [Google Scholar] [CrossRef]
- Mahmood, K.; Akram, W.; Shafiq, A.; Altaf, I.; Lodhi, M.A.; Islam, S.H. An enhanced and provably secure multi-factor authentication scheme for Internet-of-Multimedia-Things environments. Comput. Electr. Eng. 2020, 88, 106888. [Google Scholar] [CrossRef]
- Zheng, Y. Digital signcryption or how to achieve cost(signature & encryption) ≪ cost(signature) + cost(encryption). In Proceedings of the Smart Card Research and Advanced Applications, Santa Barbara, CA, USA, 17–21 August 1997; Springer: Berlin, Germany, 1997; pp. 165–179. [Google Scholar]
- Islam, S.H.; Li, F. Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear Pairings. Comput. J. 2015, 58, 2636–2648. [Google Scholar] [CrossRef]
- Karati, A.; Hafizul Islam, S.K.; Biswas, G.P.; Bhuiyan, M.Z.A.; Vijayakumar, P.; Karuppiah, M. Provably Secure Identi-ty-based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments. IEEE Internet Things J. 2018, 14, 3701–3711. [Google Scholar]
- He, D.; Wang, H.; Wang, L.; Shen, J.; Yang, X. Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices. Soft Comput. 2016, 21, 6801–6810. [Google Scholar] [CrossRef]
- Seo, M.; Kim, K. Electronic funds transfer protocol using domain-verifiable signcryption scheme. In Lecture Notes in Computer Science; Springer: Berlin, Germany, 2000; pp. 269–277. [Google Scholar]
- Han, Y.; Gui, X. Adaptive secure multicast in wireless networks. Int. J. Commun. Syst. 2009, 22, 1213–1239. [Google Scholar] [CrossRef]
- Qiu, J.; Bai, J.; Song, X.; Hou, S. Secure and effcient multi-message and multi-receiver ID-based signcryption for rekeying in ad hoc networks. J. Chongqing Univ. (Engl. Ed.) 2013, 2, 91–96. [Google Scholar]
- Niu, S.; Niu, L.; Yang, X.; Wang, C.; Jia, X. Heterogeneous hybrid signcryption for multi-message and multi-receiver. PLoS ONE 2017, 12, e0184407. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Qiu, J.; Fan, K.; Zhang, K.; Pan, Q.; Li, H.; Yang, Y.T. An Efficient Multi-Message and Multi-Receiver Signcryption Scheme for Heterogeneous Smart Mobile IoT. IEEE Access 2019, 7, 180205–180217. [Google Scholar] [CrossRef]
- Gao, G.; Peng, X.; Jin, L. Efficient access control scheme with certificateless signcryption for wireless body area networks. Int. J. Netw. Secur. 2019, 21, 428–437. [Google Scholar]
- Peng, C.; Chen, J.; Obaidat, M.S.; Vijayakumar, P.; He, D. Efficient and provably secure multi-receiver signcryption scheme for multicast communication in edge computing. IEEE Internet Things J. 2019, 7, 6056–6068. [Google Scholar] [CrossRef]
- Diffie, W.; Hellman, M.E. New directions in cryptography. IEEE Trans. Inf. Theory 1976, 22, 644–654. [Google Scholar] [CrossRef] [Green Version]
- Shamir, A. Identity-based cryptosystems and signature schemes. In Advances in Cryptology; Springer: Berlin, Germany, 2000; pp. 47–53. [Google Scholar]
- Al-Riyami, S.S.; Paterson, K.G. Certificateless public key cryptography. In Requirements Engineering: Foundation for Software Quality; Springer: Berlin, Germany, 2003; pp. 452–473. [Google Scholar]
- Wang, C.; Liu, C.; Li, Y.; Qiao, H.; Chen, L. Multi-message and multi-receiver heterogeneous signcryption scheme for ad-hoc networks. Inf. Secur. J. Glob. Perspect. 2017, 26, 136–152. [Google Scholar] [CrossRef]
- Pang, L.; Kou, M.; Wei, M.; Li, H. Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Secure Channel. IEEE Access 2019, 7, 84091–84106. [Google Scholar] [CrossRef]
- Pang, L.; Wei, M.; Li, H. Efficient and Anonymous Certificateless Multi-Message and Multi-Receiver Signcryption Scheme Based on ECC. IEEE Access 2019, 7, 24511–24526. [Google Scholar] [CrossRef]
- Ming, Y.; Yu, X.; Shen, X. Efficient anonymous certificate-based multi-message and multi-receiver signcryption scheme for healthcare Internet of things. IEEE Access 2020, 8, 153561–153576. [Google Scholar] [CrossRef]
- Patonico, S.; Shabisha, P.; Braeken, A.; Touhafi, A.; Steenhaut, K. Elliptic curve-based proxy re-signcryption scheme for secure data storage on the cloud. Concurr. Comput. Pr. Exp. 2020, 32, e5657. [Google Scholar] [CrossRef]
- Shamus Sofware Ltd. Miracl Library. Available online: http://github.com/miracl/MIRACL (accessed on 24 November 2021).
- Zhou, C.; Zhao, Z.; Zhou, W.; Mei, Y. Certificateless key insulated generalized signcryption scheme without bilinear pair-ings. Secur. Commun. Netw. 2017, 2017, 8405879. [Google Scholar] [CrossRef] [Green Version]
- Khan, M.A.; Ullah, I.; Kumar, N.; Oubbati, O.S.; Qureshi, I.M.; Noor, F.; Khanzada, F.U. An Efficient and Secure Certificate-Based Access Control and Key Agreement Scheme for Flying Ad-Hoc Networks. IEEE Trans. Veh. Technol. 2021, 70, 4839–4851. [Google Scholar] [CrossRef]
- Khan, M.A.; Ullah, I.; Nisar, S.; Noor, F.; Qureshi, I.M.; Khanzada, F.; Khattak, H.; Aziz, M.A. Multiaccess Edge Computing Empowered Flying Ad Hoc Networks with Secure Deployment Using Identity-Based Generalized Signcryption. Mob. Inf. Syst. 2020, 2020, 8861947. [Google Scholar] [CrossRef]
S. No | Symbol | Explanation |
---|---|---|
1 | Certificate authority | |
2 | global parameter | |
3 | ||
4 | ||
5 | Hξ | hyper elliptic curve |
6 | one way hash functions | |
7 | divisor of Hξ | |
8 | identity of sender and multi receiver respectively | |
9 | private key of sender and receivers | |
10 | public key of sender and receivers | |
11 | certificate of sender and receivers | |
12 | multi-cipher text and multi-plaintext | |
13 | encryption and decryption | |
14 | multi-encryption and multi-decryption key |
Name of Operation | SEM | SHEM |
---|---|---|
Time in milliseconds (ms) | 0.97 ms | 0.48 ms |
Schemes | Signcryption | Unsigncryption | Length of Ciphertext |
---|---|---|---|
Pang et al. [20] | (П + 1) SEM = (1 + 1) × 0.97 = 1.94 | 3 SEM = 3 × (0.97) = 2.91 | |mi| + П|2q| = |1024| + 1|2(160)| = 1344 |
Peng et al. [21] | (2 П + 1) SEM = (2 × 1 + 1) × 0.97 = 2.91 | 3 SEM = 3 × (0.97) = 2.91 | |mi| + П|4q| = |1024| + 1|4(160)| = 1664 |
Ming et al. [28] | (4 П + 1) SEM = (4 × 1 + 1) × 0.97 = 4.85 | 5 SEM = 5 × (0.97) = 4.85 | |mi| + П|2q| = |1024| + 1|2(160)| = 1344 |
Proposed | (2 П + 1) SHEM = (2 × 1 + 1) × 0.48 = 1.44 | 3 SHEM = 3 × (0.48) = 1.44 | |mi| + П|2n| = |1024| + 1|2(80)| = 1184 |
Schemes | Signcryption | Unsigncryption | Length of Ciphertext |
---|---|---|---|
Pang et al. [20] | (П + 1) SEM = (25 + 1) × 0.97 = 25.22 | 3 SEM = 3 × (0.97) = 2.91 | |mi| + П|2q| = 10|1024| + 25|2(160)| = 18,240 |
Peng et al. [21] | (2 П + 1) SEM = (2 × 25 + 1) × 0.97 = 49.47 | 3 SEM = 3 × (0.97) = 2.91 | |mi| + П|4q| = 10|1024| + 25|4(160)| = 26,240 |
Ming et al. [28] | (4 П + 1) SEM = (4 × 25 + 1) × 0.97 = 97 | 5 SEM = 5 × (0.97) = 4.85 | |mi| + П|2q| = 10|1024| + 25|2(160)| = 18,240 |
Proposed | (2 П + 1) SHEM = (2 × 25 + 1) × 0.48 = 24.48 | 3 SHEM = 3 × (0.48) = 1.44 | |mi| + П|2n| = 10|1024| + 25|2(80)| = 14,240 |
Schemes | Signcryption | Unsigncryption | Length of Ciphertext |
---|---|---|---|
Pang et al. [20] | (П + 1) SEM = (50 + 1) × 0.97 = 49.47 | 3 SEM = 3 × (0.97) = 2.91 | |mi| + П|2q| = 15|1024| + 50|2(160)| = 31,360 |
Peng et al. [21] | (2 П + 1) SEM = (2 × 50 + 1) × 0.97 = 97.97 | 3 SEM = 3 × (0.97) = 2.91 | |mi| + П|4q| = 5|1024| + 50|4(160)| = 47,360 |
Ming et al. [28] | (4 П + 1) SEM = (4 × 50 + 1) × 0.97 = 194.97 | 5 SEM = 5 × (0.97) = 4.85 | |mi| + П|2q| = 15|1024| + 50|2(160)| = 31,360 |
Proposed | (2 П + 1) SHEM = (2 × 50 + 1) × 0.48 = 48.48 | 3 SHEM = 3 × (0.48) = 1.44 | |mi| + П|2n| = 15|1024| + 50|2(80)| = 23,360 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ullah, I.; Khan, M.A.; Alkhalifah, A.; Nordin, R.; Alsharif, M.H.; Alghtani, A.H.; Aly, A.A. A Multi-Message Multi-Receiver Signcryption Scheme with Edge Computing for Secure and Reliable Wireless Internet of Medical Things Communications. Sustainability 2021, 13, 13184. https://doi.org/10.3390/su132313184
Ullah I, Khan MA, Alkhalifah A, Nordin R, Alsharif MH, Alghtani AH, Aly AA. A Multi-Message Multi-Receiver Signcryption Scheme with Edge Computing for Secure and Reliable Wireless Internet of Medical Things Communications. Sustainability. 2021; 13(23):13184. https://doi.org/10.3390/su132313184
Chicago/Turabian StyleUllah, Insaf, Muhammad Asghar Khan, Ali Alkhalifah, Rosdiadee Nordin, Mohammed H. Alsharif, Abdulaziz H. Alghtani, and Ayman A. Aly. 2021. "A Multi-Message Multi-Receiver Signcryption Scheme with Edge Computing for Secure and Reliable Wireless Internet of Medical Things Communications" Sustainability 13, no. 23: 13184. https://doi.org/10.3390/su132313184
APA StyleUllah, I., Khan, M. A., Alkhalifah, A., Nordin, R., Alsharif, M. H., Alghtani, A. H., & Aly, A. A. (2021). A Multi-Message Multi-Receiver Signcryption Scheme with Edge Computing for Secure and Reliable Wireless Internet of Medical Things Communications. Sustainability, 13(23), 13184. https://doi.org/10.3390/su132313184