Advanced Search
    Yang Xiaodong, Zhou Hang, Ren Ningning, Yuan Sen, Wang Caifen. Aggregate Signcryption Scheme Supporting Multi-Ciphertext Equality Test for Wireless Body Area Network[J]. Journal of Computer Research and Development, 2023, 60(2): 341-350. DOI: 10.7544/issn1000-1239.202110775
    Citation: Yang Xiaodong, Zhou Hang, Ren Ningning, Yuan Sen, Wang Caifen. Aggregate Signcryption Scheme Supporting Multi-Ciphertext Equality Test for Wireless Body Area Network[J]. Journal of Computer Research and Development, 2023, 60(2): 341-350. DOI: 10.7544/issn1000-1239.202110775

    Aggregate Signcryption Scheme Supporting Multi-Ciphertext Equality Test for Wireless Body Area Network

    • Wireless body area network (WBAN) technology has the characteristics of low latency and high flexibility, and has broad application prospects in the fields of health care, disease monitoring, emergency rescue and so on. However, the existing cryptography schemes for wireless body area network have too much overhead in certificate management, and do not meet the requirements of multi-user retrieval and multi-ciphertext equality test. In order to satisfy these applications, an aggregate signcryption scheme supporting multi-ciphertext equality test in multi-user environment for wireless body area network is proposed. The identity-based signcryption system eliminates the problem of certificate management in the traditional public key cryptography scheme, and ensures the confidentiality and authentication of the medical data. The technology of aggregate signcryption is used to reduce the computation overhead of verification in multi-user environment. By introducing the technology of multi-ciphertext equality test, our scheme realizes that multiple data users can safely retrieve multiple medical ciphertexts at the same time, which improves the efficiency of ciphertext retrieval in multi-user environment. Under the random oracle model, the proposed scheme is proved to achieve one-way against adaptive chosen ciphertext attack based on the computational Diffie-Hellman problem. Compared with the similar schemes, the proposed scheme supports more security properties and has lower computational overhead.
    • loading

    Catalog

      Turn off MathJax
      Article Contents

      /

      DownLoad:  Full-Size Img  PowerPoint
      Return
      Return