Skip to main content
Journal of Healthcare Engineering logoLink to Journal of Healthcare Engineering
. 2020 Dec 31;2020:6654063. doi: 10.1155/2020/6654063

An Online-Offline Certificateless Signature Scheme for Internet of Health Things

Muhammad Asghar Khan 1, Sajjad Ur Rehman 2, M Irfan Uddin 3, Shibli Nisar 4, Fazal Noor 5, Ali Alzahrani 5, Insaf Ullah 1,
PMCID: PMC7790548  PMID: 33489059

Abstract

The Internet of Health Things (IoHT) is an extended breed of the Internet of Things (IoT), which plays an important role in the remote sharing of data from various physical processes such as patient monitoring, treatment progress, observation, and consultation. The key benefit of the IoHT platform is the ease of time-independent interaction from geographically distant locations by offering preventive or proactive healthcare services at a lower cost. The communication, integration, computation, and interoperability in IoHT are provided by various low-power biomedical sensors equipped with limited computational capabilities. Therefore, conventional cryptographic solutions are not feasible for the majority of IoHT applications. In addition, executing computing-intensive tasks will lead to a slow response time that can deteriorate the performance of IoHT. We strive to resolve such a deficiency, and thus a new scheme has been proposed in this article, called an online-offline signature scheme in certificateless settings. The scheme divides the signing part into two phases, i.e., online and offline. In the absence of a message, the offline phase performs computationally intensive tasks, while lighter computations are executed in the online phase when there is a message. Security analyses and comparisons with the respective existing schemes are carried out to show the feasibility of the proposed scheme. The results obtained authenticate that the proposed scheme offers enhanced security with lower computational and communication costs.

1. Introduction

IoHT is an IoT submarket, capable of grouping all medical devices and applications for gathering, analyzing, and exchanging physiological data of patients over the Internet [1]. Patient data can be collected through biomedical sensors and processed via user terminal devices such as computers, smart phones, smart watches, or even a specific embedded device [2]. Patient data may include breathing rate, blood pressure, chest sound, body temperature, respiratory rate, electrocardiogram (ECG), patient position (accelerometer), etc. [37]. In addition to medical applications, IoHT can also be used to monitor environmental conditions such as patient-care venues, room status, laboratory shift times, treatment times, and staff-to-patient ratios. The user terminal devices are linked to a gateway via short-range wireless technologies such as Bluetooth Low Energy (BLE), Wi-Fi, and Zigbee. The BLE, however, uses strong features such as moderate data rate, low-power consumption, and unlicensed band, making them the most preferable options for connecting wearable sensor nodes. The gateway may be further connected to a (clinical) server or cloud services via fifth-generation (5G) wireless link for high storage and intensive data processing. In a health information system, patient details can be maintained as electronic health records, which are available to the medical professionals when the patient visits the hospital.

Since a large scale of interactions between biomedical sensors and mobile devices is undertaken on an open wireless channel in IoHT environment, which poses a range of challenges, the most significant of which is the security and privacy of health-related information of patients [8]. To steal or fabricate patient health-related information, an intruder may capture the communication between the sensors and mobile devices. Likewise, with high probability, the attacker may gain access to the disease or health status of the patient. In addition, most devices involved in the IoHT platform have limited computing capabilities and, consequently, fail to perform conventional cryptographic calculations. For example, heavy computations are needed for most of the public key cryptosystems proposed in the literature; therefore, their implementation has not been considered acceptable for IoHT devices. An online-offline approach can be used to address heavy computation issues. When the IoHT devices have reported a message, the online phase is used to perform light computations only, while the offline computations or heavy computations are performed if no message has been recorded by the IoHT devices. Authentication is a major concern for securing IoHT devices. In general, the digital signature is used for authentication in cryptography. Therefore, the digital signature can be used with the online-offline approach for securing IoHT devices. The offline-computed signature value is generated in the offline phase, while the online phase operates with the same offline signature value.

The two basic methods used to validate the public keys are Identity-Based Cryptography (IBC) and Public Key Infrastructure (PKI) in public key cryptosystems. This includes a Certificate Authority (CA) signature, which provides a unique signature link [9]. The CA specifies the public keys with the certificates as defining a participant. However, shortcomings such as distribution, storage, and manufacturing difficulties are associated with PKI systems. Instead, IBC is suggested to decrease the cost of public-key management [10]. The trusted Private Key Generator (PKG) has first-hand data about the participants' private keys with the expense of private key escrow issues [11, 12]. Therefore, certificateless cryptosystem can be used with the signature scheme to accommodate the key escrow problem.

Some computationally hard problems, such as bilinear pairing, Rivest–Shamir–Adleman (RSA), and elliptic curve cryptosystems, usually measure the efficiency of signature schemes. The RSA cryptosystem [13, 14] uses a large key of 1024 bits [15]. Likewise, due to the massive pairing and map-to-point function computation, bilinear pairing is 14.31 times lower than RSA [16]. Similarly, in order to remove the shortcomings of RSA and bilinear pairing, the elliptic curve was introduced [17]. The security hardness and efficiency of elliptic curve cryptography are based on 160-bit keys compared to bilinear pairing and RSA [18]. Despite this, for resource-hungry devices, the 160-bit key is also undesirable and not affordable. Therefore, a new form, the generalization of the elliptic curve, called the hyperelliptic curve was thus suggested [19]. The hyperelliptic curve offers the same degree of protection as the elliptic curve, bilinear pairing, and RSA using 80-bit keys, identity, and certificate size [20, 21]. For energy-constrained IoHT devices, the hyperelliptic curve would be a better option. Therefore, the data generated by the anticipated massive number of biomedical sensors and IoT devices would need to be collected, processed, and analyzed efficiently in real-time to ensure safe and timely management of patient health [22].

Considering the above objectives, a new scheme, called the online-offline certificateless signature scheme, has been introduced for IoHT. The scheme uses the concept of the hyperelliptic curve and is characterized by the small key size. In comparison, it is uncompromisingly identical to the solutions introduced by the elliptical curve method with half key size.

The research study conducted has the following excellent characteristics:

  1. A lightweight security scheme, namely, online-offline certificateless signature, has been proposed for an IoHT platform.

  2. The proposed scheme divides the certificateless signature scheme into two phases, i.e., online and offline. Lighter computations are performed when there is a message in the online phase, while the offline phase performs computing-intensive tasks in the absence of a message.

  3. The scheme uses the hyperelliptic curve cryptography that tackles the limitations faced by IoHT devices such as limited energy and computing capabilities.

  4. The proposed scheme has shown to be immune to numerous attacks through formal security analysis.

  5. Our approach offers better efficiency in terms of computational cost and communication overhead when compared to the existing equivalent schemes.

1.1. Structure of the Paper

The rest of the article is structured as follows. In Section 2, the relevant work is discussed. Section 3 includes preliminaries. The proposed online-offline certificateless signature system is introduced in Section 4. Security analysis can be found in Section 5. The cost analysis is provided in Section 6 with current solutions. Concluding remarks are available in Section 7.

2. Related Work

In scientific literature, the security and privacy concerns using the online-offline approach have not received ample consideration. Thus, the problems need to be thoroughly investigated. A well-designed security framework would greatly minimize the risk of the data being hacked, regardless of the devilish strategy involved. Some research studies are devoted to addressing IoHT platform data security problems.

The offline-online signature technique was first suggested by Even et al. [23], which is suitable for limited-storage devices. When the message to be signed is known, the execution of their procedure enables the use of the offline mechanism to do moderate computations. After the message is understood to be authenticated, the second phase is carried out electronically. The protection of their method is dependent on the intractability of the large integer factoring mechanism. Their device is protected by chosen messages from attacks. However, their approach is not so successful in practice.

In 2001, to create an effective online-offline signature scheme, Shamir and Tauman [24] used chameleon hash functions based on an ordinary digital signature. In the proposed scheme, the key scale and signature sizes are reduced according to the original scheme. A new type of hash function, called the trapdoor hash function, has been introduced in their model to increase the system security. If the signer repeatedly uses the same hash value to get two signatures on two distinct messages, the recipient can gain a hash collision and use it to retrieve trapdoor information from the signer, which is the secret key of the signer. However, the proposed scheme uses many chameleon hash values for various messages. The main disclosure issue of chameleon hashing is known as this concern.

Yu and Tate [25] suggested an effective online-offline signature scheme that is known to be secure without a random oracle under the RSA assumption. They did not use the hash function at the trapdoor. Therefore, the second key pair did not need to be handled by their scheme and did not have to include in their signature the random commitment attribute. However, the proposed scheme is not affordable for resource-constrained IoHT devices due to the RSA cryptosystem, which is based on hard problems and incurs the high computational cost. Wu et al. [26], using bilinear pairing, suggested a successful online-offline signature scheme. The security of the model is connected to the theoretical Diffie–Hellman assumption in the random oracle model. Addobea et al. [27] also proposed an offline-online signature scheme called the MHCOOS for M-Health devices based on bilinear pairing. However, bilinear pairing involves high pairing and map-to-point function operations, which is not suitable for resource-constrained IoHT devices.

All of the above schemes are based on complex cryptographic techniques, i.e., elliptic curve and bilinear pairing, and thus suffer from high costs of computation and communication overhead. These schemes are thus not compatible with IoHT systems equipped with minimal computing capability. To create a viable IoHT cryptographic solution that needs less computation, there is a critical need to use the state-of-the-art online-offline certificateless signature technique. Our proposed scheme is based on hyperelliptic curve cryptography, which is an advanced version of the elliptic curve. It provides the same degree of protection with the smaller key size as compared to an elliptical curve, bilinear pairing, and modular exponential.

3. Preliminaries

3.1. Hyperelliptic Curve Discrete Logarithm Problem (HCDLP)

Suppose a given instance of hyperelliptic curve δ = ε. Then, the HCDLP is to determine ε from the given instance.

3.2. Threat Model

The security models of the proposed scheme include message c, unforgeability against the adversaries called Type 1 adversary (A1), and Type 2 adversary (A2), respectively. A1 is a malicious adversary who has the ability to replace the user's public key besides the system master keys, while A2 means an honest-but-curious KGC who knows the system master keys but is not allowed to replace the user's public key. The specific security models under different adversaries are as same as [28] such that unforgeability regarding EUF-CMA-A1 and unforgeability regarding EUF-CMA-A2.

4. Proposed Online-Offline Certificateless Signature Scheme

4.1. Network Model

An initiative to incorporate the proposed scheme must be preceded by careful consideration of the following assumptions:

  1. Patient data input can be obtained by sensors and analyzed by user terminal devices, such as laptops, tablets, smart watches, or even a particular embedded system

  2. Each of the medical sensors and the user terminal are connected through BLE

  3. The user terminal can be further linked with the cloud server using 5G, equipped with cloud computing services

  4. The medical server presumes the role of administrators

  5. The medical server is linked with the local computer in which electronic health records (HER) can be viewed by the medical personnel

  6. The HER is stored securely in the database server for future consultations

IoHT can be implemented in various settings, depending on the requirements as shown in Figure 1. The required gadgets are usually included in the medical sensors according to the patient's illness. Using short-range radio transceivers (i.e., BLE), the sensors can be connected with the gateway router. On a frequency band of 2.4 GHz, the BLE works. There are valid reasons for selecting this level of technology. They function, for example, in the unlicensed spectrum and provide fair data rates and consume very low power [29]. The aggregated data from the patient monitoring sensors may be too big to be handled by the local server. It demands a high ability for storage and computing. Fortunately, with its architecture, the emerging fifth-generation (5G) mobile networking introduces multiaccess edge computing (MEC) facility. MEC performs high storage and intensive processing facilities when integrated into an IoHT setting.

Figure 1.

Figure 1

Sample network model of IoHT system.

4.2. Construction of the Proposed Scheme

This section covers the construction of the proposed scheme. Notations used in the proposed scheme are illustrated in Table 1. The proposed scheme can be made from the following computational constructions [28]:

  •   Setup: the following computations can be used for this phase:

  • (i) The security parameter η can choose by KGC

  • (ii) It selects a hyperelliptic curve (𝒽𝒸) with field f(n), where the size of n ≥ 280

  • (iii) Select a 𝒟 devisor from hyperelliptic curve (𝒽𝒸)

  • (iv) Then, choose three irreversible and collision resistance hash functions hx,  hy,  and hz

  • (v) KGC picks 𝒬  ∈  {1,2,…,  n − 1} as a master key and then computes the public key as 𝒦=𝒬 · 𝒟

  • (vi) KGC produces ψ = {𝒦, ℎ𝑥, ℎ𝑦, ℎ𝑧, 𝒟, 𝒽𝒸, (𝑛), 𝑛≥280 as global parameter set and publishes it publicly

  •   Secret value setting: the participating entity with identity idi picks li  ∈  {1,2,…,  n − 1}as a secret value and computes 𝒱i = li · 𝒟 as a public key

  •   Partial private key setting: for a participating entity with identity idi, the KGC picks ϑi  ∈  {1,2,…,  n − 1}, computes μi = ϑi · 𝒟, calculates 𝓌𝑖, = ϑi+𝒬hx(idi, 𝒱i, μi), and sends Γi= (𝓌𝑖,𝜇𝑖) to entity with idi via secure network

  •   Private key setting: the participating entity, with identity idi, sets 𝒩i=(Γi, li)of its private key.

  •   Public key setting: the participating entity, with identity idi, sets𝒵i=(𝒱i, μi) of its public key.

  •   Certificateless online/offline signature: the sender computations can be divided into the following two substeps, e.g., Online and Offline.

  •   Offline phase: this part will be run over the server that is equipped with high resources and the construction step is carried out as follows:

  • (i) It picks ∈ {1,2,…,  n − 1} and computes 𝓉= = 𝒹·𝒱s

  •   (ii)Compute 𝒫=ℎ𝑦 (𝑖𝑑𝑠, 𝜇𝑠, 𝑚, 𝓉) and 𝒳=ℎ𝑧 (𝑖𝑑𝑠, 𝒱𝑠, 𝑚, 𝓉)

  • (iii) Then, it gives (𝒹, 𝓉, 𝒫, 𝒳) to the sensor nodes

  •   Online phase: this part will be run on the sensor nodes and the construction step consists as follows:

  •   (i)Compute 𝒮= ls·𝒹−(ls · 𝒳 + 𝒫 ·  𝓌𝑠)

  • (ii) Set ϕ=(t, S) as a signature and send it to the receiver

  •   Certificateless online/offline signature verification: upon reception ϕ, a receiver can verify 𝒮 as follows:

  • (i) Compute P=hy(ids, μs, m, t) and χ=hz(ids, 𝒱s, m, t)

  • (ii) Then, it checks if  S · D=t · χ𝒱s𝒫(μs+hx(ids, 𝒱s, μs)𝒦) holds

Table 1.

Notations used.

Notation Description
η It represents a security parameter
𝒽𝒸 It represents a hyperelliptic curve
f(n) It represents a finite field of  n
n It represents a large prime number belonging to hyperelliptic curve where the size of n ≥ 280
𝒟 Divisor on the hyperelliptic curve (𝒽𝒸)
𝒬 Master private key of the system
𝒦 Master public key of the system
ψ It represents a global parameter set that can be available publicly in a network
id s, idr Identity of sender and receiver
Γs,  Γr They represent partial private key pair for sender and receiver
𝒩 s,  𝒩r They represent private key pair for sender and receiver
𝒵s, 𝒵r They represent public key pair for sender and receiver
𝒮 Its represents signature
ϕ It represents signature pair
h x, hy, hz Three irreversible and collision resistance hash functions
It represents null

4.3. Correctness

The verifier/receptionist can verify the signature if the following computation is successfully processed:

So, if P=hy(ids, μs, m, t) and X=hz(ids, 𝒱s, m, t), we acquire

S.D=ls·dls·X+P·wsD=ls·d·Dls·X+P·wsD=Vs·dls·X+P·wsD=tls·XDP.wsD=tls·X·DP·wsD=tVs·XP·ϑs+Qhxids,Vs,μsD=tVs·XP·ϑs.D+Q·Dhxids,Vs,μs=tVs·XP·ϑs·D+Q·Dhxids,Vs,μs=tVs.XP·μs+hxids,Vs,μsK· (1)

This validates the correctness of the proposed scheme.

5. Security Analysis

The purpose of this section is to explain the usefulness of the suggested method in resisting attacks.

Theorem 1 . —

The proposed scheme resists against an adaptive chosen message attack, if an adversary A1would not be able to solve the hyperelliptic curve discrete logarithm problem (HECDLP).

Proof —

Suppose there is a challenger ζ which helps A1 to extract   from the given instance f= · 𝒟 of HECDLP. Further, to figure out HECDLP, ζ can set the master key secret key as 𝒬= and master public key as 𝒦= · 𝒟. Then, ζ generates ψ as a global parameter set and four empty lists (Lhx, Lhy, Lhz, Lk) for holding the value of hx, hy, hz, and keys.

  •   Create (idi): after reception, Create idi query, ζ selects  αi, βi, li ∈  {1,2, .. … .,  n − 1} and sets hx(idi, 𝒱i, μi)=−βi,  𝒱i=li.𝒟, and μi=βi.𝒦 −  αi.𝒟. Then, ζ answers in the following two steps:

  • (i) If idi ≭ ids, with the identity idi, ζ outputs will be (Γi=vi, μi), 𝒩i=(⊥, li), and  𝒵i=(𝒱i, μi), respectively.

  • (ii) If idi ≭ ids, with the identity idi, ζ outputs will be (Γi=vi, μi), 𝒩i=(Γi, li), and  𝒵i=(𝒱i, μi), respectively.

  •   Thus, ζ included (idi, 𝒱i, μi, βi) into Lhx and (idi, Γi, 𝒩i,  𝒵i) into Lk.

  •   Hash queries ( hx, hy, hz): after reception, Hash queries ( hx, hy, hz), ζ searches for the values  Ωi, 𝒫i, 𝒳i in lists Lhx, Lhy, Lhz; if it finds in these lists then retunes to A1; otherwise, the values  Ωi, 𝒫i, 𝒳i for each Hash query will select by ζ in a random manner and send it to the A1.

  •   Secret value setting queries: after reception, this query, then, (ζ) answers in the following two steps:

  • (i) If idi=ids, ζ aborts the process.

  • (ii) If idi ≭ ids, ζ will look for (idi, Γi, 𝒩i,  𝒵i) in Lk; if such a tuple is found, then it results in li; otherwise, ζ calls Create idi query and gets (idi, Γi, 𝒩i,  𝒵i) and then sends li to A1.

  •   Partial private key setting queries: after reception, this query, then, (ζ) answers in the following two steps:

  • (i) If idi=ids, ζ aborts the process.

  • (ii) If idi ≭ ids, ζ will look for (idi, Γi, 𝒩i,  𝒵i) in Lk; if such a tuple is found, then it sends Γito A1.

  •   Public key setting queries: after reception, this query, then, (ζ) answers in the following two steps:

  • (i) If idi=ids, ζ aborts the process.

  • (ii) If idi ≭ ids, ζ will look for (idi, Γi, 𝒩i,  𝒵i) in Lk; if such a tuple is found, then it results in 𝒵i=(𝒱i, μi); otherwise, ζ calls Create idi query and gets (idi, Γi, 𝒩i,  𝒵i) and then sends  𝒵i=(𝒱i, μi) to A1.

  •   Public key replacement queries: after reception, this query, then, (ζ) will look for (idi, Γi, 𝒩i,  𝒵i) in Lk and replace  𝒵i by  𝒵i and include (idi, Γi, 𝒩i,  𝒵i) into Lk. So, ζ sets wi=⊥ and 𝒩i=|⊥.

  •   Certificateless online/offline signature queries: after reception, this query, then, (ζ) checks. If idi=ids, then it aborts the process; otherwise, it will perform the following steps:

  • (i) ζ first gets access to Lhy, Lhz, and Lk.

  •   Offline phase:

  • (ii) It picks  di ∈  {1,2,…,  n − 1} and computes di=di · Vs.

  •   Online phase:

  • (iii) Compute 𝒮i= li.di − ( li. 𝒳i + 𝒫i. wi) and it results as a signature Φ=ti, Si.

  •   Certificateless online/offline signature verification query: after reception, this query, then, (ζ) checks. If idi=ids, then it aborts the process; otherwise, it will perform the certificateless online/offline signature verification algorithm for the verifications of signature.

  •   Forgery: at the end, A1 results a lawful signature (Φ=ti, Si). If idi=ids, ζ aborts the process; otherwise, ζ checks for a list Lhx, and according to forking lemma , it generates another signature Φ=(𝒮i,  ti). So, we have 𝒮 · 𝒟= tsX ·  𝒱s𝒫s. (μs+ Ωs𝒦) and 𝒮s · 𝒟= tsX ·  𝒱s𝒫s. (μs+ Ωs𝒦). We suppose that μs=βs · 𝒦+ αs · 𝒟 and 𝒦 =   · 𝒟. So, when the subtractions between these two equations are performed, then we can get the following computations:

SiS·D=tsX·VsPs·μs+ΩsKtsX·VsPs·μs+ΩsK,Si·DS·D=tsXVsPs·μs+ΩsKtsX·Vs+Ps·μs+ΩsK,Si·DS·D=Ps·μs+ΩsKPs·μs+ΩsK,SiS·DPsPsαs·D=PsPsβs+Ωs·D,SiSPsPsαs·D=PsPsβs+Ωs·D,SiSPsPsαs=PsPsβs+Ωs,SiSPsPsαs/PsPsβs+Ωs=. (2)

So, A1 can solve HECDLP as =((𝒮i𝒮) − (𝒫s𝒫s) αs)/(𝒫s𝒫s) (βs+ Ωs), with the help of challenger ζ.

5.1. Probability Analysis

Here, we define the following probability events:

  1. The winning probability of Create query must be greater than (1 − QhxQcreate/n )

  2. The succeeded probability of  hy must be greater than (1 −  Qhy/n)

  3. The succeeded probability of  hz must be greater than (1 −  Qhy/n)

  4. The succeeded probability of certificateless online/offline signature queries must be greater than ( Qs/n)

  5. idi=ids satisfies with probability (1/Qcreate)

Note that  Qcreate,  Qhx,  Qhy, Qhz, and  Qs represent Create queries and Hash queries to hx,  hy,  hz, and certificateless online/offline signature queries, respectively.

So, overall advantage of A1 is towards its success as ξ ≥ (1 −  QhxQcreate/n)(1 −  Qhy/n)(1 −  Qhz/n)( (1/ Qcreate)( Qs/n).

Theorem 2 . —

By using the random oracle model, the proposed scheme resists against an adaptive chosen message attack, if an adversary A2would not be able to solve the hyperelliptic curve discrete logarithm problem (HECDLP).

Proof —

Suppose there is a challenger ζ which helps A1 to extract   from the given instance f= · 𝒟of HECDLP. Further, to figure out HECDLP, ζ picks b and sets master public key as 𝒦=b · 𝒟. Then, ζ generates ψ as a global parameter set, and similar to Theorem 1, it picks four empty lists (Lhx, Lhy, Lhz, Lk) for holding the value of hx, hy, hz, and keys.

  •   Create (idi): after reception, Create idi query, ζ answers in the following steps:

  • (i) If idi=ids, ζ selects  αi, Ωi ∈  {1,2,…,  n − 1} and sets hx(idi, 𝒱i, μi)=Ωi,  𝒱i= · 𝒟, wi=αi+bΩi, and μi= αi · 𝒟. So, it produces (Γi=wi, ui),  𝒩i=(Γi, ⊥), and  𝒵i=(𝒱i, μi), respectively.

  • (ii) If 𝒊𝒅𝒊 ≭ 𝒊𝒅𝒊, ζ selects  αi, li, Ωi ∈  {1,2,…,  n − 1} and sets hx(idi, 𝒱i, μi)=Ωi,  𝒱i=li.𝒟, wi=αibΩi, and μi= αi.𝒟.

  •   Thus, ζ included (idi, 𝒱i, μi, Ωi) into Lhx and (idi, Γi, 𝒩i,  𝒵i) into Lk.

  •   Hash queries ( hx, hy, hz): these are the same as performed in Theorem 1.

  •   Secret value setting queries: after reception, this query, then, (ζ) answers in the following two steps.

  • (i) If idi=ids, ζ aborts the process.

  • (ii) If 𝒊𝒅𝒊 ≭ 𝒊𝒅𝒊, ζ will look for (idi, Γi, 𝒩i,  𝒵i) in Lk; if such a tuple is found, then it results in li; otherwise, ζ calls Create idi query and gets (idi, Γi, 𝒩i,  𝒵i) and then sends li to A2.

  •   Partial private key setting queries: after reception, this query, then, (ζ) answers in the following two steps:

  • (i) If idi=ids, ζ aborts the process.

  • (ii) If 𝒊𝒅𝒊 ≭ 𝒊𝒅𝒊, ζ will look for (idi, Γi, 𝒩i,  𝒵i) in Lk; if such a tuple is found, then it sends Γito A2.

  •   Public key setting queries: after reception, this query, then, (ζ) answers in the following two steps:

  • (ii) If idi=ids, ζ aborts the process.

  • (iii) If 𝒊𝒅𝒊 ≭ 𝒊𝒅𝒊, ζ will look for (idi, Γi, 𝒩i,  𝒵i) in Lk; if such a tuple is found, then it results in  𝒵i=(𝒱i, μi); otherwise, ζ calls Create idi query and gets (idi, Γi, 𝒩i,  𝒵i) and then sends  𝒵i=(𝒱i, μi) to A2.

  •   Certificateless online/offline signature queries: after reception, this query, then, (ζ) checks. If idi=ids, then it aborts the process; otherwise, it will perform the following steps:

  • (i) ζ first gets access to Lhy, Lhz, and Lk.

  •   Offline phase:

  • (i) It picks  di ∈  {1,2,…,  n − 1} and computes ti=di · 𝒱s.

  •   Online phase:

  • (ii) Compute 𝒮i= li · di − ( li ·  Xi + 𝒫iwi) and it results as a signature 𝛷 = (𝓉𝑖, 𝒮𝑖).

  •   Certificateless online/offline signature verification query: after reception, this query, then, (ζ) checks. If idi=ids, then it aborts the process; otherwise, it will perform the certificateless online/offline signature verification algorithm for the verifications of signature.

  •   Forgery: at the end, A1 results in a lawful signature ϕ= (𝓉𝑖,  𝒮i). If idi=ids, ζ aborts the process; otherwise, ζ checks for a list Lhx, and according to forking lemma , it generates another signature Φ=(𝒮i,  ti). So, we have 𝒮 · 𝒟= tsX ·  𝒱s𝒫s. (μs+ Ωs𝒦) and 𝒮i · 𝒟= tsX ·  𝒱s𝒫s. (μs+ Ωs𝒦). We suppose that μs=βs · 𝒦+ αs · 𝒟 and 𝒦 =   · 𝒟. So, when the subtractions between these two equations are performed, then we can get the following computations:

SiS·D=tsX·VsPs·μs+ΩsKtsX·VsPs·μs+ΩsK,Si·DS·D=tsXVsPs·μs+ΩsKtsX·Vs+Ps·μs+ΩsK,Si·DS·D=Ps·μs+ΩsKPs·μs+ΩsK,SiS·DPsPsαs·D=PsPsβs+Ωs·D,SiSPsPsαs·D=PsPsβs+Ωs·D,SiSPsPsαs=PsPsβs+Ωs,SiSPsPsαs/PsPsβs+Ωs=. (3)

So, =(𝒮i𝒮)/(𝒳𝒳) as the solution of HECDLP.

The probability analysis is same as Theorem 1 and as follows:

The utilized advantages of A2 towards its success are as follows:

ξ ≥ (1 −  QhxQcreate/n)(1 −  Qhy/n)(1 −  Qhz/n)( (1/ Qcreate)( Qs/n).

6. Cost Analysis

This section contrasts the efficiency of the proposed scheme with the existing equivalents suggested by the schemes of Yu and Tate [25], scheme 1, Yu and Tate [25], scheme 2, Wu et al. [26], and Addobea et al. [27].

6.1. Computational Cost

Table 2 displays the key results derived from the analysis. Elliptic curve scalar multiplication and bilinear pairings are used in the existing schemes, all of which are more expensive alternatives. Therefore, we add the multiplication of the hyperelliptic divider. Observations have shown that the time it takes for a single scalar multiplication to be processed differs considerably: elliptic curve point multiplication (ECPM), 0.97 milliseconds; bilinear pairing (P), 14.90 ms; pairing-based point multiplications (BPM), 4.31 ms; and modular exponentiation (E), 1.25 ms [16]. The Multiprecision Integer and Rational Arithmetic C Library (MIRACL) [30] is used to calculate the performance of the proposed system. It checks roughly 1000 times the runtime of specific cryptographic operations. A workstation with the following requirements is used for evaluating simulation results: Intel Core i7-4510U Processor @ 2.0 GHz, 8 GB RAM, and Windows 7 Home Standard 64-bit Operating System [29]. The hyperelliptic curve divisor multiplication (HM) is believed to be 0.48 milliseconds in length due to a smaller key size of 80 bits [3134]. It is apparent from the results in Tables 2 and 3 that our solution is much more effective in terms of the computational cost as shown in Figure 2.

Table 2.

Computational cost.

Schemes Signing Verifying Total
Yu and Tate [25] scheme 1 1E + 3BPM 3E + 4BPM 4E + 7BPM
Yu and Tate [25] scheme 2 2E + 3BPM 3E + 3BPM 5E + 6BPM
Wu et al. [26] 3BPM 2P + 2BPM 2P + 5BPM
Addobea et al. [27] 3 BPM 3P + 4BPM 3P + 7BPM
Proposed 4HM 3HM 7HM

Table 3.

Computational cost in milliseconds.

Schemes Signing Verifying Total (ms)
Yu and Tate [25] scheme 1 14.18 20.99 35.17
Yu and Tate [25] scheme 2 15.43 16.68 32.11
Wu et al. [26] 12.99 38.42 51.41
Addobea et al. [27] 12.99 61.94 74.93
Proposed 1.92 1.44 3.36

Figure 2.

Figure 2

Computational cost (in ms).

6.2. Communication Cost

This subsection is aimed at discussing the comparison results from the perspective of communication costs. The proposed approach is compared with the existing schemes presented by Yu and Tate [25] scheme 1, Yu and Tate [25] scheme 2, Wu et al. [26], and Addobea et al. [27]. In comparative analysis, the variables, i.e. |G| = 1024 bits, |m| = 1024 bits, and |n| = 80 bits, along with the respective values, are depicted in Table 4 and illustrated in Figure 3.

Table 4.

Communication cost in bits.

Schemes Communication cost Communication cost in bits
Yu and Tate [25] scheme 1 3|G| + |m| 4096
Yu and Tate [25] scheme 2 3|G|  +|m| 4096
Wu et al. [26] 3|G| + |m| 4096
Addobea et al. [27] 3|G| + |m| 4096
Proposed 2|n| + |m| 1184

Figure 3.

Figure 3

Communication cost (in bits).

7. Conclusion

The Internet of Health Things (IoHT) plays an important role as an extension of the Internet of Things (IoT) in the remote data-sharing of multiple physical processes, such as patient monitoring, treatment progression, observation, and consultation. In IoHT, multiple sensors, actuators, and controllers allow communication, computation, and interoperability, thus providing seamless connectivity with efficient resource utilization. However, for the majority of IoHT implementations, conventional cryptographic methods are not feasible due to the energy constraints of low-power embedded devices. Therefore, we suggested a lightweight security scheme in this article, using the idea of the hyperelliptic curve (HEC), called an online-offline certificateless signature scheme. In the limited key size, the HEC solution is powerful and is also acceptable for IoHT environments. The formal security analysis shows the intensity of the proposed approach in avoiding multiple attacks. In addition, after a comparative comparison with the main existing schemes, the proposed scheme proved to be efficient in terms of both computational and communication costs.

An extension of the proposed scheme is required that offers encryption and digital signature in one go. We also plan to improve the security by adding some other aspects of formal analysis, such as the real-or-random (ROR) for the solutions against different attacks. All these aspects are in the development phase and will be taken into account in our future work.

Data Availability

All data generated or analyzed during this study are included in this published article.

Conflicts of Interest

The authors declare no conflicts of interest with respect to the research, authorship, and/or publication of this article.

References

  • 1.Rodrigues J. J. P. C., De Rezende Segundo D. B., Junqueira H. A., et al. Enabling technologies for the internet of health things. IEEE Access. 2018;6:13129–13141. doi: 10.1109/access.2017.2789329. [DOI] [Google Scholar]
  • 2.Riazul Islam S. M., Daehan Kwak D., Humaun Kabir M., Hossain M., Kyung-Sup Kwak K.-S. The internet of Things for health care: a comprehensive survey. IEEE Access. 2015;3:678–708. doi: 10.1109/access.2015.2437951. [DOI] [Google Scholar]
  • 3.Catarinucci L., De Donno D., Mainetti L., et al. An IoT-aware architecture for smart healthcare systems. IEEE Internet of Things Journal. 2015;2(6):515–526. doi: 10.1109/jiot.2015.2417684. [DOI] [Google Scholar]
  • 4.Yin Y., Zeng Y., Chen X., Fan Y. The internet of things in healthcare: an overview. Journal of Industrial Information Integration. 2016;1:3–13. doi: 10.1016/j.jii.2016.03.004. [DOI] [Google Scholar]
  • 5.Woo M. W., Lee J. W., Park K. H. A reliable IoT system for personal healthcare devices. Future Generation Computer Systems. 2018;78:626–640. doi: 10.1016/j.future.2017.04.004. [DOI] [Google Scholar]
  • 6.Farahani B., Firouzi F., Chang V., Badaroglu M., Constant N., Mankodiya K. Towards fog-driven IoT eHealth: promises and challenges of IoT in medicine and healthcare. Future Generation Computer Systems. 2018;78:659–676. doi: 10.1016/j.future.2017.04.036. [DOI] [Google Scholar]
  • 7.Firouzi F., Rahmani A. M., Mankodiya K., et al. Internet-of-things and big data for smarter healthcare: from device to architecture, applications and analytics. Future Generation Computer Systems. 2018;78:583–586. doi: 10.1016/j.future.2017.09.016. [DOI] [Google Scholar]
  • 8.Lin X., Lu R., Shen X., Nemoto Y., Kato N. Sage: a strong privacy preserving scheme against global eavesdropping for ehealth systems. IEEE Journal on Selected Areas in Communications. 2009;27(4):365–378. [Google Scholar]
  • 9.Ullah S., Marcenaro L., Rinner B. Secure smart cameras by aggregate-signcryption with decryption fairness for multi-receiver IoT applications. Sensors. 2019;19(2):p. 327. doi: 10.3390/s19020327. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 10.Shamir A. Identity-based cryptosystems and signature schemes. Proceedings of the of the CRYPTO 1984. 1984:19–23. [Google Scholar]
  • 11.Kumar P., Kumari S., Sharma V., Sangaiah A. K., Wei J., Li X. A certificateless aggregate signature scheme for healthcare wireless sensor network. Sustainable Computing: Informatics and Systems. 2018;18:80–89. doi: 10.1016/j.suscom.2017.09.002. [DOI] [Google Scholar]
  • 12.Kumar P., Kumari S., Sharma V., Li X., Sangaiah A. K., Islam S. H. Secure cls and cl-as schemes designed for vanets. The Journal of Supercomputing. 2019:1–23. [Google Scholar]
  • 13.Suárez-Albela M., Fraga-Lamas P., Fernández-Caramés T. A practical evaluation on RSA and ECC-based cipher suites for IoT high-security energy-efficient fog and mist computing devices. Sensors. 2018;18(11):p. 3868. doi: 10.3390/s18113868. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 14.Yu M., Zhang J., Wang J., et al. Internet of Things security and privacy-preserving method through nodes differentiation, concrete cluster centers, multi-signature, and blockchain. International Journal of Distributed Sensor Networks. 2018;14(12) doi: 10.1177/1550147718815842.155014771881584 [DOI] [Google Scholar]
  • 15.Braeken A. PUF based authentication protocol for IoT. Symmetry. 2018;10(8):p. 352. doi: 10.3390/sym10080352. [DOI] [Google Scholar]
  • 16.Zhou C., Zhao Z., Zhou W., Mei Y. Certificateless key-insulated generalized signcryption scheme without bilinear pairings. Security and Communication Networks. 2017;2017:17. doi: 10.1155/2017/8405879.8405879 [DOI] [Google Scholar]
  • 17.Kumari S., Karuppiah M., Das A. K., Li X., Wu F., Kumar N. A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. The Journal of Supercomputing. 2017;74(12):6428–6453. doi: 10.1007/s11227-017-2048-0. [DOI] [Google Scholar]
  • 18.Omala A. A., Mbandu A. S., Mutiria K. D., Jin C., Li F. Provably secure heterogeneous access control scheme for wireless body area network. Journal of Medical Systems. 2018;42(6) doi: 10.1007/s10916-018-0964-z. [DOI] [PubMed] [Google Scholar]
  • 19.Tamizhselvan C., Vijayalakshmi V. An energy efficient secure distributed naming service for IoT. International Journal of Advanced Studies of Scientific Research. 2019;3(8) [Google Scholar]
  • 20.Naresh V. S., Sivaranjani R., V.E.S. Murthy N. Provable secure lightweight hyper elliptic curve-based communication system for wireless sensor networks. International Journal of Communication Systems. 2018;31(15):p. e3763. doi: 10.1002/dac.3763. [DOI] [Google Scholar]
  • 21.Rahman A. U., Ullah I., Naeem M., et al. A lightweight multi-message and multi-receiver heterogeneous hybrid signcryption scheme based on hyper elliptic curve. International Journal of Advanced Computer Science and Applications. 2018;9(5):p. 5. doi: 10.14569/ijacsa.2018.090520. [DOI] [Google Scholar]
  • 22.Ta V. D., Liu C.-M., Nkabinde G. W. Big data stream computing in healthcare real-time analytics. IEEE International Conference on Cloud Computing and Big Data Analysis (ICCCBDA); July 2016; Chengdu, China. [Google Scholar]
  • 23.Even S., Goldreich O., Micali S. On-line/off-line digital signatures. Advances in Cryptology—CRYPTO’ 89 Proceedings. 1990:263–275. [Google Scholar]
  • 24.Shamir A., Tauman Y. Improved online/offline signature schemes. Advances in Cryptology-CRYPTO 2001. 2001;2139:355–367. doi: 10.1007/3-540-44647-8_21. [DOI] [Google Scholar]
  • 25.Yu P., Tate S. R. Online/offline signature schemes for devices with limited computing capabilities. The Cryptographers’ Track at the RSA Conference 2008 (CT-RSA 2008); April 2008; San Francisco, CA, USA. [Google Scholar]
  • 26.Wu T., Chen Y., Lin K. ID-based online/offline signature from pairings. Proceedings of the International Computer Symposium (ICS2010); December 2010; Tainan City, Taiwan. [Google Scholar]
  • 27.Addobea A. A., Hou J., Li Q. MHCOOS: An Offline-Online Certificateless Signature Scheme for M-Health Devices. Security and Communication Networks. 2020;2020:12. doi: 10.1155/2020/7085623.7085623 [DOI] [Google Scholar]
  • 28.Islam S. K. H., Biswas G. P. Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography. International Journal of Computer Mathematics. 2013;90(11):2244–2258. doi: 10.1080/00207160.2013.776674. [DOI] [Google Scholar]
  • 29.Khan M. A., Qureshi I. M., Khanzada F. A hybrid communication scheme for efficient and low-cost deployment of future flying ad-hoc network (FANET) Drones. 2019;3:p. 16. doi: 10.3390/drones3010016. [DOI] [Google Scholar]
  • 30. Shamus Sofware Ltd. http://github.com/miracl/MIRACL.
  • 31.Khan M. A., Ullah I., Nisar S., et al. An efficient and provably secure certificateless key-encapsulated signcryption scheme for flying ad-hoc network. IEEE Access. 2020;8:36807–36828. doi: 10.1109/access.2020.2974381. [DOI] [Google Scholar]
  • 32.Khan M. A., M Qureshi I., Ullah I., Khan S., Khanzada F., Noor F. An efficient and provably secure certificateless blind signature scheme for flying ad-hoc network based on multi-access edge computing. Electronics. 2020;9:p. 30. doi: 10.3390/electronics9010030. [DOI] [Google Scholar]
  • 33.Khan M. A., Ullah I., Nisar S., et al. Multiaccess edge computing empowered flying ad hoc networks with secure deployment using identity-based generalized signcryption. Mobile Information Systems. 2020;2020:15. doi: 10.1155/2020/8861947.8861947 [DOI] [Google Scholar]
  • 34.Ullah I., Alomari A., Ul Amin N., Khan M. A., Khattak H. An energy efficient and formally secured certificate-based signcryption for wireless body area networks with the internet of things. Electronics. 2019;8(10):p. 1171. doi: 10.3390/electronics8101171. [DOI] [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

All data generated or analyzed during this study are included in this published article.


Articles from Journal of Healthcare Engineering are provided here courtesy of Wiley

RESOURCES