Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

  • Loading metrics

A lightweight attribute-based signcryption scheme based on cloud-fog assisted in smart healthcare

  • Yanzhong Sun ,

    Roles Conceptualization, Investigation, Methodology, Writing – original draft, Writing – review & editing

    sunyz1117@163.com

    Affiliation College of Mathematics and Statistics, Northwest Normal University, Lanzhou, China

  • Xiaoni Du,

    Roles Methodology, Resources, Supervision, Validation, Writing – review & editing

    Affiliations College of Mathematics and Statistics, Northwest Normal University, Lanzhou, China, Key Laboratory of Cryptography and Data Analytics, Northwest Normal University, Lanzhou, China, Gansu Provincial Research Center for Basic Disciplines of Mathematics and Statistics, Northwest Normal University, Lanzhou, China

  • Shufen Niu,

    Roles Methodology, Resources, Supervision, Visualization, Writing – review & editing

    Affiliation College of Computer Science and Engineering, Northwest Normal University, Lanzhou, China

  • Siwei Zhou

    Roles Methodology, Project administration, Validation, Writing – review & editing

    Affiliation College of Computer Science and Engineering, Northwest Normal University, Lanzhou, China

Abstract

In the environment of big data of the Internet of Things, smart healthcare is developed in combination with cloud computing. However, with the generation of massive data in smart healthcare systems and the need for real-time data processing, traditional cloud computing is no longer suitable for resources-constrained devices in the Internet of Things. In order to address this issue, we combine the advantages of fog computing and propose a cloud-fog assisted attribute-based signcryption for smart healthcare. In the constructed “cloud-fog-terminal” three-layer model, before the patient (data owner)signcryption, it first offloads some heavy computation burden to fog nodes and the doctor (data user) also outsources some complicated operations to fog nodes before unsigncryption by providing a blinded private key, which greatly reduces the calculation overhead of resource-constrained devices of patient and doctor, improves the calculation efficiency. Thus it implements a lightweight signcryption algorithm. Security analysis confirms that the proposed scheme achieves indistinguishability under chosen ciphertext attack and existential unforgeability under chosen message attack if the computational bilinear Diffie-Hellman problem and the decisional bilinear Diffie-Hellman problem holds. Furthermore, performance analysis demonstrates that our new scheme has less computational overhead for both doctors and patients, so it offers higher computational efficiency and is well-suited for application scenarios of smart healthcare.

Introduction

Smart healthcare has emerged from the rapid advancement of the Internet of Things (IoT) [1]. By leveraging advanced techniques such as big data, artificial intelligence, cloud computing and IoT, smart healthcare has facilitated the automation, informatization, and intelligence of medical services [2], it achieves the intelligence of healthcare capabilities, improves healthcare efficiency, and optimises patient experience services. Traditional paper-based Personal Health Records (PHR) have been replaced by electronic PHR [3], resulting in a massive influx of data and increased demands for device mobility and real-time processing. These challenges have posed significant limitations to traditional cloud computing.

Owing to the above problems, fog computing has been introduced [4]. Fog computing provides a solution that is better suited to mobile IoT and a wide range of mobile applications by extending cloud computing to the network edge, closer to the end-user. With the exponential growth of IoT devices, cloud computing has faced the challenge of processing hundreds of millions of massive data. Fog computing, with its powerful computing capabilities, offers low latency and support for end user mobility, enabling the processing of data with low computing requirements. As a result, certain computing tasks is delegated to fog nodes by nearby end-users, reducing the computational burden for users, significantly improving the efficiency, and satisfies the requirements for real-time processing of mobile applications [5].

In the context of the smart health system, fog computing is positioned closer to the end-user, handling a significant amount of sensitive patient data that ultimately gets uploaded to the medical cloud for storage. Given the semi-trusted nature of the medical cloud, data processing is necessary prior to uploading to safeguard the integrity and privacy of the patient. To address this, the attribute-based cryptosystem offers enhanced privacy and security for patient data. It enables one-to-many access control with fine-grained, distinguishing itself from the traditional identity-based cryptosystem. The attribute-based cryptosystem was originated by the fuzzy identity-based cryptosystem proposed by Sahai et al. [6], which introduces the concept of attributes into the cryptosystem. This idea has found widespread application in smart health scenarios. Li et al. [7] presented an online/offline attribute-based encryption algorithm, offloading a portion of the decryption computation to ensure computational efficiency of IoT terminal devices. Similarly, Zhang et al. [8] provided a lightweight attribute-based encryption algorithm based on the smart health system, leveraging the concept of outsourcing. While traditional attribute-based cryptographic technology achieves fine-grained access control, it incurs a relatively high computational overhead. To mitigate this, Zhong et al. [9] introduced an edge-assisted attribute-based encryption algorithm that offloads part of encryption operations as well as decryption operations to edge nodes, reducing the computational burden on resource-constrained IoT devices. Drawing parallels to edge computing, fog computing also extends computational capabilities and data analysis functions to the network edge, forming a three-layer model known as “cloud-fog-devices”. This model effectively addresses the latency issue associated with cloud computing. Several studies [1014] have explored the application of fog computing to attribute-based encryption algorithms, outsourcing a majority of the decryption operations to fog nodes, thereby significantly easing the computational load on end users. In addition, in order to ensure the integrity of the data or the legitimacy of the identity of the receiver, the message to be encrypted is usually signed and the identity is authenticated by data owner [1517].

The traditional idea of “encrypt first and then sign” has high computational overhead and communication cost. In view of this problem, the concept and scheme of signcryption are proposed for the first time in [18], which guarantees the confidentiality and unforgerability of messages. Attribute-based signcryption has been extensively researched in recent years by various scholars [1922], enhancing the suitability and computational efficiency of attribute-based signcryption algorithms in real-world cloud storage environments. In the context of accessing Personal Health Records (PHR), references [23, 24] propose two efficient attribute-based signcryption for multi-authority. Similarly, Liu et al. [25] present an attribute-based signcryption algorithm based on PHR, facilitating fine-grained data access control. For resource-constrained terminal devices in the IoT [26, 27], adopt a strategy of outsourcing the decryption process to edge servers, effectively reducing user-end computing overhead. Additionally [26], supports the update of access policies.

Motivation and contributions

Combine the advantages of cloud-fog assistance, we present a lightweight attribute-based signcryption scheme for smart healthcare. Our approach leverages the three-layer model structure known as “cloud-fog-terminal” (illustrated in Fig 1) to establish a connection between the smart health system and the medical cloud. By employing fog computing as an intermediary bridge, we exploit its low latency, location-awareness, and powerful computing capabilities to ensure secure data transmission in terms of confidentiality. Additionally, some complicated operations in the signcryption and unsigncryption processes are offloaded to the nearby fog nodes, thereby reducing the computational overhead on data users, which proves particularly advantageous for resource-constrained terminal devices in smart healthcare.

In comparison to existing schemes, our work makes noteworthy contributions in the following:

  • Fog computing is structured as an intermediary link between the smart healthcare system and the medical cloud, making it easier for the fog nodes to collect and process data as they are spread around the data users. For the smart health system there are a huge number of IoT devices need to access the Internet through wireless, and have high requirements for mobility. Therefore, fog computing is more suitable for smart medical scenarios.
  • In the scheme, the patient (data owner) delegates the computationally intensive tasks to the fog nodes during signcryption. Similarly, the doctor (data user) also offloads some heavy computing burden to the fog nodes by providing a blinded private key before performing unsigncryption. Specifically, in the signcryption and unsigncryption phase, the fog nodes are responsible for undertaking most of the complicated computations, such as the pairing operation. As a result, the client only needs to perform a simple multiplication operation in the process of user unsigncryption, which significantly reduces the computation burden for all client.
  • The newly proposed scheme provides several advantages in terms of computational and communication overheads, as demonstrated through theoretical analysis and numerical simulation. The incorporation of fog computing significantly enhances the computational efficiency of data owner signcryption and data receiver unsigncryption in comparison to other schemes. This discrepancy becomes more pronounced as the number of attributes increases. Consequently, the proposed scheme is not only effective and practical, but also highly suitable for resource-constrained devices in the practical application of smart healthcare.

Organization

The subsequent sections are structured as follows. Section 2 presents various fundamental concepts such as the access tree and hardness assumption. Subsequently, Section 3 is an overview of the system model, algorithm formal definition, and the system security model. Following that, Section 4 presents the construction of the scheme in detail. Section 5 is dedicated to a detailed security analysis of our scheme, while Section 6 concentrates on analysing the efficiency of the system. Lastly, Section 7 proposes the conclusion of the article.

Preliminaries

Access tree [7]

Let be an access structure tree and x be a node in .

(1). If x is a non-leaf node, then it stands for a threshold (“AND” or “OR”) gate, which can be described by (kx, numx), where numx is the number of child nodes of x and kx is its threshold value, 1 ≤ kxnumx. When kx = 1, x is an “OR” gate; when kx = numx, it is an “AND” gate.

(2). If x is a leaf node, then it stands for a attribute and described by a threshold value kx = 1.

Denote the parent node of x in as parent(x), and the attributes associated with the leaf node x in as att(x). Each children of node x are numbered in a sequence from 1 to numx, the function index(x) denotes the index of x among its siblings.

Let be a access tree with root node r, be the subtree of rooted at x. If the attribute set S satisfies the subtree , we denote it as . Furthermore, can be calculated recursively by: if x is a non-leaf node, then iff at least kx child nodes return 1 and if x is a leaf node, iff att(x) ∈ S.

Bilinear pairing map [28, 29]

Let G0 and G1 be two cyclic groups with the prime order p, and g is a generator of G0. Then the bilinear map e: G0 × G0G1 can be defined as follows:

Bilinearity: For all , e(ga, gb) = e(g, g)ab.

Non-degeneracy: e(g, g)≠1.

Computability: For all a, bG0, there is an efficient algorithm to compute the map e(a, b).

Hardness assumption

DBDH assumption [22].

Given an cyclic group G0 with order p, a generator g of G0, a bilinear mapping e: G0 × G0G1 and . The Decisional Bilinear Diffie-Hellman (CBDH) hardness assumption states that any Probabilistic Polynomial-Time (PPT) algorithm cannot decision e(g, g)abcG1 and a random ZG1 from a given triple with a non-negligible probability.

CBDH assumption [19].

Given an cyclic group G0 with order p, a generator g of G0, a bilinear mapping e: G0 × G0G1 and . The Computational Bilinear Diffie-Hellman (CBDH) hardness assumption states that any PPT algorithm cannot compute e(g, g)abcG1 from a given triple with a non-negligible probability.

System and security model

This section mainly includes an overview of the construction of system model, the formal definition of the proposed scheme and the elaboration of the system security model.

System model

Based on fog computing, we construct the lightweight attribute-based signcryption scheme in smart healthcare. As illustrated in Fig 2, this system involves five entities, namely Private Key Generator (PKG), Medical Cloud (MC), Fog Nodes (FN), Data user (DU) and Data Owner (DO).

Private Key Generator: PKG initializes the system, then generates and distributes private keys to both the data owners (patients) and the data users (doctors).

Medical Cloud: MC refers to the server of the hospital. As a semi-trusted third party due to its powerful storage capacity, MC is mainly responsible for storing a huge number of electronic health records in the form of ciphertext provided by DO.

Fog Nodes: As small medical centers deployed at the network edge, FN has enough storage space and computing power to help data users with local data processing. The data owner outsources some signcryption operations to the fog node, and the data user outsources some decryption operations to the fog node, so as to reduce the computational burden of the terminal devices.

Data Owner: DO refers to the patients. A enormous number of patients, as the source of data in the smart health system, have ownership and control over the data. The patient defines an access structure for the data that needs to be signcrypted, specifies the scope of authorized users, and their terminal devices signcrypt the data and store the final ciphertext to the medical cloud.

Data User: DU refers to doctors, medical researchers, or insurance company employees who need access to patient information. When DU accesses the data, it downloads the ciphertext from the medical cloud and performs the final unsigncryption. Only the users who satisfy the access policy can decrypt the ciphertext and access the data, which realizes the fine-grained access control.

Firstly, PKG initializes the system, then generates and distributes private keys to both the data owners (patients) and the data users (doctors). The health status and personal information of the patients are collected in real time by the wearable device. The collected data is signcrypted by the fog node, producing a part of the ciphertext. Subsequently, the patients perform the final signcryption and upload the final ciphertext to the medical cloud (hospital). When data users (such as doctors, medical researchers, insurance companies, etc.) request data, the ciphertext is retrieved from the medical cloud for preliminary unsigncryption. The fog node then assists the data users in performing partial operations, ultimately allowing the users to get the required data.

Formal definition

Now, we formalize the definition of the proposed schemes. This scheme is composed of the following six algorithms in PPT.

  • Setup(λ, S)→(pp, msk): PKG executes the setup algorithm. Input system security parameter λ, output system public parameter pp, master key msk.
  • KeyGen(pp, S, msk)→SK: PKG runs the key generation algorithm, taking as input public parameter pp, a attributes set S and master key msk, it generates and hands out private keys SK for DU.
  • : After receiving the access structure enacted by DO, FN takes this access policy as input and performs partial signcryption operations, and finally outputs part of the ciphertext CT′.
  • : After FN performs part of the operation, DO executes this algorithm, it takes the message m, the enacted access structure and the partial ciphertext CT′ as the input of the algorithm, and finally generates the signature σ and the final ciphertext CT.
  • : When FN receives the blinded private key of DU, it performs a partial unsigncryption operation, calculates some parameters (B, T, F) according to the recursive formula of the access tree, then sends the parameters to DU for final unsigncryption.
  • DU.Unsign(CT, SK, S)→m: DU executes this algorithm, using ciphertext CT, private key SK and attribute set S as the input, if DU satisfies the access structure, it will get the plaintext m.

Security model

This section provides a formalization of the security of the scheme encompassing confidentiality and unforgeability, which are simulated as the following two games which are interactions between a challenger and an adversary within PPT.

Game 1. Confidentiality

Definition 1. The proposed attributed-based signcryption scheme is indistinguishable under chosen ciphertext attack (IND-CCA) against any adversary possessing polynomial time capability, if the advantages of in the following interaction are negligible:

Initialization: Firstly, generates a challenge attribute set denoted as S. To proceed, executes the Setup to returns pp to . Simultaneously, it retains msk secretly.

Query Phase 1: When initiates a series of prophecy inquiry, responds the inquiry as described below.

  • Key extraction query: in the query, when requests a private key SK with the attribute set S*, executes KeyGen according to S* and returns the corresponding SK to .
  • Signcryption query: in the query, when queries a ciphertext for any message m, proceeds by selecting an attribute set S from T* firstly, it then runs the key extraction query and obtain SK, followed by executing the signcryption algorithm to encrypt and send the corresponding ciphertext CT to the adversary .
  • Unsigncryption query: For any attribute set S and the corresponding ciphertext CT queried by the adversary , The first step performed by the challenger is to execute the key extraction query and get SK, it then proceeds the unsigncryption algorithm to decrypts CT and returns the resulting output to .

Challenge: In this phase, selects two different messages m0m1 with equal length as the challenge message, and presents them to to request the corresponding ciphertext. And randomly chooses a bit b ∈ {0, 1}, runs the DO.Sign algorithms and FN.Sign algorithms to gnerate and return the challenge ciphertext CT* of to .

Query Phase 2: can continue issue a similar inquiry as in Query Phase 1. Any adversary can initiate a signcryption challenge on any ciphertext apart from the challenged one.

Guess: If can output a bit b′, and b′ = b, then wins the above game. The probablity advantage of in the game can be defined as .

Game 2. Unforgeability

Definition 2. The proposed attributed-based signcryption scheme is existential unforgeability under chosen message attack (EUF-CMA) against any adversary possessing polynomial time capability, if the advantages of adversary in the following interaction are negligible:

Initialization: in this phase, sends a attributes set S to forge the ciphertext. To proceed, executes the Setup to returns pp to . Simultaneously, it retains msk secretly.

Query Phase: initiates a prophecy inquiry, and responds to the inquiry as described below.

  • Key extraction query: in the query, asks the user for the private key SK. After receiving attribute set S*, runs the key generation algorithm and return the corresponding private key according to the attribute set S*.
  • Signcryption query: if wants to signcrypt message m*, select an attribute set S, and ST*, then executes the key extraction algorithm to obtain SK and runs the DO.Sign algorithms and FN.Sign algorithms to obtain and return the ciphertext CT* to .
  • Unsigncryption query: let CT be the ciphertext with respect to attribute set S queried by , first performs the key generation algorithm to obtain SK, then executes the DO.Unsign algorithms and FN.Unsign algorithms, and finally sends the result to .

Forge: In the phase, outputs the forged ciphertext CT of the message m*, and finally if outputs Unsigncryption(CT, SK, S*) = m* ≠ ⊥, then the game is won. The probablity advantage of in winning the game can be defined as

The concrete scheme

As illustrated in Fig 3, The scheme is essentially made up of four phases, system initialization, private key generation, signcryption and unsigncryption, which are described in more detail below.

Phase 1: System initialization

PKG performs the Setup algorithm. In the initialization phase, give security parameter λ,

  • PKG selects two cyclic multiplicative groups G0 and G1 with order p, a generator gG0. Let e: G0 × G0G1 be bilinear mapping and H: {0, 1}* → G0 be a cryptographic hash function.
  • Random selection , PKG calculation h = gβ. Finally, PKG publishes system parameter pp = (G0, G1, g, e(g, g)α, h = gβ) and keep system master key msk = (gα, β) secretly.

Phase 2: Private key generation

PKG executes this algorithm, generates and issues private keys for DU.

  • Randomly select , generate private key .
  • For all attribute jS, it selects random number , and computes , . The private key is eventually distributed to the requested clients.

Phase 3: Signcryption

The signcryption algorithm includes two parts: data owner signcryption and fog node signcryption. Firstly, DO defines an access tree and sends it to FN, it then run FN.Sign algorithm.

  • FN signcryption. Fog nodes execute FN.Sign algorithm for outsource computing.
  • Let x be a node in , FN chooses a polynomial qx and sets the degree dx of qx as dx = kx − 1, where kx is the threshold value of x. Now, if x = r is the root node of , then FN assigns a random number and sets qr(0) = s, if xr, then FN sets qx(0) = qparent(x)(index(x)).
  • Let Y be the leaf node set in , for ∀yY, FN calculates C = hs = gβs, Cy = gqy(0), , and sends part of the ciphertext to DO for the next signcryption.
  • DO signcryption. After receiving CT′ = (, the data owner runs the DO.Sign algorithm.
  • DO first computes C* = me(g, g)αs, then selects a number randomly, and computes σ = e(C, g)μ = e(g, g)βsμ, π = H(σ|m), and . Eventually, it sends the ciphertext to the medical cloud for storage.

Phase 4: Unsigncryption

The unsigncryption algorithm mainly includes two parts: data user unsigncryption and fog node unsigncryption. The data user selects the random number , then blinds the private key SK, computes , , and , and finally sends the blinded private key to the fog node.

  • FN unsigncryption. When DU downloads the ciphertext CT from the medical cloud, FN first runs the FN.Unsign algorithm, which is a recursive algorithm that takes node , blinded private key and ciphertext CT as input.
  • If yY is a leaf node, and att(y) ∈ S, compute if att(y)∉S, it outputs φy = ⊥.
  • If y is a non-leaf node, FN recursively calculates φy of node y’s child node y′, let Sy be a set of any φy-sized child node {y′}, if Sy = ∅, then φy = Null; otherwise where denotes Lagrange coefficient and .
  • If y = r is a root node, FN computes φr = e(g, g)r1ds.
  • Finally, FN calculates then sends (B, T, F) to DU for the next unsigncryption.
  • DU unsigncryption. DU performs the final unsigncryption by receiving the parameters sent by FN.
  • Firstly, DU computes
  • Then decrypt message:
  • Finally verify the correctness of the signature by the equation:

Security analysis

Based on the DBDH and CBDH hardness assumption, this section provides a thorough security analysis process of the scheme. Specifically, our primary focus is on ensuring confidentiality and unforgeability.

Theorem 1. The proposed attribute-based signcryption scheme satisfies IND-CCA security if the DBDH hardness assumption holds.

Proof. If there exists an adversary who can win in Game 1 with a non-negligible probability advantage ε within PPT t, which means there is an algorithm can effectively break the confidentiality of the scheme with probability ε within PPT. With the help of the adversary , we construct an algorithm to decision DBDH problem associated Challenger .

Given a tuple (A = ga, B = gb, C = gc), as an example of the DBDH assumption, tries to decision e(g, g)abcG1 and ZG1. Let CT be a challenge ciphertext, C* be part of the ciphertext randomly selected from m0e(g, g)αs or m1e(g, g)αs. Let θ = αs, , CT be e(g, g)αs or e(g, g)θ. must distinguish m0e(g, g)αs and m1e(g, g)αs, and needs to make a distinction between e(g, g)αs and e(g, g)θ.

Initialization: Adversary first selects and sends attribute set S* to as a target attribute set, randomly selecting . If β = 0, then the Setup algorithm terminates, otherwise runs the Setup algorithm and generate the public parameter pp. And then sends (h = gβ, e(g, g)α) to . If queries the value of H, then randomly selects and answers .

Query phase 1: During this phase, adversary makes several inquiries.

  • Key extraction query: For target attribute set S*, if multiple requests the private key SK, randomly chooses , let . For attributes jS, chooses randomly and computes , . Eventually, it returns the private key as to the adversary . When queries the i-th key extraction challenge with attribute set Si, algorithm chooses another random number , computes , and for ∀jSi, it computes , , and sends this result to adversary .
  • Signcryption query: Signcryption query: Adversary requests to signcrypt message m*. For each message, runs the key generation algorithm to obtain the private key, then executes the signcryption algorithm to obtain the ciphertext CT*, and returns to .
  • Unsigncryption query: At this stage, adversary issues a unsigncryption request for ciphertext CT. First, verifies whether C = C* is true, because C = gθ is random in the eyes of adversary , and the probability of this ciphertext is at most 1/p. If the equation holds, terminates the algorithm, otherwise the following steps are performed:
  • If S* = 0, the access control tree for unsigncrypting is not satisfied. execute the key generation algorithm to get the private key, then run the unsigncryption algorithm, and return the result to .
  • If S* = 1, it satisfies the access control tree for unsigncryption. first verify signature σ′ = e(C, Ψ)/Bπ, if incorrect, output ⊥. Otherwise, it uses to determine .
  • If the access structure satisfies the attribute set, let . Then calculate
    Finally, the recovered message m is sent to .

Challenge: In this phase, selects two different messages m0m1 with equal length, randomly chooses b ∈ {0, 1}, and signcrypts message based on challenge attribute set S*. The process for generating challenge ciphertext CT* is the following: first, randomly chooses , and uses fj to recover the secret s or attribute j; calculates , Cj = gab, and ; randomly selects , and calculates , , and . Finally sends to .

Query phase 2: For the second challenge initiated by adversary , the reply process of is similar to that of challenge phase 1. There is no unsigncryption challenge during this challenge phase.

Guess: Adversary finally outputs a bit b′ and if b′ = b, then we claim that wins the game. If Z = e(g, g)abc, then CT* is valid with an advantage of ε. So , and the probability advantage of is .

Theorem 2. The proposed attribute-based signcryption scheme satisfies EUF-CMA security based the CBDH hardness assumption.

Proof. Suppose there is an adversary that can win game 2 with a non-negligible advantage ε in the probability polynomial time t, then an algorithm can be constructed with the help of adversary . Challenger is given (A = ga, B = gb, C = gc), as an instance in the CBDH problem, and adversary tries to guess e(g, g)abc. Let θ = αs and .

Initialization: Adversary sends target attribute set S* to , chooses randomly. If β = 0, then the system Setup algorithm terminates, otherwise run the system Setup algorithm to obtain public parameters pp. Then sends h = gβ and e(g, g)α to . When asks for the value of H, randomly chooses , and answers .

Query Phase: Adversary initiates queries in each of the following phases.

  • Key extraction query: if requests private key SK based on attribute set S* multiple times, randomly selects , let . For attribute jS, select at random and compute and . So the private key is: , and then returns SK to adversary . When sends the i-th key extraction to ask for the attribute set Si, selects randomly, computs , and for ∀jSi, computs , , and sends to .
  • Signcryption query: sets access control policy for authorized attribute set S*. If the challenged attribute set S* does not satisfy access control policy , then can obtain the private key through the key generation algorithm. Then run the signcryption algorithm to send ciphertext CT to . Assuming that attribute set S* satisfies access control policy , selects randomly, and then use b to recover secret s or attribute j. randomly selects , run the signcryption algorithm, and calculate , Cj = gab, . Select at random, calculate σ = e(C, g)c, π = H(σ|m), . Finally, sends ciphertext to .
  • Unsigncryption query: Adversary initiates a unsigncryption query for ciphertext CT based on attribute set S*. run the key generation algorithm to obtain private key SK, perform the unsigncryption algorithm, and send result m or ⊥ to .

Forgery: After outputs a valid forged ciphertext . The challenger solves the CBDH assumption as follows. Since CT* is a valid ciphertext for m*, which means it can pass the verification equation, then there are Cj = gab, π = H(σ|m), , σ = e(C, g)c. Adversary outputs a fake verification and using attribute set S*. If S* ≠ 0, then terminates the algorithm, verifying that equation σ* holds. If the algorithm Unsigncrypt(CT, SK, S) = m* ≠ ⊥ then wins the game. The advantages of solving the CBDH problem are:

Performance comparison

This section analyzes the advantages and disadvantages of our new scheme in relation to communication and computational capabilities. Compared with some existing attribute-based signcryption schemes [2225, 27], the capabilities of our new scheme is improved significantly. For convenience, the symbols used in this section are first summarised in Table 1.

Communication overhead

The viability of a scheme, particularly for resource-constrained IoT devices, heavily relies on communication overhead. The comparison between our new scheme and the schemes of [2225, 27] regarding communication overhead is presented in Table 2. The communication overhead of various stages, namely system initialization, key generation, signcryption, and unsigncryption, is primarily taken into consideration. When it comes to the key generation stage, the communication overhead of each scheme varies based on the number of attributes. However, our scheme stands out with the smallest overhead. By employing outsourcing techniques, the communication overhead of data users in the signcryption phase becomes independent of the number of attributes. This reduction in storage burden on the local side is of utmost importance for resource-constrained IoT devices.

Computational overhead

For the computational overhead, we will compare it from the aspects of theoretical analysis and numerical experiments.

Theoretical analysis.

We primarily consider the computational burden of various stages, including system initialization, key generation, signcryption and unsigncryption. To provide a clear comparison, Table 3 provides a comparison of the computational cost between our proposed scheme and the schemes referenced in [2225, 27]. This comparison is based on the fact that addition and multiplication operations are significantly less computationally expensive than exponentiation, bilinear pairing, and hash operations. Thus, our main point of comparison revolves around the number of exponential operations, bilinear pairing operations, and hash operations across different schemes.

Table 3 reveals that the computational cost of the proposed scheme remains constant during the system initialization, DO signcryption and DU unsigncryption phases, regardless of the number of attributes. However, in [22], the key generation stage involves pairing operations, resulting in higher computational costs compared to other schemes. Furthermore, the schemes in [2225] do not utilize outsourcing computing, which means that the computational cost for users varies depending on the complexity of the access policy. On the other hand, our approach ensures a stable computational overhead for data user signcryption, with most calculations outsourced to fog nodes during the signcryption phase. This includes the high-overhead pairing operation, allowing end users to decrypt messages without engaging in pairing operations. By employing outsourcing technology, the computation burden for data owners and users is minimized, further emphasizing the lightweight nature of this scheme.

Numerical simulation.

The numerical simulation comparison was conducted on a Linux operating system, utilizing a pairing-based cryptography library with Type-A bilinear pairing parameters [30]. The programming was implemented in C language and executed on a PC with a 2.60 GHz CPU and 8 GB RAM. Our focus was primarily on observing the time variations during the system initialization stage, key generation stage, signcryption stage, and unsigncryption stage. We performed tests by altering the number of attributes, simulating attribute values from 20 to 140.

Fig 4 illustrates the initialization stage, where the setup algorithm is independent of attributes and follows a nearly straight line. However, the initialization stages except for [23, 27] and our scheme are attribute-dependent, resulting in an increase in setup time as the number of attributes changes. In the key generation phase (Fig 5), both the proposed scheme and the comparison scheme experience an increase in time as the number of attributes increases, but the proposed scheme performs the fastest. From Figs 6 and 7, it is evident that the running time of our new scheme in the DO signcryption and DU unsigncryption stages are optimal and attribute-independent, and thus their efficiency in terminal devices are the highest. This is due to we offload some heavy computation from the original client to the fog node, which means the scheme effectively reduces the computation of the resource-constrained devices, and improves the overall efficiency of the scheme, making it more suitable for smart healthcare scenarios. In the signcryption and unsigncryption stages, [24] demonstrates higher efficiency, but this is based on the assumption of a single attribute authority, whereas the actual scheme involves multiple attribute authorities. Therefore, if multiple attribute authorities are present, the efficiency of [24] will decrease. Through comprehensive analysis, we claim that the proposed scheme significantly enhances algorithm efficiency by partially outsourcing signcryption and unsigncryption operations to the fog node, aligning it more suitable for real-world application environments.

Conclusion

Aiming at the generation of massive data in smart health system and the attention of patients to privacy of personal health information. We proposes a lightweight attribute-based signcryption scheme based on cloud-fog assist. In smart healthcare system, we should not only consider the basic security requirements of medical data sharing, patient privacy and confidentiality, but also consider the computing and storage capabilities of resource-constrained devices in the IoT. Therefore, fog nodes are introduced in this paper, and a three-layer model structure of “cloud-fog-terminal” is constructed, and part of the operations in the signcryption stage and the unsigncryption stage are outsourced to the fog nodes, so that the end user’s calculation cost in the signcryption stage is reduced. None pairing operation is involved, which significantly improves the computational efficiency of the scheme. Finally, under the random oracle model, the feasibility and security of the scheme are proved. Compared with the previous attribute-based signcryption scheme, our proposed scheme has better advantages in computing efficiency and is more suitable for practical smart medical application scenarios. As future work, we plan to conduct a series of simulated real-world experiences to evaluate the performance and practicality of our signcryption scheme, and design efficient a post-quantum based attribute-based signcryption scheme applicable to smart healthcare.

References

  1. 1. Feng Y, Zhang Q, Wu H, et al. PRISC: privacy-preserved pandemic infection risk computation through cellular-enabled IoT devices. IEEE Internet of Things Journal. 2023; 10(17): 15074–15086.
  2. 2. Kar P, Chen K, Shi J. DMACN: A dynamic multi-attribute caching mechanism for NDN-based remote health monitoring system. IEEE Transactions on Computers. 2023; 72(5): 1301–1313.
  3. 3. Sarosh P, Parah SA, Malik BA, et al. Real-time medical data security solution for smart healthcare. IEEE Transactions on Industrial Informatics. 2023; 19(7): 8137–8147.
  4. 4. Bonomi F, Milito R, Zhu J, et al. Fog computing and its role in the internet of things. Proceedings of the first edition of the MCC workshop on Mobile cloud computing (MCC’12). ACM, 2012.
  5. 5. Huang FM, Tu SS, Meng Y. Attribute-based encryption scheme supporting outsourcing and revocation in fog computing. Computer Engineering. 2020; 46(5): 34–40.
  6. 6. Sahai A, Waters B. Fuzzy identity-based encryption. Advances in Cryptology—EUROCRYPT 2005. Springer, Berlin, Heidelberg, 457–473, 2005.
  7. 7. Li H, Yu K, Liu B, et al. An efficient ciphertext-policy weighted attribute-based encryption for the internet of health things. IEEE Journal of Biomedical and Health Informatics, 2021; 26(5): 1949–1960.
  8. 8. Zhang L, You W, Mu Y. Secure outsourced attribute-based sharing framework for lightweight devices in smart health systems. IEEE Transactions on Services Computing, 2021; 15(5): 3019–3030.
  9. 9. Zhong H, Zhou Y, Zhang Q, et al. An efficient and outsourcing-supported attribute-based access control scheme for edge-enabled smart healthcare. Future Generation Computer Systems, 2021; 115: 486–496.
  10. 10. Nkenyereye L, Riazul Islam SM, Hossain M, et al. Fog based Secure Framework for Personal Health Records Systems. Computers, Materials & Continua, 2021; 66(2): 1937–1948.
  11. 11. Saidi A, Nouali O, Amira A. SHARE-ABE: an efficient and secure data sharing framework based on ciphertext-policy attribute-based encryption and Fog computing. Cluster Computing, 2022; 25(1): 167–185.
  12. 12. Guo R, Zhuang C, Shi H, et al. A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing. International Journal of Distributed Sensor Networks, 2020; 16(2): 1550147720906796.
  13. 13. Dong JT, Yan PW, Du RZ. Verifiable access control scheme based on unpaired CP-ABE in fog computing. Journal on Communications, 2021; 42(8): 139–150.
  14. 14. Du RZ, Yan PW, Liu Y. Fine-grained attribute update and outsourcing computing access control scheme in fog computing. Journal on Communications, 2021; 42(3): 160–170.
  15. 15. Vijayakumar P, Obaidat MS, Azees M, Islam SKH, Kumar N. Efficient and secure anonymous authentication with location privacy for IoT-based WBANs. IEEE Transactions on Industrial Informatics, 2020; 16(4): 2603–2611.
  16. 16. Azees M, Vijayakumar P, Karuppiah M, Nayyar A. An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks. Wireless Networks, 2021; 27: 2119–2130.
  17. 17. Jegadeesan S, Azees M, Arun SR, and Fadi AT. Lightweight privacy and confidentiality preserving anonymous authentication scheme for WBANs. IEEE Transactions on Industrial Informatics, 2022; 18(5): 3484–3491.
  18. 18. Zheng Y. Digital signcryption or how to achieve cost (signature & encryption)≪ cost (signature)+ cost (encryption). Advances in Cryptology—CRYPTO’97. Springer, Berlin, Heidelberg, 165–179, 1997.
  19. 19. Eltayieb N, Elhabob R, Hassan A, et al. A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud. Journal of Systems Architecture, 2020; 102: 101653.
  20. 20. Xu Q, Tan C, Fan Z, et al. Secure data access control for fog computing based on multi-authority attribute-based signcryption with computation outsourcing and attribute revocation. Sensors, 2018; 18(5): 1609. pmid:29772840
  21. 21. Rao YS. Attribute-based online/offline signcryption scheme. International Journal of Communication Systems, 2017; 30(16): e3322.
  22. 22. Hong HS, Sun ZX. An efficient and secure attribute based signcryption scheme with LSSS access structure. SpringerPlus, 2016; 5: 644. pmid:27330910
  23. 23. Ruan AK. Research of multi-authority attribute-based signcryption. MA thesis, University of Electronic Science and Technology of China, 2021.
  24. 24. Zhao Y, Ruan A, Dan G, et al. Efficient multi-authority attribute-based signcryption with constant-size ciphertext. 2021 IEEE Conference on Dependable and Secure Computing (DSC). IEEE, 1–8, 2021.
  25. 25. Liu JH, Huang XY, Liu JK. Secure sharing of personal health records in cloud computing: ciphertext-policy attribute-based signcryption. Future Generation Computer Systems, 2015; 52: 67–76.
  26. 26. Belguith S, Kaaniche N, Hammoudeh M, et al. PROUD: Verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted iot applications. Future Generation Computer Systems, 2020; 111: 899–918.
  27. 27. Yu J, Liu S, Wang S, et al. LH-ABSC: a lightweight hybrid attribute-based signcryption scheme for cloud-fog-assisted IoT. IEEE Internet of Things Journal, 2020; 7(9): 7949–7966.
  28. 28. Boneh D, Franklin M. Identity-based encryption from the weil pairing. SIAM Journal on Computing, 2003; 32(3): 586–615.
  29. 29. Joux A. The weil and tate pairing as building blocks for public key cryptosystems. Proceedings of Algorithmic Number Theory, Springer, Berlin, Heidelberg, 20–32, 2002.
  30. 30. PBC Library. The pairing-based cryptography library. http://crypto.stanford.edu/pbc/.