An Efficient Scheme for Secure Medical Data Sharing in the Cloud

Document Type : Research Article

Authors

Faculty of Computer Engineering, Amirkabir University of Technology, Tehran, Iran

Abstract
The Internet of Things has significantly improved healthcare with its promise of transforming technological, social, and economic perspectives. Medical devices with wireless internet access enable remote monitoring of patients, and collectively, these increasingly smart and connected medical devices can provide unique and contemporary medical and health services envisioned to be deployed in a large-scale fashion. For this, medical data and records generally are collected, stored, and shared through open-air wireless networks and public cloud infrastructures, which poses severe challenges regarding the confidentiality of sensitive medical data while maintaining low service overhead and system complexity. This paper presents a novel scheme for secure cloud-assisted Internet of Medical Things connecting patients/smart medical devices to smart applications/medical service providers in a scalable one-to-many fashion to make novel medical services practical. The proposed scheme uses index-based searchable encryption for data screening without decryption. It uses a low-overhead proxy re-encryption scheme for secure data sharing through public clouds

Keywords


1 Introduction

In recent years, many remote and online services have been set to be provided through the Internet, among which remote medical services have received much attention [1]. In a remote medicine environment, various sensors on the body or in the surrounding environment of the patient send the patient’s vital information to a medical center, and according to this data, the patient’s health is monitored, and, if necessary, the required actions are performed by the medical center [2]. In addition, it is required that medical data related to patients is stored in a storage space in a safe manner where it can only be accessed and retrieved by the relevant/authorized personnel. Considering the abundance of data in the storage space and the importance of medical data’s confidentiality and patient privacy, we need a cloud-assisted data-sharing scheme that allows doctors to search for the desired data before retrieving and decrypting the data records [3].

Medical data must be encrypted using symmetric or public key encryption algorithms to enable a safe exchange of medical data generated by the patients’ wireless body area networks (WBANs). Nevertheless, flexible and scalable data sharing with numerous users is challenging with conventional encryption methods. Besides multiple key allocations overhead, there is an enormous extra communication burden associated with multiple data transfers to interested receivers, as identical medical data must be encrypted using various users’ public/private keys and uploaded to the cloud to employ public key encryption. Also, the cloud stores duplicate ciphertexts of the same medical data, wasting storage space. Therefore, a safe and effective data exchange system in telemedicine applications is crucial for cloud-assisted WBANs [4].

This paper proposes a lightweight coupled one-way identifier-based proxy re-encryption protocol (LIPRE) based on elliptic curves to securely share patient health-related data with a semi-trusted publicly accessible cloud. Proxy re-encryption (PRE) is a method for converting encrypted data into a format that a specific receiver can decrypt it [5]. Patients encrypt their data using their public keys before outsourcing data to the cloud in proxy re-encryption. The cloud-resident semi-trusted proxy re-encrypts the data using the re-encryption key without knowing anything about the encrypted message, and the obtained encrypted data is stored on the cloud. In our proposed scheme, an index-based searchable encryption is applied to allow doctors to search among the data before opening the encrypted data. Due to the massive amount of data in the cloud storage space, we reduce the data screening overhead.

We provide a review of the related works, including proxy re-encryption schemes presented in recent years, in the following section. Section 3 describes the system model, including system architecture and adversary model. In Section 4, the proposed LIPRE protocol is presented. Section 5 includes the security analysis of the proposed scheme, and Section 6 provides a complexity analysis of the proposed scheme compared to the existing works. Finally, Section 7 concludes the paper.

2 Related Work

Wang [6] presented an identity-based proxy re- encryption (IBPRE) system with an ancillary input to resist a secret key token from the suggested channel in 2018. Nevertheless, as the number of subkeys increases, so does the length of the re-encryption key and the ciphertext. Xue et al. [7] presented an attribute-based PRE system (ABPRE) for fine-grained access control. The total number of characteristics in this system, which corresponds to the user’s storage capacity, is directly connected to the size of the general parameters. To address the issue of the semi-trusted cloud in PRE, Qin et al. [8] developed a blockchain-based access control system. Data decoding is outsourced under this plan. For the Internet of Things, Su et al. [9] developed a PRE method based on trusted permission to ensure reliable updating of node authentication. To create a flexible definition of user identification, Liang et al. [10] used the idea of proxy re-encryption in attribute-based settings. Numerous ABPRE schemes have been created due to their efforts to expand access policy expression and improve the security model. Unfortunately, none of these ABPRE approaches considers user renunciation, which is crucial for systems that share data. By removing the proxies from the re-encryption key, Ge et al. [11] presented a proxy re-encryption strategy based on a revocable identifier to overcome the key revocation problem. However, a malicious proxy might tamper with the message and send it to the agent. The idea of Identity-Based Broadcast Encryption (IBBE), where the user’s identity is considered the public key in Identity-Based Broadcast Encryption, was suggested by Sakai and Furukawa [12]. A broadcast proxy re-encryption technique by Chu et al. [13] allows a proxy to turn Alice’s ciphertext into a collection of proxies.

By combining El-Gamal encryption with Schnorr’s signature, Deng et al. [14] created a unique bidirectional PRE scheme safe against adaptively selected ciphertext attacks. This approach proves to be more efficient than previous models, and It allows for the development of indistinguishability under adaptive chosen ciphertext attack secure PRE scheme in the standard model, which was later achieved by Wang et al. [15] in 2015, utilizing Cramer-Shoup encryption. Their work was compared to that of Canetti and Hohenberger [16] in terms of efficiency. To address the certification management issue in PRE, Green and Ateniese [17] used classic PRE in identity-based cryptographic primitives for the first time. They also proposed two IB-PRE schemes, one of which is single-hop CCA secure and the other multi-hop CCA safe. In 2014, Yang et al. [18] presented the initial pairing-free CL-PRE technique. They demonstrated the absence of secrecy in Xu et al.’s CL-PRE scheme. They evaluated the computational efficiency of their schemes in comparison to those of Xu et al. [19] and Sur et al. [20].

The scheme proposed in this paper differs from the previous works in several ways. First, we use a one-way identifier-based proxy re-encryption proto- col. We assume a cloud-resident semi-trusted proxy. Besides, we combine the re-encryption algorithm with a searchable encryption algorithm for efficient data screening. The adversary model and security analysis provided in this paper are also among this paper’s contributions.

3 The System Model

3.1 System Architecture

Our system generally includes four entities: patient (data owner), key generation center, cloud service provider, and doctor (data receiver), as shown in Figure 1. The data owner is the patient who wants to store his medical data, which includes information related to the medical record or vital data obtained from sensors, in the cloud service server. In our system model, the patient is considered a trusted person. The cloud service provider is responsible for storing the medical data and is not authorized to access the medical data, and this entity is considered trusted but curious. The key generation center(KGC) is a trusted entity that generates public/private key pairs and sends the private key through a secure channel and the public key through a public channel to cloud users. Moreover, KGC generates a re-encryption key and transmits it to the proxy re-encryption server. The data recipients are doctors who want to access the medical data related to their patients that is stored on the cloud. This entity is untrusted in our system.

Figure 1. Architecture of system

3.2 Adversary Model

We suppose two distinct sorts of attackers, each with different capabilities, aiming to compromise system confidentiality. The first kind of attacker poses as a malicious user accessing the exchanged messages in the system. We further assume he does not have access to the data stored in the cloud. This kind of attacker may be able to modify the messages exchanged over the network. As such, it may be able to change the public key sent to the entities by the KGC, but it cannot get or modify the principal secret keys. The second kind of attacker poses as an inquisitive cloud service provider with complete access to stored data. However, it cannot change any entity’s public keys. Our suggested method ensures that none of these attackers can undermine the confidentiality of the messages.

4 Proposed Scheme

4.1 Preliminaries

An elliptic curve defined over finite field G is as y2= x3 + ax + b. An intriguing property of elliptic curves is that they lead to a group structure, where a and b are elements from G that must satisfy the condition 4a3 + 27 b ≠ 0 to prevent multiple roots. The set’s components are the points on the curve, and some action between the points is necessary to establish a group structure. Point addition and multiplying are the two potential geometrical operations specified over elliptic curve groups [21 ]. Based on the discrete logarithm problem (DLP) for elliptic curves, elliptic curves represent a significant area of cryptography. It claims it is difficult to discover the integer k for which Q = kP is given two points, P and Q, on a curve. The action in this equation is a scalar value point multiplication (P)(k) [22 ].

4.2 The Procedure

The ten algorithms listed below make up the overall syntax of the proposed scheme.

(1) Initial setup: The Key Generation Center is in charge of this algorithm. The algorithm outputs a principal sec ret key MKsec, a principal public key MKpub, and a set of public parameters Υ after receiving a secret parameter b as input.

(2) Create fragmentary key: A certain algorithm executed by Key Generation Center creates a fragmentary public and private key pair (Pparu, Sparu) that corresponds to the user’s identity IDu. This algorithm uses the public parameters Υ, cloud user biometric identifier BIOu, principal secret key MKsec, and principal public key MKpub as inputs.

(3) Create user key: Every cloud user executes an algorithm that takes as inputs the user’s biometric identification BIOu and the public parameters Υ and produces the public key pu and secret key ku for users.

(4) Create private key: This procedure, which receives as inputs public parameters Υ, a fragmentary private key Sparu , and the user’s secret key ku, and return as output the user’s complete private key Sku, is executed by every cloud user u with a biometric identity BIOu.

(5) Create public key: Every cloud user u with identification BIOu performs this algorithm, which uses the user’s secret key ku, public parameters Υ, fragmentary public key Pparu , and public key pu as inputs to create a complete public key Pku for user u.

(6) Encrypt: A plaintext message m containing a keyword w is encrypted using this algorithm by the data owner o using its public key Pko to create primary ciphertext co, which is then uploaded to the cloud.

(7) Create re-encryption key: This algorithm requires the data owner’s public/private key pair (Pko, Sko) and the data recipient’s public key (Pkr) as inputs and generates the re-encryption key rkor as output. The cloud resident proxy server receives a re-encryption key generated by the key generation center, rkor.

(8) Re-encryption: This algorithm is carried out by the proxy server, which converts primary ciphertext co obtained from the data owner o into secondary ciphertext cr for the data receiver r using rkor or returns symbol e if co is invalid.

(9) Search: This algorithm is run by a cloud server that takes the keyword wo from the data owner and the keyword wr from the data receiver and then searches among ciphertexts in its storage space [23 ]. Then, in case of matching the data receiver keyword with the stored ciphertexts keywords, returns ciphered message cr to the data receiver or returns an error symbol e if the keyword does not match.

(10) Decrypt: This algorithm is carried out by the data receiver r, which receives the ciphertext cr and decrypts it using its private key Skr to produce the appropriate plaintext message m or, in case of invalid cr, an error symbol e.

4.3 LIPRE Scheme

The steps of the invented scheme are explained in this section.

Setup: A security parameter b, a b-bit prime, and an elliptic curve E/Fp over a prime finite field Fp are all chosen by KGC. Let G represent the cyclic subgroup of an elliptic curve on E, with P serving as its generator. Additionally, KGC selects the principal secret key sZq* and the principal public key KPub = sP. It also selects the collision-free cryptographic hash algorithm H. The public parameters Υ = {E, Fp, G, P, H, KPub} are returned by this algorithm for publication.

Create fragmentary key: KGC randomly selects xA1 , xA2 , and vA and calculates XA1 = xA1 P, XA2 = xA2 P, VA = vA P . As a result, SA1=(xA1+sH(H(BIO),XA1)),SA21=(xA2+sH(H(BIO),XA2)) and A=vA+sH(H(BIOA),VA,XA1,XA2) are calculated. KGC sends to entity u, XA=(XA1,XA2,VA,A) as a fragmentary public key over a public channel, and SA=(SA1,SA2) as a fragmentary private key over a secure channel.

Set secret value: Each identity u selects yA1 and yA2Zq* at random to serve as secret values for BIOu.

Create private key: This algorithm takes as inputs the user secret key (yA1,yA2), fragmentary private key SA, and public parameters Υ and outputs a complete private key SkA=(SA1,SA2,yA1,yA2) for identity BIOu.

Create public key: This algorithm takes the user’s secret key (yA1,yA2), fragmentary public key XA, and public parameters Υ as inputs, computes uA1=yA1P,uA2=yA2P and creates complete public key PkA=(XA1,XA2,VA,A,uA1,uA2) for identity BIOu.

Create re-encryption key: The identity BIOA, the identity BIOB, the pair of public/private key )PkA,SkA( of the data owner, and the public key PkB of the receiver are all inputs for this algorithm. Re-encryption key rkAB is generated as follows:

dB=XB1+H(H(BIOB),XB1)KPub

dAB=H(yA1dB,SA1uB2,H(BIOA),H(BIOB),PkA,PkB)

rkAB=((SA1+yA1)H(XA1,XA2,uA1,uA2)+SA2+yA2)dAB

>Encrypt: It uses A’s public key PkA, message m, keyword w, and public parameters Υ as inputs to generate the primary ciphertext cA.

(1) It confirms that SA1P=XA1+H(H(BIOu),XA1)KPub and SA2P=XA2+H(H(BIOu),XA2)KPub are valid fragmentary private keys and returns e if it is invalid.

(2) It verifies whether any identity’s public keys are valid. As is represented, βiP=Vi+H(H(BIOu),Vi,Xi1Xi2)KPub. Returns the error symbol e if it is incorrect.

(3) It selects σ{0, 1}n and μzq* and calculates t=H(m,w,σ,BIOA,uA1,uA2) .

(4) It computes c1=tP,c3=μP,c2=(m||σ)H(t(XA1+H(H(BIOA),XA1)Kpub+uA1)H(XA1,XA2,uA1,uA2)+XA2+H(H(BIOA),XA2)KPub+uA2)) , and c4=μ+tH(c1,c2,c3). it returns cA=(c1,c2,c3,c4) For the proxy server.

● Proxy re-encrypt: The primary ciphertext cA, the public parameter Υ, and the re-encryption key rkA→B are all inputs to the cloud-resident proxy server. The received ciphertext is first verified as c4P=c3+H(c1,c2,c3)c1 . If successfully verificate, it generates c′1=c1rkAB and c′2=c2 and then returns the re-encrypted ciphertext cB=(c′1,c′2) for the receiver B. It returns the symbol e if not.

Search: The cloud server runs this algorithm. Takes keywords wA and wB from the parties and searches among stored ciphertexts in the cloud storage as follows:

(1) SrchEnc algorithm takes the secret key SkA and the keyword wA from the data owner A as input and Encrypt them and outputs IA = SrchEnc(SkA, wA).

(2) Transform algorithm takes the ciphertext IA and the re-encryption key rkAB as input and returns I~A=SrchTran(rkAB,IA) as output.

(3) This algorithm creates a trapdoor, taking the secret key SkB and the keyword wB from data receiver B as input. TB = TrapCreat(SkB, wB).

(4) Transform algorithm takes the trapdoor TB and the re-encryption key rkBA as input and outputs T~B=TrapTran(rkBA,TB) .

(5) This part runs a matching searchable encryption algorithm based on Index, and the match function (I~A,T~B) returns 1 in case of matching these two values and, otherwise, returns 0.

Decrypt: It accepts as inputs the public parameters Υ, the cloud user u’s private key Sku, and the ciphertext cu, where u ∈ {A, B} corresponds to user u. It then generates the corresponding plaintext message m; if cu is incorrect, it returns an error symbol e.

Decrypt1: The data owner A calculates (m||σ)=c2H(((SA1+yA1)H(XA1,XA2,uA1,uA2)+SA2+yA2)c1) to decrypt primary ciphertext cA=(c1,c2) using A=(SA1,SA2,yA1,yA2) . If c′1=tP holds, where t′=H(m,w,σ,BIOA,uA1,uA2) returns plaintext m; otherwise, it yields an error symbol e.

Decrypt2: To decrypt secondary ciphertext cB=(c′1,c′2) with SKB=(SB,yB1,yB2) , data receiver B computes:

dA=XA1+H(H(BIOA),XA1)KPub

dBA=H(uA1SB1,dAyB2,H(BIOA),H(BIOB),PkA,PkB)

(m||σ)=c′2H((c′1)/dBA) and returns a plaintext message m if (((XA1+H(H(BIOA),XA1)KPub+uA1)H(XA1,XA2,uA1,uA2)+XA2+H(H(BIOA),XA2)KPub+uA2)dAB)=c′1 holds; otherwise, it returns an error symbol e.

5 Security Analysis

5.1 Informal Security Analysis

The proposed scheme meets forward security due to compliance with key separation and the use of separate keys in different stages of the proxy re-encryption process, and the attacker cannot decrypt previously re-encrypted data even with the private key of the delegator or proxy at a later time. Moreover, the proxy only possesses the necessary information to transform the data from the delegator’s encryption to the delegatee’s encryption and cannot recover any of the encryption keys used by the delegator or delegatee, thus ensuring that forward secrecy is maintained.

The keys used for re-encryption are kept separate from the current private keys, and the proxy cannot access the user’s current private key, and the re-encryption keys are distinct from the user’s current private key to maintain backward secrecy. In this way, backward security is ensured, and even if the attacker obtains the current private key of the protocol entities, the confidentiality of the previously stored data is maintained.

5.2 Formal Security Proof with Random Oracle Model

The formal proof represents that the suggested scheme is provably secure versus adversary A, which wants to obtain the patient’s identity (BIOu), the secret and public key of the patient, the re-encryption key, and the plaintext message of the patient. The collision-resistant one-way hash function and ECDLP are two computationally hard issues. In this method, a mathematical proof is provided to demonstrate that the security of the proposed scheme is reduced to the adversary’s ability to solve these two problems. First, we provide two definitions to prove the security of our proposed scheme in ROM.

Definition 1. The probability that the adversary A would arbitrarily choose the pair (x1, x2) within polynomial time t1 such that x1= x2 and h(x1) = h(x2), as stated formally below, is an advantage for the adversary in finding a collision.

AdvAHash(t1)=Pr[(x1,x2)A:x1̸=x2h(x1)=h(x2)](1)

If AdvAHash(t1)ε1 the one-way hash function h(.) is collision-resistant for every sufficiently small negligible function ε1 > 0.

Definition 2. The elliptic curve discrete logarithm problem (ECDLP) asks for the determination of the integer sZp* from two points P,Q(=[s]P)E(Fp) . While solving the ECDLP during execution time t2, adversary A has an advantage described as

AdvAECDLP(t2)=Pr[sZp*:P,Q=[s]PE(Fp)](2)

Every sufficiently tiny negligible function ε2 > 0 and any probabilistic polynomial time-bounded algorithm A are intractable if AdvAECDLP(t2)ε2.

This formal proof assumes that adversary A has abilities noted in Section 3.2. In addition, adversary A has access to the following oracles:

Reveal(H(M)): Consider the one-way hash function H(M); Oracle will categorically yield the value M .

Extract(Q,P): Consider the input P and Q = [s] P ; the oracle categorically yields the secret value s.

Theorem 1. Considering that ECDLP is a computationally intractable issue and that the cryptographic one-way hash function h(.) behaves like a real random oracle. When obtaining the patient’s identifier BIOi, the secret parameter s, re-encryption key rkA→B, and message m, the proposed scheme is provably secure against adversary A .

Proof. Assume the adversary A is built to perform the algorithm ALGLIPRE,AHash,ECDLP , as given in Algorithm 1, for the proposed proxy re-encryption protocol to determine the patient’s identifier BIOi, secret key s, re-encryption key rkA→B, and con- tent of message. Based on the assumption that the adversary rkA→BA will be able to get the sent messages and parameters over public channel. Hence, SuccLIPRE,AHash,ECDLP=2Pr[AdvLIPRE,AHash,ECDLP=1]-1 expresses the likelihood that ALGLIPRE,AHash,ECDLP will succeed. The advantage for the ALGLIPRE,AHash,ECDLP is the maximum success probability taken across all A with execution time t,AdvLIPRE,AHash,ECDLP(t,q1,q2)=maxA{SuccLIPRE,AHash,ECDLP} , where q1 and q2 represent the number of queries performed to the Oracles Reveal and Extract, respectively.

Assume, based on algorithm ALGLIPRE,AHash,ECDLP , that adversary A may use the oracles Extract and Reveal to solve ECDLP and compute the inverse of cryptographic one-way hash functions. After that, adversary A wins in the game and successfully acquires BIOi, secret parameter s,re-encryption key rkA→B, and message m. The advantages AdvAHash(t1)ε1 and AdvAHash(t2)ε2 for all sufficiently small negligible functions ε1, ε2 > 0 , however, are stated in Definitions 1, 2. Moreover, because every sufficiently tiny ε > 0, it follows that AdvLIPRE,AHash,ECDLP(t,q1,q2)ε. As a result, Theorem 1 is proved.

In this way, it was shown that the plan’s security was first reduced to the security of proxy re-encryption. Then, the security of proxy re-encryption was reduced to the difficulty of the discrete logarithm in the elliptic curve.

Algorithm 1.

6 Performance Comparison

In this part, we assess and compare our suggested scheme with three other schemes. To evaluate the schemes in terms of execution time, we considered a specific execution time for each operation used in the proxy re-encryption schemes. Table 1 shows the considered execution time for each operation. Execution time of exponentiation, bilinear pairing, point multiplication, point addition, and modular inversion operations are 5.31, 16.39, 2.184, 0.22, and 5.16 milliseconds, respectively. We are ignoring the calculation cost associated with these operations because general hash operations and point additions take very little time to compute compared to other operations. We compared our proposed scheme with Yang et al. [18], Osama [24] and Eman [25] proxy re-encryption schemes, and with the help of the execution times in Table 1 and the number of performed operations in each phase of the protocol, we obtained the total execution time of each scheme. Table 2 shows the number of operations and computed execution time for each scheme in that LIPRE achieved the best runtime compared to other schemes. Moreover, there are attacks on Yang et al. [18] scheme, but not discovered attacks on two other schemes, and our scheme resists attacks, too. Th e assumption of each scheme is shown in the table also. Figure 2 shows the comparison diagram of the execution time of the schemes.

symbol description execution time(ms)
te time of exponentiation operation 5.31
tbp time of bilinear pairing operation 16.39
tpm time of ECC point multiplications 2.184
tam time of ECC point addition 0.22
tinv time of modular inversion 5.16
Table 1. Notations used in computation cost analysis
scheme Yang [18] Osama [24] Eman [25] proposed scheme
algorithm
Initial setup te tbp tpm tpm
key generation 6te 3tpm + tinv 3tpm + tinv 9tpm
Encrypt 4te 2te + tinv 2tpm + tam 5tpm
Re-encryption te 3tbp tpm tpm
Decrypt1 3te te + tinv te + tinv 2tpm
Decrypt2 te 4te + tam 4te + tam 5tpm
Total computation time(ms) 84.96 118.43 52.598 50.232
Assumption CDH p-BDHI EC-CDH EC-CDH
Attacked × × ×
Note: Abbreviations: CDH, computational Diffie-Hellman; p-BDHI, p- bilinear Diffie-Hellman inversion ; EC-CDH, elliptic curve computational Diffie-Hellman .
Table 2. Performance comparison

Figure 2. Diagram of time execution comparison

7 Conclusion

sharing while utilizing cloud resources for storing encrypted data without disclosing the contents of that message to the cloud proxy server is a crucial concern. The proxy re-encryption primitive promises to overcome these issues and provide secure data sharing in the cloud. A single-hop, pairing-free, unidirectional Identity-based PRE (LIPRE) scheme based on ECC has been proposed to exchange medical data in public clouds safely. In the random oracle paradigm, the suggested PRE method is proven safe. The suggested scheme is more computationally effective than current schemes and may be employed with existing mobile devices with limited resource availability in the Internet of Medical Things. In future works, we aim to implement our protocol in a real environment to evaluate its performance.

References

  1. S Vishnu, SR Jino Ramson, and R Jegan. In- ternet of medical things (iomt)-an overview. In 2020 5th international conference on devices, circuits and systems (ICDCS), pages 101–104. IEEE, 2020.
  2. Ali Ghubaish, Tara Salman, Maede Zolanvari, Devrim Unal, Abdulla Al-Ali, and Raj Jain. Re- cent advances in the internet-of-medical-things (iomt) systems security. IEEE Internet of Things Journal, 8(11):8707–8718, 2020.
  3. George Hatzivasilis, Othonas Soultatos, Sotiris Ioannidis, Christos Verikoukis, Giorgos Demetriou, and Christos Tsatsoulis. Review of security and privacy for the internet of medical things (iomt). In 2019 15th international confer- ence on distributed computing in sensor systems (DCOSS), pages 457–464. IEEE, 2019.
  4. Mohammad Yaghoubi, Khandakar Ahmed, and Yuan Miao. Wireless body area network (wban): A survey on architecture, technologies, energy consumption, and security challenges. Journal of Sensor and Actuator Networks, 11(4):67, 2022.
  5. David Nun˜ez, Isaac Agudo, and Javier Lopez. Proxy re-encryption: Analysis of constructions and its application to secure access delegation. Journal of Network and Computer Applications, 87:193–209, 2017.
  6. Zhiwei Wang. Leakage resilient id-based proxy re-encryption scheme for access control in fog computing. Future Generation Computer Sys- tems, 87:679–685, 2018.
  7. Liang Xue, Yong Yu, Yannan Li, Man Ho Au, Xiaojiang Du, and Bo Yang. Efficient attribute- based encryption with attribute revocation for assured data deletion. Information Sciences, 479:640–650, 2019.
  8. Xuanmei Qin, Yongfeng Huang, Zhen Yang, and Xing Li. Lbac: A lightweight blockchain-based access control scheme for the internet of things. Information Sciences, 554:222–235, 2021.
  9. Mang Su, Bo Zhou, Anmin Fu, Yan Yu, and Gongxuan Zhang. Prta: A proxy re-encryption based trusted authorization scheme for nodes on cloudiot. Information Sciences, 527:533–547, 2020..
  10. Xiaohui Liang, Zhenfu Cao, Huang Lin, and Jun Shao. Attribute based proxy re-encryption with delegating capabilities. In Proceedings of the 4th international symposium on information, computer, and communications security, pages 276–286, 2009.
  11. Chunpeng Ge, Zhe Liu, Jinyue Xia, and Lim- ing Fang. Revocable identity-based broadcast proxy re-encryption for data sharing in clouds. IEEE Transactions on Dependable and Secure Computing, 18(3):1214–1226, 2019.
  12. Ryuichi Sakai and Jun Furukawa. Identity-based broadcast encryption. Cryptology ePrint Archive, 2007.
  13. Cheng-Kang CHU, Jian Weng, Sherman SW Chow, Jianying Zhou, and Robert H DENG. Conditional proxy broadcast re- encryption.(2009). In Information Security and Privacy: 14th Australasian Conference, ACISP, pages 1–3, 2009.
  14. Robert H Deng, Jian Weng, Shengli Liu, and Kefei Chen. Chosen-ciphertext secure proxy re- encryption without pairings. In Cryptology and Network Security: 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings 7, pages 1–17. Springer, 2008.
  15. Xu An Wang, Jianfeng Ma, and Xiaoyuan Yang. A new proxy re-encryption scheme for protecting critical information systems. Journal of Ambient Intelligence and Humanized Computing, 6:699– 711, 2015.
  16. Ran Canetti and Susan Hohenberger. Chosen- ciphertext secure proxy re-encryption. In Pro- ceedings of the 14th ACM conference on Com- puter and communications security, pages 185– 194, 2007.
  17. Matthew Green and Giuseppe Ateniese. Identity- based proxy re-encryption. In Applied Cryptog- raphy and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China, June 5- 8, 2007. Proceedings 5, pages 288–306. Springer, 2007.
  18. Kang Yang, Jing Xu, and Zhenfeng Zhang. Cer- tificateless proxy re-encryption without pairings. In Information Security and Cryptology–ICISC 2013: 16th International Conference, Seoul, Ko- rea, November 27-29, 2013, Revised Selected Pa- pers 16, pages 67–88. Springer, 2014..
  19. Lei Xu, Xiaoxin Wu, and Xinwen Zhang. Cl-pre: a certificateless proxy re-encryption scheme for secure data sharing with public cloud. In Pro ceedings of the 7th ACM symposium on infor- mation, computer and communications security, pages 87–88, 2012.
  20. Chul Sur, Chae Duk Jung, Youngho Park, and Kyung Hyune Rhee. Chosen-ciphertext secure certificateless proxy re-encryption. In Communi- cations and Multimedia Security: 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31–June 2, 2010. Proceedings 11, pages 214–232. Springer, 2010.
  21. Lawrence C Washington. Elliptic curves: number theory and cryptography. CRC press, 2008.
  22. Darrel Hankerson, S Vanstone, and A Menezes. Guide to elliptic curve cryptography. Springer Science And Business Media, 2006.
  23. Nitish Andola, Raghav Gahlot, Vijay Kumar Ya- dav, S Venkatesan, and Shekhar Verma. Search- able encryption on the cloud: a survey. The Jour- nal of Supercomputing, 78(7):9952–9984, 2022.
  24. Osama A Khashan. Hybrid lightweight proxy re-encryption scheme for secure fog-to-things en- vironment. IEEE Access, 8:66878–66887, 2020.
  25. Eman Abouelkeir. Provable lightweight hybrid proxy re-encryption scheme without pairings for internet of things. 2022.