Designing an Attribute-Based Signature Scheme with Server-Aided Verification for Healthcare Monitoring in Metaverse

Authors

  • Shivani Goel Department of Mathematics, Chaudhary Charan Singh University, Meerut, Uttar Pradesh, India and Department of Mathematics, C.L. Jain College, Firozabad, Uttar Pradesh, India Author
  • Mridul Kumar Gupta Department of Mathematics, Chaudhary Charan Singh University, Meerut, Uttar Pradesh, India Author
  • Saru Kumari Department of Mathematics, Chaudhary Charan Singh University, Meerut, Uttar Pradesh, India Author

DOI:

https://doi.org/10.32628/IJSRSET2512176

Keywords:

Metaverse, Attribute-based signature, Server Aided verification, e-healthcare

Abstract

Introducing the metaverse into the context of attribute-based signatures (ABS), we explore a cryptographic landscape where digital identities transcend physical limitations. In this realm, ABS serves as the gateway for individuals or entities to sign digital artifacts based on predefined attributes, ensuring anonymity while meeting specific criteria. Within the metaverse, ABS schemes play a pivotal role in scenarios where privacy, access control, and fine-grained authorization are paramount, such as secure communication and digital authentication systems, including e-healthcare. However, the computational cost of signature verification remains a significant hurdle in existing ABS schemes. To address this challenge, we present an attribute-based signature scheme with server-aided verification for healthcare monitoring in metaverse. By leveraging server-aided verification criteria, we aim to enhance efficiency, reduce processing time, and optimize the practicality of ABS schemes within the dynamic landscape of the metaverse, particularly in the context of e-healthcare applications.

Downloads

Download data is not yet available.

References

Bera, S., Prasad, S., Rao, Y. S., Das, A. K., and Park, Y. Designing attribute-based verifiable data storage and retrieval scheme in cloud computing environment. Journal of Information Security and Applications 75 (2023), 103482.

Bobba, R., Fatemieh, O., Khan, F., Khan, A., Gunter, C. A., Khurana, H., and Prabhakaran, M. Attribute-based messaging: Access control and confidentiality. ACM Transactions on Information and System Security (TISSEC) 13, 4 (2010), 1–35.

Cao, D., Zhao, B., Wang, X., Su, J., and Ji, G. Multi-authority attribute-based signature. In 2011 Third International Conference on Intelligent Networking and Collaborative Systems (2011), IEEE, pp. 668–672.

Chatterjee, S., Das, A. K., and Sing, J. K. A novel and efficient user access control scheme for wireless body area sensor networks. Journal of King Saud University-Computer and Information Sciences 26, 2 (2014), 181–201.

Chen, Y., Li, J., Liu, C., Han, J., Zhang, Y., and Yi, P. Efficient attribute based server-aided verification signature. IEEE Transactions on Services Computing 15, 6 (2021), 3224–3232.

Cui, H., Deng, R. H., Liu, J. K., Yi, X., and Li, Y. Server-aided attribute-based signature with revocation for resource-constrained industrialinternet-of-things devices. IEEE Transactions on Industrial Informatics 14, 8 (2018), 3724–3732.

Datta, P., Dutta, R., and Mukhopadhyay, S. Short attribute-based signatures for arbitrary turing machines from standard assumptions. Designs, Codes and Cryptography 91, 5 (2023), 1845–1872.

De Guzman, J. A., Thilakarathna, K., and Seneviratne, A. Security and privacy approaches in mixed reality: A literature survey. ACM Computing Surveys (CSUR) 52, 6 (2019), 1–37.

Escala, A., Herranz, J., and Morillo, P. Revocable attribute-based signatures with adaptive security in the standard model. In Progress in Cryptology–AFRICACRYPT 2011: 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings 4 (2011), Springer, pp. 224–241.23

Falchuk, B., Loeb, S., and Neff, R. The social metaverse: Battle for privacy. IEEE technology and society magazine 37, 2 (2018), 52–61.

Ge, A.-J., Ma, C.-G., and Zhang, Z.-F. Attribute-based signature scheme with constant size signature in the standard model. IET Information Security 6, 2 (2012), 47–54.

Gu, J., Zhao, L., and Xue, Z. An efficient and practicable anonymous authentication scheme using smart cards. In 2010 IEEE International Conference on Information Theory and Information Security (2010), IEEE, pp. 470473.

Herranz, J., Laguillaumie, F., Libert, B., and Rafols, C. Short attribute-based signatures for threshold predicates. In Cryptographers’ Track at the RSA Conference (2012), Springer, pp. 51–67.

Hong, J., Liu, B., Sun, Q., and Li, F. A combined public-key scheme in the case of attribute-based for wireless body area networks. Wireless Networks 25 (2019), 845–859.

Hu, C., Zhang, N., Li, H., Cheng, X., and Liao, X. Body area network security: a fuzzy attribute-based signcryption scheme. IEEE journal on selected areas in communications 31, 9 (2013), 37–46.

Hu, M., Luo, X., Chen, J., Lee, Y. C., Zhou, Y., and Wu, D. Virtual reality: A survey of enabling technologies and its applications in iot. Journal of Network and Computer Applications 178 (2021), 102970.

Li, J., Au, M. H., Susilo, W., Xie, D., and Ren, K. Attribute-based signature and its applications. In Proceedings of the 5th ACM symposium on information, computer and communications security (2010), pp. 60–69.

Li, J., Yan, H., and Zhang, Y. Certificateless public integrity checking of group shared data on cloud storage. IEEE Transactions on Services Computing 14, 1 (2018), 71–81.

Li, J., Yan, H., and Zhang, Y. Efficient identity-based provable multicopy data possession in multi-cloud storage. IEEE Transactions on Cloud Computing 10, 1 (2019), 356–365.

Li, J., Yan, H., and Zhang, Y. Identity-based privacy preserving remote data integrity checking for cloud storage. IEEE Systems Journal 15, 1 (2020), 577–585.

Li, M., Lou, W., and Ren, K. Data security and privacy in wireless body area networks. IEEE Wireless communications 17, 1 (2010), 51–58.

Li, P., Lai, J., and Wu, Y. Accountable attribute-based authentication with fine-grained access control and its application to crowdsourcing. Frontiers of Computer Science 17, 1 (2023), 171802.

MacCallum, K., and Parsons, D. Teacher perspectives on mobile augmented reality: The potential of metaverse for learning. In World Conference on Mobile and Contextual Learning (2019), pp. 21–28.

Maji, H., Prabhakaran, M., and Rosulek, M. Attribute based signatures: Achieving attribute privacy and collusion-resistance. 2008. EPRINT http://eprint. iacr. org/2008/328 (2008).

Maji, H. K., Prabhakaran, M., and Rosulek, M. Attribute-based signatures. In Cryptographers’ track at the RSA conference (2011), Springer, pp. 376–392.

Mystakidis, S. M. Encyclopedia 2022, 2, 486–497, 2022.

Oberko, P. S. K., Obeng, V.-H. K. S., Xiong, H., and Kumari, S. A survey on attribute-based signatures. Journal of Systems Architecture 124 (2022), 102396.

O’Brolch´ ain, F., Jacquemard, T., Monaghan, D., O’Connor, N., Novitzky, P., and Gordijn, B. The convergence of virtual reality and social networks: threats to privacy and autonomy. Science and engineering ethics 22 (2016), 1–29.

Qian, Y., and Zhao, Y. Strongly unforgeable attribute-based group signature in the standard model. In 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems (2010), vol. 1, IEEE, pp. 843-852.

Rafique, M. U., and Sen-ching, S. C. Tracking attacks on virtual reality systems. IEEE Consumer Electronics Magazine 9, 2 (2020), 41–46.

Shahandashti, S. F., and Safavi-Naini, R. Threshold attribute-based signatures and their application to anonymous credential systems. In Progress in Cryptology–AFRICACRYPT 2009: Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings 2 (2009), Springer, pp. 198–216.

Shi, R., Feng, H., Yang, Y., Yuan, F., Li, Y., Pang, H. H., and Deng, R. H. Threshold attribute-based credentials with redactable signature. IEEE Transactions on Services Computing 16, 5 (2023), 3751–3765.

Smart, J., Cascio, J., Paffendorf, J., Bridges, C., Hummel, J., Hursthouse, J., and Moss, R. A cross-industry public foresight project. Proc. Metaverse Roadmap Pathways 3DWeb (2007), 1–28.

Syal, S., and Mathew, R. Threats faced by mixed reality and countermeasures. Procedia Computer Science 171 (2020), 2720–2728.

Tan, S.-Y., Heng, S.-H., and Goi, B.-M. On the security of an attribute based signature scheme. In U-and E-Service, Science and Technology: International Conference, UNESST 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings (2009), Springer, pp. 161–168.

Tian, Y., Peng, Y., Peng, X., and Li, H. An attribute-based encryption scheme with revocation for fine-grained access control in wireless body area networks. International Journal of Distributed Sensor Networks 10, 11 (2014), 259-798.

Wang, C., Xu, X., Li, Y., and Shi, D. Integrating ciphertext-policy attribute-based encryption with identity-based ring signature to enhance security and privacy in wireless body area networks. In Information Security and Cryptology: 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers 10 (2015), Springer, pp. 424–442.

Wang, Z., Xie, R., and Wang, S. Attribute-based server-aided verification signature. Applied Mathematics & Information Sciences 8, 6 (2014), 31-83.

Yan, H., Li, J., and Zhang, Y. Remote data checking with a designated verifier in cloud storage. IEEE Systems Journal 14, 2 (2019), 1788–1797.

Yao, L., Hou, L., Weng, J., and Zhao, F. Provably secure attributebased authenticated encryption with keyword search from ideal lattices. Science China Information Sciences 67, 1 (2024), 119-101.

Yu, S., Ren, K., and Lou, W. Fdac: Toward fine-grained distributed data access control in wireless sensor networks. IEEE transactions on parallel and distributed systems 22, 4 (2010), 673–686.

Downloads

Published

01-06-2025

Issue

Section

Research Articles

How to Cite

[1]
Shivani Goel, Mridul Kumar Gupta, and Saru Kumari, “Designing an Attribute-Based Signature Scheme with Server-Aided Verification for Healthcare Monitoring in Metaverse”, Int J Sci Res Sci Eng Technol, vol. 12, no. 3, pp. 1295–1314, Jun. 2025, doi: 10.32628/IJSRSET2512176.