Next Article in Journal
Beyond “One-Size-Fits-All”: Estimating Driver Attention with Physiological Clustering and LSTM Models
Previous Article in Journal
Influence of Multi-Source Electromagnetic Coupling on NVH in Automotive PMSMs
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Certificateless Proxy Re-Encryption Scheme for the Internet of Medical Things

Department of Computer Science and Engineering, National Taiwan Ocean University, Keelung 202, Taiwan
*
Author to whom correspondence should be addressed.
Electronics 2025, 14(23), 4654; https://doi.org/10.3390/electronics14234654
Submission received: 7 October 2025 / Revised: 21 November 2025 / Accepted: 25 November 2025 / Published: 26 November 2025
(This article belongs to the Special Issue Security and Privacy Challenges in Integrated IoT and Edge Systems)

Abstract

With the rapid development of the Internet of Medical Things (IoMT), the data generated and collected by various sensors and medical devices are gradually increasing. How to realize flexible, efficient, and secure data sharing while ensuring data confidentiality and patient privacy has become a critical research challenge. The traditional Public Key Infrastructure (PKI) must deal with the complicated certificate management problem. An identity-based cryptosystem has the inherent key-escrow risk. These concerns make them unsuitable for resource-constrained and dynamic IoMT environments. To address it, this paper introduces a cloud data sharing protocol for IoMT using a Certificateless Proxy Re-encryption (CL-PRE) scheme that integrates an efficient access-list-based user revocation mechanism. In our system, a patient’s data can be encrypted and securely stored in a semi-trusted third party like the cloud server. When the patient wants to grant the access to designated users, e.g., doctors or medical institutions, a delegated proxy server will re-encrypt the ciphertext to a new one, which is decryptable by the designators. The proxy server also learns nothing during the re-encryption process, so as to maintain the end-to-end confidentiality. As for the security, the authors formally prove that the proposed CL-PRE mechanism for IoMT achieves Type-I and Type-II indistinguishability against adaptive chosen-identity and chosen-ciphertext attacks (IND-PrID-CCA) under the Decisional Bilinear Diffie–Hellman (DBDH) assumption. Moreover, the functional and computational comparisons with previous studies reveal the qualitative advantage of simultaneously achieving certificateless properties and user revocation, and the quantitative advantage of an optimized encryption cost (requiring only one bilinear pairing and two scalar multiplications), making it a theoretically efficient solution for resource-constrained IoMT devices.

1. Introduction

The advancement of information technology and the increasing demand for healthcare have promoted the emergence of profound IoT applications [1,2,3,4,5] in the medical field, known as the Internet of Medical Things (IoMT) [6,7,8]. It utilizes various wearable devices, embedded sensors, remote monitoring systems, and other smart medical equipment to enable the real-time collection, transmission, and analysis of patients’ vital data (such as heart rate, blood glucose, and blood oxygen saturation.) These data not only provide unprecedented convenience for personal health management and chronic disease tracking, but also constitute valuable information assets for remote medical care, precise diagnosis, and clinical research.
However, the processed data in IoMT systems are highly sensitive and private. Any unauthorized access, compromise, or alteration may pose serious threats to patients’ privacy and even to their life safety. Hence, ensuring the confidentiality, integrity, and availability of such sensitive medical data during transmission over open and complex network environments has become a key issue for the widespread adoption and success of IoMT applications.
To realize a secure, flexible, and efficient medical data-sharing model that treats patients as the center, the technique of Proxy Re-encryption (PRE) [9,10,11,12,13] provides a promising solution. It allows a data owner (such as a patient) to generate a special re-encryption key and give it to a semi-trusted proxy server (such as the cloud). The proxy server is therefore able to use this key to convert a ciphertext encrypted with a patient’s public key into another one that is able to be decrypted by the private key of authorized user (such as a doctor). In particular, during the entire transformation process, the proxy server is unable to learn anything about the original data. This property perfectly matches the requirements of medical data sharing [14,15,16].
While various PRE schemes have been proposed, they often suffer from issues such as the key-escrow problem in identity-based systems, the lack of user revocation mechanisms, or insufficient security guarantees (e.g., only achieving CPA security). These limitations hinder their practical application in sensitive IoMT environments.
Motivated by the demand for secure data sharing in IoMT applications, we propose a new CL-PRE scheme with user revocation. Our main contributions are as follows:
  • We design a secure data sharing framework for IoMT using the CL-PRE mechanism that eliminates the key-escrow problem inherent in identity-based cryptosystems and avoids the complex certificate management of traditional PKI.
  • The proposed scheme supports a flexible user revocation without incurring extra computational cost. This property is essential for managing user access rights in dynamic IoMT systems.
  • The proposed CL-PRE scheme appeals to resource-constrained IoMT devices, as the encryption cost is specifically optimized.
  • We formally prove that our scheme achieves indistinguishability against adaptive chosen-identity and chosen-ciphertext attacks (IND-PrID-CCA) under the Decisional Bilinear Diffie–Hellman (DBDH) assumption.
The remainder of this paper is organized as follows. Section 2 reviews related works. We present the proposed CL-PRE scheme for IoMT in Section 3. The formal security proof and comparison will be given in Section 4. Finally, we provide a conclusion with the future work in Section 5.

2. Related Works

In recent years, many Proxy Re-encryption (PRE) schemes have been developed for facilitating secure data sharing. In 2010, Wang et al. [17] introduced an identity-based PRE (IB-PRE) scheme that does not rely on the assumption of a semi-trusted proxy. In other words, their scheme is secure against collusion attacks. Moreover, their scheme has the property of no ciphertext expansion, meaning that the re-encrypted ciphertext and the original one have the same size. In 2013, Seo et al. [18] came up with a type-based PRE (TB-PRE) scheme in which a proxy could only re-encrypt those ciphertexts with a special type designated by the data owner. Additionally, their scheme has the proxy-invisible property, which prevents an adversary from distinguishing an original ciphertext from a re-encrypted one. They also proved that their scheme achieves chosen-ciphertext attacks (CCA) security in the standard model.
In 2018, a so-called sender-specified PRE (SS-PRE) scheme was addressed by Zeng et al. [19]. An SS-PRE scheme is a special kind of conditional Proxy Re-Encryption (C-PRE) schemes [20,21,22,23] and it allows the delegator to authorize the decryption right of a ciphertext from a designated sender to their delegatee. They formalized the definition and security model of the SS-PRE scheme and provided a concrete CCA-secure construction that supports both unidirectionality and single-use.
To address the key-escrow problem in identity-based systems, in 2020, Zhang et al. [24] employed an anonymous key generation technique and PRE to present an ID-based data storage protocol for fog computing. Although their scheme offers certain computational advantages, several security weaknesses have been identified by [25]. Considering data sharing in IoT environments, Lin and Chen [26] proposed a revocable and fog-enabled PRE scheme that uses a periodically updated time key to achieve user revocation.
In 2022, Zhou et al. [27] addressed a backdoor-resistant IB-PRE scheme for cloud-assisted wireless body area networks. Specifically, their scheme integrates a cryptographic reverse firewall and can withstand exfiltration attacks in multi-access telemedicine data sharing scenarios. Nevertheless, both the Lin-Chen [26] and their systems are identity-based and fail to address the inherent key-escrow problem.
Leveraging the advantages of certificateless public key systems, Ren et al. [28] presented an autonomous path PRE (AP-PRE) scheme for cloud data sharing. In their design, a data owner is in charge of the entire delegation path in a multi-hop delegation procedure. Yet, their scheme does not include a revocation mechanism, which is essential for data sharing in the cloud. More recently, Eltayieb et al. [29] proposed a certificateless PRE (CL-PRE) scheme with cryptographic reverse firewalls for secure cloud data sharing. Although their scheme provides a flexible revocation mechanism to prevent privacy leakage, it only achieves chosen plaintext attack (CPA) security.

2.1. Revocation Mechanism in PRE

A critical function for practical data sharing in dynamic IoMT environments is user revocation. As mentioned the above, several schemes, such as Ren et al. [28], do not include this essential mechanism. Existing revocable schemes utilize several main approaches. The time-based approach, such as Lin and Chen [26], achieves revocation by combining ciphertexts with specific time periods. The key/ciphertext evolution approach, used by Eltayieb et al. [29] and Yao et al. [30], links revocation to key updates. In this approach, an update-key is generated, allowing the proxy to evolve either existing ciphertexts or re-encryption keys to be compatible with the new key, thus automatically revoking old keys. Hybrid system-level approaches have also been proposed; for example, Worapaluk and Fugkeaw [31] integrated blockchains to manage revocation transactions. Our proposed scheme adopts an efficient access-list-based revocation mechanism, where the cloud server simply checks a revocation list (RVL) during a query process. The advantage of the list-based approach lies in its flexibility and cost-free nature, although the storage cost increases linearly with the number of revoked users.

2.2. Post-Quantum Secure PRE

Beyond the above works, a noticeable direction in recent cryptographic research is to develop post-quantum secure (PQC) schemes. Traditional pairing-based schemes cannot resist attacks from large-scale quantum computers. Therefore, researchers have begun exploring PRE schemes based on PQC-hard problems, such as lattices. For example, in 2023, Liang et al. [32] addressed a lattice-based PRE with keyword search (PRES), which is proven to be secure under the LWE hard assumption. Zhang et al. [33] introduced an IB-PRE scheme using the LWE problem with short public parameters. In particular, their scheme utilizes the blocking operation to decrease the public parameters and can be proved secure in the standard model. While PQC-PRE represents a crucial direction for long-term security, these schemes often present different trade-offs in computational and communication overhead. Our work, therefore, focuses on enhancing the security and functionality of the highly efficient and practical (though non-PQC) pairing-based paradigm for current IoMT environments.

3. Proposed CL-PRE System for IoMT

We first present preliminaries, the system party, algorithm definition, and security models of the proposed CL-PRE system for IoMT and then give a concrete construction.

3.1. Preliminaries

Before formally introducing the proposed scheme, we first describe the utilized mathematical operations and related cryptographic assumption.
  • Bilinear Pairing
    Assume that the notations of G1 and GT denote two multiplicative groups. The order of both groups is a prime p. The symbol g represents a generator of G1. We can express a bilinear pairing as e: G1 × G1GT, satisfying the characteristics outlined below:
    • Bilinearity: Given u, vZp, the value e(gu, gv) equals e(g, g)uv.
    • Non-degeneracy: The value e(g, g) does not equal 1 for some generator gG1.
    • Computability: There is an efficient algorithm to calculate the value e(X, Y) for all X, YG1.
  • Decisional Bilinear Diffie–Hellman (DBDH) Problem
    To determine whether WGT equals the value e(g, g)abc from a given tuple (g, ga, gb, gc, W).
  • Decisional Bilinear Diffie–Hellman (DBDH) Assumption
    The advantage is negligible for any probabilistic attacker to solve a given DBDH instance in polynomial time.

3.2. System Party

In general, a CL-PRE scheme for IoMT is composed of four parties as follows:
  • Key Generator Center (KGC): The KGC is in charge of creating system’s public parameters and issuing the partial private key for all system parties. However, the KGC will be unable to learn the genuine private key of any user due to the secret value chosen by the user themselves.
  • Data Owner (DO): A data owner is a patient who produces their health data via all kinds of wearable IoMT devices. These IoMT devices will encrypt sensed data with the data owner’s public key and then transmit the ciphertext to the cloud. If someone requests the encrypted health data in the cloud, the data owner/patient can authorize a re-encryption key to the cloud for performing ciphertext transformation.
  • Data User (DU): A data user is an institution or medical staff who attempt to access the encrypted health data stored in the cloud. If access request is granted, they will receive the re-encrypted ciphertext that is decryptable by their own private keys.
  • Cloud Server (CS): The CS is viewed as a semi-trusted proxy responsible for storing the encrypted health data as well as maintaining the obtained re-encryption keys authorized by the data owner. It also performs ciphertext re-encryption process without learning the content of health data.

3.3. Algorithm Definitions

The following are definitions of the algorithms used in this paper:
  • Setup: The KGC utilizes a security parameter l as its input to generate a master secret key (Msk) and initializes the system public parameters (PP).
  • PPKeyGen: The KGC utilizes PP and Msk to produce a partial private key (du) for the user IDu.
  • Set-Secret-Value: Each user IDu determines a secret value (ssu) for themselves.
  • Set-Private-Key: Each user IDu sets their full private key (sku).
  • Set-Public-Key: Each user IDu sets their full public key (pku).
  • Encryption: The DO creates a ciphertext (CT) by taking the inputs of PP, a plaintext (M), an identity (IDo), a symmetric key (K), and a secret value (sso).
  • Query: The DU creates a query token W by taking the input of an identity (IDu) and a random number.
  • ReKeyGen: The DO creates a re-encryption key (Rk) by taking the inputs of PP, an identity (IDu), a query token (W), the public key (pku) of IDu, and a secret value (sso) of the DO.
  • Re-encryption: The CS generates a re-encrypted ciphertext (CT’) by taking the inputs of a re-encryption key and a ciphertext (CT).
  • Decryption: The DU recovers the original plaintext (M) by taking the inputs of a transformed ciphertext (CT’), a token seed together with a private key (sku). Similarly, the DO can also recover the original plaintext (M) by taking the inputs of a ciphertext (CT) and a private key (sko).
  • Revocation: The KGC creates a renewed revocation list (RVL) by taking the input of a revoked identity IDru.

3.4. Security Model

The essential security notion of a CL-PRE scheme for IoMT is indistinguishability against adaptive chosen-identity and chosen-ciphertext attacks (IND-PrID-CCA). To satisfy such a security notion, we consider two types of adversaries. A type-I adversary is an outsider who does not know any information about legitimate user’s private key but is able to replace the public key of legitimate users. A type-II adversary is a malicious KGC who controls the partial private key of legitimate users but cannot replace the public key of legitimate users. Our security model for IND-PrID-CCA is based on the standard definitions used in certificateless cryptography, similar to the model presented in [28]. We present the corresponding definitions below.
Definition 1.
(Type-I IND-PrID-CCA):
A CL-PRE scheme is considered secure against adaptive chosen-identity and chosen-ciphertext attacks (IND-PrID-CCA) by a Type-I adversary if no probabilistic polynomial-time (PPT) adversary  𝒜 has a non-negligible advantage in the following game played with a challenger :
  • Initialization: At first, performs the Setup algorithm to obtain PP as well as the Msk. The former is given to 𝒜.
  • Phase 1: 𝒜 is permitted to adaptively make the following queries:
  • PPKeyGen Queries: 𝒜 submits an identity IDu to who returns the corresponding partial private key du.
  • Full Private Key Queries: 𝒜 submits an identity IDu to who returns the corresponding full partial private key sku.
  • Public Key Queries: 𝒜 submits an identity IDu to who returns the corresponding full public key pku.
  • Replace Public Key Queries: 𝒜 submits an identity IDu and a public key pku1 to who replaces the corresponding public key pku1 with pku1. Note that after the public key of IDu has been replaced, 𝒜 cannot query the corresponding full private key.
  • Re-encryption Key Queries: 𝒜 submits two legitimate identities (IDo, IDu) to who outputs a related transformation key Rk.
  • Decryption Queries: 𝒜 submits a re-encrypted ciphertext CT’ to who returns either a plaintext M or an error symbol ⊥.
  • Challenge: 𝒜 submits a chosen identity ID*, two plaintexts (M0*, M1*) of equal lengths to who creates a challenge ciphertext CT* by internally generating a symmetric key K*, flipping a coin λ ∈ {0, 1}, and encrypting Mλ* using K* under ID*. The challenge ciphertext is then given to 𝒜. This challenge is valid only under the condition that ID* was not the subject of any PPKeyGen, Full Private Key, or Re-encryption Key queries during Phase 1.
  • Phase 2: 𝒜 makes new queries as those stated in Phase 1 under the constraints below:
  • A PPKeyGen query for ID* is disallowed.
  • A Full Private Key query for ID* is disallowed.
  • A Re-encryption key query with respect to ID* would be disallowed.
  • A Decryption query with respect to (ID*, CT*) is disallowed.
  • The maximum query times for PPKeyGen, Full Private Key, Public Key, Replace Public Key, Re-encryption Key, and Decryption queries are bounded by qpsk, qsk, qpk, qrpk, qrek, and qd.
  • Guess: After Phase 2 ends, 𝒜 guesses a bit λ’. As long as λ’ = λ, 𝒜 succeeds in the game. We therefore express the advantage of 𝒜 as Adv(𝒜) = |Pr[λ’ = λ] − 1/2|.
Definition 2.
(Type-II IND-PrID-CCA):
A CL-PRE scheme is secure against a Type-II adversary (a malicious KGC) if no PPT adversary 𝒜 has a non-negligible advantage in the following game:
  • Initialization: At first, performs the Setup algorithm to obtain PP and the Msk and then gives both to 𝒜.
  • Phase 1: The adversary 𝒜 is permitted to adaptively ask the following queries:
  • Full Private Key Queries: 𝒜 submits an identity IDu to who returns the corresponding full partial private key sku.
  • Public Key Queries: 𝒜 submits an identity IDu to who returns the corresponding full public key pku.
  • Re-encryption Key Queries: 𝒜 submits two legitimate identities (IDo, IDu) to who outputs the related transformation key Rk.
  • Decryption Queries: 𝒜 submits a re-encrypted ciphertext CT’ to who outputs either a plaintext M or an error symbol ⊥.
Since 𝒜 possesses the Msk, it can compute any user’s partial private key at will, thus PPKeyGen Queries are unnecessary for this adversary type.
  • Challenge: 𝒜 sends a chosen identity ID*, two plaintexts (M0*, M1*) of equal lengths to who creates a challenge ciphertext CT* by internally generating a symmetric key K*, flipping a coin λ ∈ {0, 1}, and encrypting Mλ* using K* under ID*. The challenge ciphertext is then given to 𝒜. This challenge is valid only under the condition that ID* was not the subject of any Full Private Key or Re-encryption Key queries during Phase 1.
  • Phase 2: The adversary 𝒜 makes new queries as those stated in Phase 1 under the constraints below:
  • A Full Private Key query for ID* is disallowed.
  • A Re-encryption Key query with respect to ID* is disallowed.
  • A Decryption query with respect to (ID*, CT*) is disallowed.
  • The maximum query times for Full Private Key, Public Key, Re-encryption Key, and Decryption queries will be bounded by qsk, qpk, qrek, and qd.
  • Guess: After Phase 2 ends, 𝒜 guesses a bit λ’. As long as λ’ = λ, 𝒜 succeeds in the game. We therefore express the advantage of 𝒜 as Adv(𝒜) = |Pr[λ’ = λ] − 1/2|.

3.5. Construction

We present a concrete CL-PRE scheme for IoMT according to previous definition of algorithms. The system model is shown as Figure 1. Some used symbols are defined as shown in Table 1.
  • Setup(1ζ) → (PP, Msk)
    Taking the security parameter l as an input, the KGC chooses αR Zp to be the Msk and produces PP = (e, G1, GT, g, H1~2, Mpk, SE, SD) as follows. Here, PP stands for the set of all system-wide public parameters, which includes the Master Public Key (Mpk) as one of its components.
    (1)
    Two multiplicative groups are separately expressed as G1 and GT. Each of them has prime order p and let g be a generator of G1. A symmetric bilinear pairing could be written as e: G1 × G1GT.
    (2)
    Two collision-resistant cryptographic hash functions are denoted as H1 and H2. The former accepts variable-length inputs and maps the result to an element in G1 while the latter also maps the result to an element in G1 but only accepts an element from GT.
    (3)
    The master public key Mpk is derived as N = gα.
    (4)
    A symmetric encryption and decryption functions are denoted as SE and SD, respectively.
  • PPKeyGen(PP, Msk, IDu) → (du)
    A user can request his partial private key by the following processes with the KGC:
    (1)
    A user transmits his identity IDu to the KGC.
    (2)
    The KGC calculates du = H1(IDu || IDKGC)α and sends du back to IDu.
    (3)
    The correctness of generated partial private key could be verified if
    e(du, g) = e(H1(IDu || IDKGC), N)
  • Set-Secret-Value(PP, IDu) → (ssu)
    A user IDu designates his secret value as ssuR Zp.
  • Set-Private-Key(PP, IDu, du, ssu) → (sku)
    A user IDu sets sku = (du, ssu) as his/her full private key.
  • Set-Public-Key(PP, IDu, ssu) → (pku)
    A user IDu first calculates Yu = gssu and then sets pku = (Yu, H1(IDu || IDKGC)) as his/her full public key.
  • Encryption(PP, IDo, K, M, sso) → (CT)
    To create a ciphertext CT = (CT1, CT2) for the data M composed of (M1, M2, …, Mn), the DO, with identity IDo, uses PP, a symmetric key K, along with his secret value sso to perform the following processes. The DO first selects hZp and derives
                EO, 1 = K · e(N, H1(IDo || IDKGC)hsso)
    EO, 2 = gh
        CT1 = (EO, 1, EO, 2)
               CT2 = (SE(K, M1)…, SE(K, Mn))
    Here, the ciphertext CT = (CT1, CT2), an associated file index FM, and the identity IDo are delivered to the CS for storage.
  • Query(PP, IDu, FM) → (W)
    To retrieve the ciphertext for a given file index FM, the DU, with identity IDu, first chooses a query number vZp and then derives
    V = gv
    The query token W = (V, IDu, FM) will be sent to the CS who will check whether IDu is in the revocation list RVL. If it does, the CS will reject the request. Otherwise, the CS forwards the token W to the DO. The component V (derived from the user’s secret v) serves a dual purpose: it is first used by the data owner (DO) in the ReKeyGen algorithm to generate the re-encryption key, and the corresponding secret v is later required by the data user (DU) to perform the final decryption.
  • ReKeyGen(PP, W, sko) → (Rk)
    The DO first chooses z, rZp and then calculates
    Rk1 = Nz
                       Rk2 = (do)sso · Rk1/H2(e(N, H1(IDu || IDKGC)VrYu))
                         = ((do)sso · Nz)/H2(e(N, H1(IDu || IDKGC)gvrYu))
      Rk3 = e(gr, N)
    Here, the ciphertext transformation key Rk composed of Rk1, Rk2, and Rk3 will be forwarded to the CS.
  • Re-encryption(PP, IDu, Rk, CT) → CT
    To re-encrypt the ciphertext CT for DU, the CS uses the authorized re-encryption key Rk to compute
        E′O, 1 = EO, 1 · e(Rk1, EO, 2)
                    = K · e(Nsso, H1(IDo || IDKGC)h)e(Nz, gh)
    E′O, 2 = EO, 2 = gh
                        E′O, 3 = Rk2 = ((do)sso · Nz)/H2(e(N, H1(IDu || IDKGC)gvrYu))
       E′O, 4 = Rk3 = e(gr, N)
            CT′1 = (E′O, 1, E′O, 2, E′O, 3, E′O, 4)
    Finally, the CS sends the re-encrypted ciphertext CT’ = (CT1, CT2) to the DU.
  • Decryption(CT, sku) → (M = M1, M2, …, Mn)
    If the DO wants to decrypt their own ciphertext CT, they can use their partial private key do to recover the symmetric key K as
    K = E O ,   1 e ( E O ,   2 s s o ,     d o )
    and then decrypt {Mi = SD(K, SE(K, Mi))}i = 1, …, n.
    For the DU to decrypt a requested ciphertext CT’, they first use their full private key sku = (du, ssu) and the previously selected query number v to compute
            X = E O ,   3 · H 2 ( E O , 4 v e ( d u N s s u ,   g ) )
      = (do)sso · Nz
              = (H1(IDo || IDKGC)α)sso · Nz
      K = E O , 1 e X ,     E O , 2
    and then decrypt {Mi = SD(K, SE(K, Mi))}i = 1, …, n. The correctness for the derivation of the symmetric key K can be confirmed as follows:
    E O , 1 e X ,     E O , 2 = K   ·   e ( N s s o ,     H 1 ( I D o | | I D K G C ) h ) e ( N z ,   g h ) e ( H 1 ( I D o | | I D K G C ) α s s o N z ,   g h ) = K
  • Revocation(IDru) → RVL
The KGC is responsible for maintaining the system’s revocation list (RVL). To revoke a user IDru, the KGC updates the list as RVLRVL ∪ {IDru} and securely distributes this updated list to the CS. The CS is responsible for enforcing this revocation. As described in the Query algorithm, the CS will check this list upon receiving a query request and reject any request from an identity present in the RVL.

4. Security Proof and Comparison

In this section, we provide the formal security proof for our proposed CL-PRE scheme for IoMT according to previous security models and evaluate its computational performance.

4.1. Security Proof

In this subsection, we first prove that the proposed scheme achieves IND-PrID-CCA security in the random oracle model under the DBDH assumption.
Theorem 1.
(Proof of Type-I IND-PrID-CCA)
The designed CL-PRE system for IoMT fulfills the security requirement of IND-PrID-CCA provided that any Type-I adversary 𝒜 cannot own a non-negligible advantage ε to defeat a challenger  who tries to break the DBDH problem in the following game.
Proof. 
We utilize the random oracle model (ROM) in this proof and treat H1 as a random oracle. Assume that the Type-I adversary 𝒜 has a non-negligible advantage ε to break ciphertext indistinguishability of the proposed system under adaptive chosen-ciphertext attacks and the challenger is given a DBDH instance of (g, ga, gb, gc, Q), in which a, b, cZp and QGT. The purpose of is to distinguish Q from e(g, g)abc by using the advantage of 𝒜.
  • Initialization: By performing the Setup(1l) algorithm, first sets Mpk to be N = ga, which implicitly defines the Msk to be the integer a that does not know. Then, sends PP = (e, G1, GT, g, p, H2, Mpk, SE, SD) to 𝒜.
  • Phase 1:  responds the queries 𝒜 made below:
  • H1 Oracles: To respond to an H1(IDu || IDKGC) query, the challenger searches the stored H1-list for previous records. If no matched entry exists, tosses a coin cc with Pr[cc = 1] = π. When cc equals 0, derives the return value Oh1 = g b h 1 , in which h1R Zp. Otherwise, sets Oh1 = g h 1 . The entry (IDu, cc, h1, Oh1) is also added to the H1-list.
  • PPKeyGen Queries: To respond to a PPKeyGen query of IDi, the challenger first makes an H1(IDi || IDKGC) query and then aborts as long as cc equals 0. Otherwise, derives the return value di = N h 1
  • Full Private Key Queries: To respond to a Full Private Key query of IDi, the challenger first makes an H1(IDi || IDKGC) query and then aborts as long as cc equals 0. Otherwise, obtains the secret value ssi by the Set-Secret-Value(PP, IDi) algorithm and sets the return value ski = ( N h 1 , ssi).
  • Public Key Queries: To respond to a Public Key query of IDi, the challenger obtains Oh1 and the secret value ssi by H1(IDi || IDKGC) oracle and the Set-Secret-Value(PP, IDi) algorithm, respectively. Then and sets the return value pki = (Oh1, Yi = gssi).
  • Replace Public Key Queries: To respond to a Replace Public Key query of (IDi, Yi, Yi’), in which the Full Private Key query of IDi has never been made, the challenger replaces the associated public key Yi with Yi’.
  • Re-encryption Key Query: To respond to a Re-encryption Key query of (IDo, IDu, FM), in which IDuRVL, first makes an H1(IDo || IDKGC) query and might abort if cc equals 0. If not, obtains the secret value sso by the Set-Secret-Value(PP, IDo) algorithm and derives full private key sko = ( N h 1 , sso). Next, calculates the token W by performing the Query(PP, IDu, FM) algorithm and finally derives the returned ciphertext transformation key Rk composed of (Rk1, Rk2, Rk3) with the algorithm of ReKeyGen(PP, W, sko).
  • Decryption Query: To respond to a Decryption query of (IDu, CT’), in which IDuRVL, first makes an H1(IDu || IDKGC) query and might abort if cc equals 0. If not, obtains the secret value ssu by the Set-Secret-Value(PP, IDu) algorithm and derives full private key sku = ( N h 1 , ssu). Next, outputs the result of Decryption(CT’, sku) process.
  • Challenge: 𝒜 submits a chosen identity, say ID*, two plaintexts (M0*, M1*) of equal lengths to who creates a challenge ciphertext CT* = (EO, 1*, EO, 2*, CT2*) by internally generating a symmetric key K*, flipping a coin λ ∈ {0, 1}, and encrypting Mλ* using K* under ID* as follows. The challenge ciphertext is then given to 𝒜.
  • Without loss of generality, it is assumed that the H1(ID* || IDKGC) oracle has been made by 𝒜. In this case, whenever the value cc* equals 1, the challenger directly aborts.
  • Otherwise, the associated value h1 could be fetched from the H1-list. Then sets the secret value of ID* to be ss* ∈R Zp and computes
      E O ,   1 * = K * Q h 1 s s *   where   H 1 ( I D *   | |   ID PKG ) = ( g b ) h 1
EO, 2* = gc
CT 2 * = ( SE ( K * ,   M λ 1 * ) ,   ,   SE ( K * ,   M λ n * ) )
3.
Here, the challenge ciphertext CT* = (EO, 1*, EO, 2*, CT2*) is given to 𝒜.
  • Phase 2: 𝒜 makes new queries as those described in previous phase under the limits outlined in Definition 1.
  • Guess: After Phase 2 ends, 𝒜 guesses a bit λ’. Provided that λ’ = λ, outputs 1 implying that Q equals e(g, g)abc. If Qe(g, g)abc, outputs 0.
  • Analysis: Based on the ciphertext CT* properly simulated in the challenge phase, it will be valid if only Q equals e (g, g)abc. In this case, the adversary 𝒜 owns an assumed advantage to break our scheme, meaning that Adv(𝒜) = | Pr[λ’ = λ]   1 2 | ≥ ε. On the contrary, as long as Q is inequivalent to e (g, g)abc, the formed ciphertext CT* will be invalid, which denotes that 𝒜 owns no better advantage, and we get | Pr[λ’ = λ] | = 1 2 . To obtain a reliable estimation, we use Pr[¬AT] to stand for the probability that will not abort during the entire game. We can thus describe the success advantage for to solve the given DBDH instance as
                           |Pr[ returns 1| Q = e (g, g)abc] − Pr[ returns 1 |QR GT]|
        | 1 2 + ε 1 2 | · P r [ ¬ A T ]
= ε · P r [ ¬ A T ]
To further analyze Pr[¬AT], we define some probability events to evaluate the query process that will be aborted by the challenger as follows:
F1: For any PPKeyGen query, will not abort throughout the game.
F2: For any Full Private Key query, will not abort throughout the game.
F3: For any Re-encryption Key query, will not abort throughout the game.
F4: For any Decryption query, will not abort throughout the game.
F5: For the challenge phase, will not abort.
Given that events F1 to F5 are mutually independent, we could express Pr[¬AT] as Pr[F1] ∙ Pr[F2] ∙ Pr[F3] ∙ Pr[F4] ∙ Pr[F5]. In addition, in PPKeyGen, Full Private Key, Re-encryption Key, and Decryption queries, a termination occurs whenever cc associated with the asked identity equals 0, meaning that Pr[F1] ≤ ( π ) q p s k , Pr[F2] ≤ ( π ) q s k , Pr[F3] ≤ ( π ) q r e k , and Pr[F4] ≤ ( π ) q d .
As for the challenge phase, a termination occurs if only cc* associated with the chosen identity ID*equals 1, meaning that Pr[F5] ≤ (1 − π ). Accordingly, we can further obtain
Pr [ ¬ AT ]     ( π ) q p s k ( π ) q s k ( π ) q r e k ( π ) q d ( 1 π )
= ( π ) q p s k + q s k + q r e k + q d ( 1 π )
In this inequality, when we maximize the value π at 1 − 1/(qpsk + qsk + qrek + qd + 1), Pr[¬AT] is at least 1/e(qpsk + qsk + qrek + qd + 1), in which the symbol e represents the base of natural logarithm. Therefore, we know that the advantage for the challenger to solve the provided DBDH instance can derived as
ε ε e ( q p s k + q s k + q r e k + q d + 1 ) .
Theorem 2.
(Proof of Type-II IND-PrID-CCA)
The designed CL-PRE system for IoMT fulfills the security requirement of IND-PrID-CCA provided that any Type-II adversary 𝒜 cannot own a non-negligible advantage ε to defeat a challenger  who tries to break the DBDH problem in the following game.
Proof. 
We utilize the random oracle model (ROM) in this proof and treat H1 as a random oracle. Assume that the Type-II adversary 𝒜 has a non-negligible advantage ε to break ciphertext indistinguishability of the proposed scheme under adaptive chosen-ciphertext attacks and the challenger is given a DBDH instance of (g, ga, gb, gc, Q), in which a, b, cZp and QGT. The goal of is to distinguish Q from e(g, g)abc by using the advantage of 𝒜.
  • Initialization: By performing the Setup(1l) algorithm, first sets Mpk to be N = gα, which defines the Msk to be the integer α chosen by . Then, sends PP = (e, G1, GT, g, p, H2, Mpk, SE, SD) and the Msk α to 𝒜.
  • Phase 1:  responds the queries 𝒜 made below:
  • H1Oracles: To respond an H1(IDu || IDKGC) query, the challenger searches the stored H1-list for previous records. If no matched entry exists, tosses a coin cc with Pr[cc = 1] = π. When cc equals 0, derives the return value Oh1 = g b h 1 , in which h1R Zp. Otherwise, sets Oh1 = g h 1 The entry (IDu, cc, h1, Oh1) is also added to the H1-list.
  • Full Private Key Queries: To respond a Full Private Key query of IDi, the challenger first makes an H1(IDi || IDKGC) query and then aborts as long as cc equals 0. Otherwise, obtains the secret value ssi by the Set-Secret-Value(PP, IDi) algorithm and sets the return value ski = ( N h 1 , ssi).
  • Public Key Queries: To respond a Public Key query of IDi, the challenger obtains Oh1 and the secret value ssi by H1(IDi || IDKGC) oracle and the Set-Secret-Value(PP, IDi) algorithm, respectively. Then and sets the return value pki = (Oh1, Yi = gssi).
  • Re-encryption Key Query: To respond a Re-encryption Key query of (IDo, IDu, FM), in which IDuRVL, first makes an H1(IDo || IDKGC) query and might abort if cc equals 0. If not, obtains the secret value sso by the Set-Secret-Value(PP, IDo) algorithm and derives full private key sko = ( N h 1 , sso). Next, calculates the token W by performing the Query(PP, IDu, FM) algorithm and finally derives the returned ciphertext transformation key Rk composed of (Rk1, Rk2, Rk3) with the algorithm of ReKeyGen(PP, W, sko).
  • Decryption Query: To respond a Decryption query of (IDu, CT’), in which IDuRVL, first makes an H1(IDu || IDKGC) query and might abort if cc equals 0. If not, obtains the secret value ssu by the Set-Secret-Value(PP, IDu) algorithm and derives full private key sku = ( N h 1 , ssu). Next, outputs the result of Decryption(CT’, sku) process.
  • Challenge: 𝒜 submits a chosen identity, say ID*, two plaintexts (M0*, M1*) of equal lengths to who create a challenge ciphertext CT* = (EO, 1*, EO, 2*, CT2*) by internally generating a symmetric key K*, flipping a coin λ ∈ {0, 1}, and encrypting Mλ* using K* under ID* as follows. The challenge ciphertext is then given to 𝒜.
  • Without loss of generality, it is assumed that the H1(ID* || IDKGC) oracle has been made by 𝒜. In this case, whenever the value cc* equals 1, the challenger directly aborts.
  • Otherwise, the associated value h1 could be fetched from the H1-list. Then sets the public key Y* of ID* to be ga, which implicitly defines the secret value ss* to be a and then computes
  E O ,   1 * = K * Q h 1 α   where   H 1 ( I D *   | |   I D P K G ) = ( g b ) h 1
EO, 2* = gc
C T 2 * = ( S E ( K * ,   M λ 1 * ) ,   ,   SE ( K * ,   M λ n * ) )
3.
Here, the challenge ciphertext CT* = (EO, 1*, EO, 2*, CT2*) is given to 𝒜.
  • Phase 2: 𝒜 makes new queries as those described previous phase under the limits outlined in Definition 2.
  • Guess: After Phase 2 ends, 𝒜 guesses a bit λ’. Provided that λ’ = λ, outputs 1 implying that Q equals e(g, g)abc. If Qe(g, g)abc, outputs 0.
  • Analysis: Based on the ciphertext CT* properly simulated in the challenge phase, it will be valid if only Q equals e(g, g)abc. In this case, the adversary 𝒜 owns an assumed advantage to break our scheme, meaning that Adv(𝒜) = |Pr[λ’ = λ]   1 2 | ≥ ε. On the contrary, as long as Q is inequivalent to e(g, g)abc, the formed ciphertext CT* will be invalid, which denotes that 𝒜 owns no better advantage, and we get |Pr[λ’ = λ]| = 1 2 . To obtain a reliable estimation, we use Pr[¬AT] to stand for the probability that will not abort during the entire game. We can thus describe the success advantage for to solve the given DBDH instance as
                       |Pr[ returns 1| Q = e (g, g)abc] − Pr[ returns 1 |QR GT]|
  | 1 2 + ε 1 2 | · P r [ ¬ A T ]
= ε · P r [ ¬ A T ]
To further analyze Pr[¬AT], we define some probability events to evaluate the query process that will be aborted by the challenger as follows:
J1: For any Full Private Key query, will not abort throughout the game.
J2: For any Re-encryption Key query, will not abort throughout the game.
J3: For any Decryption query, will not abort throughout the game.
J4: For the challenge phase, will not abort.
Given that events J1 to J4 are mutually independent, we could express Pr[¬AT] as Pr[J1] · Pr[J2] · Pr[J3] · Pr[J4]. In addition, in Full Private Key, Re-encryption Key, and Decryption queries, a termination occurs whenever cc associated with the asked identity equals 0, meaning that Pr[J1] ≤ ( π ) q s k , Pr[J2] ≤ ( π ) q r e k , and Pr[J3] ≤ ( π ) q d .
As to the challenge phase, a termination occurs if only cc* associated with the chosen identity ID* equals 1, meaning that Pr[J4] ≤ (1 − π ). Accordingly, we can further obtain
Pr [ ¬ AT ]     ( π ) q s k ( π ) q r e k ( π ) q d ( 1 π )
= ( π ) q s k + q r e k + q d ( 1 π )
In this inequality, when we maximize the value π at 1 − 1/(qsk + qrek + qd + 1), Pr[¬AT] is at least 1/e(qsk + qrek + qd + 1), in which the symbol e represents the base of natural logarithm. Therefore, we know that the advantage for the challenger to solve the provided DBDH instance can calculated as
ε ε e ( q s k + q r e k + q d + 1 ) .

4.2. Comparison

We compare the proposed CL-PRE scheme for IoMT with some previous studies [26,27,28,29] in Table 2. To evaluate the computational costs, we focus on the relatively time-consuming computations such as bilinear pairing (B), scalar multiplication in G1 (M), and modular exponentiation in GT (E). From the comparison results shown in this table, one can learn that the Lin–Chen scheme (LC) [26] and ours have better performance in the Encryption process, which is B + 2M. In the ReKeyGen phase, Ren et al.’s scheme (RDS) [28] only takes 2M, which is the best. All compared mechanisms have identical computational costs in the re-encryption process, which is one bilinear pairing. As for the decryption process (including both DO and DU), the computational cost of the proposed scheme is slightly higher than that of Ren et al.’s (RDS) [28] and Eltayieb et al.’s (EEA) [29] schemes, but is still lower than that of the Lin–Chen (LC) [26] and Zhou et al.’s (ZZJ) [27] schemes. Regarding the functionality, only the proposed one and Eltayieb et al.’s (EEA) [29] scheme simultaneously support the certificateless system and revocation. However, we notice that Eltayieb et al.’s scheme (EEA) [29] only achieves CPA security. Hence, the proposed CL-PRE for IoMT is a better alternative among the compared systems in terms of practical applications.
To further provide a theoretical cost comparison, we estimate the computational overhead based on the benchmarked execution times for the four algorithms on the compared systems, as shown in Figure 2. The communication overhead is estimated in terms of bit-length of ciphertexts and keys based on a standard 80-bit security level (equivalent to 1024-bit RSA). At this level, typical element sizes for bilinear pairings are |G1| ≈ |GT| ≈ 1024 bits. Since the RDS scheme utilizes multilinear maps, the implementation of their scheme is computationally impractical and requires magnitude larger size to achieve the same security. It is widely recognized that current multilinear map constructions are significantly less practical than bilinear pairings, often involving far larger element sizes (i.e., higher communication costs) and much slower operations to achieve an equivalent security level. Our performance estimation is not based on a new implementation, but is calculated theoretically using the benchmarked execution times for fundamental cryptographic operations reported in a recent peer-reviewed study by Zhu et al. [34]. This approach provides a transparent estimation based on publicly available benchmarks, allowing for a fair comparison of the theoretical efficiency. This comparison is relevant because the benchmark in [34] utilized an identical hardware platform (Raspberry Pi Zero, ARM1176JZF-S Single-Core CPU @ 1.0 GHz, 512 MB RAM) and the same Pairing-Based Cryptography (PBC) library (v0.5.14) that we assume for our IoMT environment. The technical parameters from the benchmark [34] used for these calculations are as follows:
(1)
Implementation Language: C.
(2)
Pairing Type: MNT224 curve (a Type 3 pairing).
(3)
Security Level: 96-bit.
The specific benchmark values from [34] used for our calculations are B ≈ 0.133663 s, E ≈ 0.038339 s, and M ≈ 0.038108 s. Our Figure 2 is plotted based on the formulas in Table 2 and these benchmarked values.
Based on the computational cost estimation provided in Table 2 and Figure 2, we can observe the theoretical efficiency trade-offs among the compared schemes. The Encryption phase, which is critical for resource-constrained IoMT devices, is the most optimized in our scheme, achieving the minimum computational cost (210 ms) alongside the LC scheme. In contrast, the re-encryption phase requires only one bilinear pairing (B) and is uniform across all compared schemes (134 ms). Although the RDS scheme exhibits the lowest cost for the ReKeyGen phase (76 ms), and its decryption cost (439 ms) is the minimum alongside the EEA scheme, our proposed scheme still maintains a competitive decryption overhead (516 ms), which is theoretically lower than both the LC and ZZJ schemes. Overall, these results show the computational advantage of our optimized encryption cost, while simultaneously achieving certificateless properties and CCA security.

5. Conclusions

In this paper, we address the security issues of medical data sharing in IoMT environments and propose a cloud data sharing system based on CL-PRE. The proposed system, which integrates the advantages of PRE and certificateless public key cryptosystems, resolves the complicated certificate management problem in traditional PKI as well as the key-escrow risk inherent in identity-based systems. By employing a semi-trusted cloud server, patients can flexibly authorize specific medical staff or institutions to access encrypted data without compromising the original information, thereby achieving end-to-end protection of confidentiality. From a security perspective, the proposed scheme is based on the DBDH assumption and is formally proven to satisfy the IND-PrID-CCA security requirement against both Type-I and Type-II adversaries. The comparison results demonstrate that our proposed system not only provides stronger security and better functionality, but also achieves theoretically lower computational costs in the encryption process. For future work, several avenues remain. First, we analyze the revocation properties of our scheme. The proposed revocation mechanism is an access-list-based approach. Although it is efficient, this approach lacks forward security, because it cannot prevent a revoked user from decrypting ciphertexts obtained before revocation. However, our scheme guarantees backward security since a new user cannot decrypt any ciphertext until the data owner explicitly generates a re-encryption key for them. Therefore, designing a stronger, time-based revocation mechanism to achieve forward security is an important direction. Furthermore, our scheme is based on Pairing-Based Cryptography, which is known to be vulnerable to attacks from large-scale quantum computers. Therefore, exploring the construction of post-quantum secure (PQC) CL-PRE variants is another critical research direction to ensure the long-term security of IoMT data sharing. Finally, the performance evaluation of this work is based on a theoretical estimation of computational costs. Another important direction for future work is to implement a practical prototype of the proposed scheme and conduct extensive experiments on resource-constrained devices to validate its real-world performance, overhead, and practicality for IoMT environments.

Author Contributions

Writing—original draft, H.-Y.L.; Writing—review and editing, C.-W.Y. and C.-S.C.; Resources, C.-S.C. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Science and Technology Council of Republic of China under the contract numbers NSTC 114-2221-E-019-055-MY2.

Data Availability Statement

The original contributions presented in this study are included in the article.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

References

  1. Chaudhary, S.; Johari, R.; Bhatia, R.; Gupta, K.; Bhatnagar, A. CRAIoT: Concept, review and application(s) of IoT. In Proceedings of the 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), Ghaziabad, India, 30 October 2019; pp. 1–4. [Google Scholar]
  2. Joseph, V.C.; Ahn, S.H.; Kim, J.; Lee, K.H.; Kim, D.H. Intelligent healthcare systems: Re-defining personal healthcare solutions. In Proceedings of the 7th International Conference on Advanced Communication Technology (ICACT 2005), PyeongChang, Republic of Korea, 21–23 February 2005; pp. 424–427. [Google Scholar]
  3. Luo, Z.; Ou, D.; Lin, T.; Lin, X. Research on wireless dynamic magnetic resonance charging technology for autonomous vehicles. In Proceedings of the 4th International Conference on Electronic Information Engineering and Computer Technology (EIECT), Shenzhen, China, 15–17 November 2024; pp. 774–777. [Google Scholar]
  4. Park, D.H.; Bang, H.C.; Pyo, C.S.; Kang, S.J. Semantic open IoT service platform technology. In Proceedings of the IEEE World Forum on Internet of Things (WF-IoT), Seoul, Republic of Korea, 6–8 March 2014; pp. 85–88. [Google Scholar]
  5. Santosa, I.; Supangkat, S.H.; Arman, A.A. People-centric smart city services measurement using Garuda smart city framework. In Proceedings of the Mediterranean Smart Cities Conference (MSCC), Tangier, Morocco, 25–27 September 2024; pp. 1–5. [Google Scholar]
  6. Villanueva-Miranda, I.; Nazeran, H.; Martinek, R. A semantic interoperability approach to heterogeneous Internet of Medical Things (IoMT) platforms. In Proceedings of the IEEE 20th International Conference on e-Health Networking, Applications and Services (Healthcom), Ostrava, Czech Republic, 17–20 September 2018; pp. 1–5. [Google Scholar]
  7. Hwata, C.; Armando, E.J.; Gatera, O.; Rushingabigwi, G.; Twizere, C.; Mtonga, K. Real-time monitoring and prediction of electromagnetic compatibility over Internet of medical things using Kalman filter algorithm. In Proceedings of the 17th International Conference on Signal Processing and Communication System (ICSPCS), Gold Coast, Australia, 9–11 December 2024; pp. 1–4. [Google Scholar]
  8. Harvey, P.; Toutsop, O.; Kornegay, K.; Alale, E.; Reaves, D. Security and privacy of medical Internet of Things devices for smart homes. In Proceedings of the 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), Paris, France, 14–16 December 2020; pp. 1–6. [Google Scholar]
  9. Ateniese, G.; Fu, K.; Green, M.; Hohenberger, S. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 2006, 9, 1–30. [Google Scholar] [CrossRef]
  10. Blaze, M.; Bleumer, G.; Strauss, M. Divertible protocols and atomic proxy cryptography. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Espoo, Finland, 31 May–4 June 1998; pp. 127–144. [Google Scholar]
  11. Chen, B.; He, D.; Kumar, N.; Wang, H.; Choo, K.K.R. A blockchain-based proxy re-encryption with equality test for vehicular communication systems. IEEE Trans. Netw. Sci. Eng. 2021, 8, 2048–2059. [Google Scholar] [CrossRef]
  12. Chow, S.S.; Weng, J.; Yang, Y.; Deng, R.H. Efficient unidirectional proxy re-encryption. In Proceedings of the International Conference on Cryptology in Africa, Stellenbosch, South Africa, 3–6 May 2010; pp. 316–332. [Google Scholar]
  13. Han, G.; Li, L.; Qin, B.; Zheng, D. Pairing-free proxy re-encryption scheme with equality test for data security of IoT. J. King Saud Univ. Comput. Inf. Sci. 2024, 36, 102105. [Google Scholar] [CrossRef]
  14. Zheng, R.; Jin, H.; Zhang, Q.; Liu, Y.; Chu, P. Heterogeneous medical data share and integration on grid. In Proceedings of the International Conference on BioMedical Engineering and Informatics, Sanya, China, 27–30 May 2008; pp. 905–909. [Google Scholar]
  15. Liu, A.; Du, X.; Wang, N.; Qiao, R.; Ning, Y.; Zhang, L. Medical health data sharing scheme based on blockchain and attribute-based encryption. In Proceedings of the 4th International Conference on Information Communication and Signal Processing (ICICSP), Beijing, China, 20–22 August 2021; pp. 553–559. [Google Scholar]
  16. Muthukumar, K.A.; Nandhini, M. Modified secret sharing algorithm for secured medical data sharing in cloud environment. In Proceedings of the 2nd International Conference on Science Technology Engineering and Management (ICONSTEM), Chennai, India, 17–18 March 2016; pp. 67–71. [Google Scholar]
  17. Wang, L.; Wang, L.; Mambo, M.; Okamoto, E. New identity-based proxy re-encryption schemes to prevent collusion attacks. In Proceedings of the Pairing-Based Cryptography—Pairing 2010, Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2010; Volume 6487, pp. 595–609. [Google Scholar]
  18. Seo, J.W.; Yum, D.H.; Lee, P.J. Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles. Theor. Comput. Sci. 2013, 491, 83–93. [Google Scholar] [CrossRef]
  19. Zeng, P.; Choo, K.K.R. A new kind of conditional proxy re-encryption for secure cloud storage. IEEE Access 2018, 6, 70017–70024. [Google Scholar] [CrossRef]
  20. Liang, K.; Susilo, W.; Liu, J.K.; Wong, D.S. Efficient and fully CCA secure conditional proxy re-encryption from hierarchical identity-based encryption. Comput. J. 2015, 58, 2778–2792. [Google Scholar] [CrossRef]
  21. Qiu, J.; Hwang, G.H.; Lee, H. Efficient conditional proxy re-encryption with chosen-ciphertext security. In Proceedings of the 9th Asia Joint Conference on Information Security (AsiaJCIS), Wuhu, China, 9–10 September 2014; pp. 104–110. [Google Scholar]
  22. Zhou, D.; Chen, K.; Liu, S.; Zheng, D. Identity-based conditional proxy re-encryption. Chin. J. Electron. 2013, 22, 61–66. [Google Scholar]
  23. Mo, L.; Yao, G. Multi-use conditional proxy re-encryption. In Proceedings of the International Conference on Information Science and Cloud Computing Companion (ISCC-C), Guangzhou, China, 7–8 December 2013; pp. 246–251. [Google Scholar]
  24. Zhang, J.; Bai, W.; Wang, X. Identity-based data storage scheme with anonymous key generation in fog computing. Soft Comput. 2020, 24, 5561–5571. [Google Scholar] [CrossRef]
  25. Lin, H.Y.; Tsai, T.T.; Ting, P.Y.; Chen, C.C. An improved ID-based data storage scheme for fog-enabled IoT environments. Sensors 2022, 22, 4223. [Google Scholar] [CrossRef] [PubMed]
  26. Lin, H.Y.; Chen, P.R. Revocable and fog-enabled proxy re-encryption scheme for IoT environments. Sensors 2024, 24, 6290. [Google Scholar] [CrossRef] [PubMed]
  27. Zhou, Y.; Zhao, L.; Jin, Y.; Li, F. Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks. Inf. Sci. 2022, 604, 80–96. [Google Scholar] [CrossRef]
  28. Ren, C.; Dong, X.; Shen, J.; Cao, Z.; Zhou, Y. CLAP-PRE: Certificateless autonomous path proxy re-encryption for data sharing in the cloud. Appl. Sci. 2022, 12, 4353. [Google Scholar] [CrossRef]
  29. Eltayieb, N.; Elhabob, R.; Abdelgader, A.M.S.; Liao, Y.; Li, F.; Zhou, S. Certificateless proxy re-encryption with cryptographic reverse firewalls for secure cloud data sharing. Future Gener. Comput. Syst. 2025, 162, 107478. [Google Scholar] [CrossRef]
  30. Yao, S.; Dayot, R.V.J.; Kim, H.J.; Ra, I.H. A Novel Revocable and Identity-Based Conditional Proxy Re-Encryption Scheme with Ciphertext Evolution for Secure Cloud Data Sharing. IEEE Access 2021, 9, 42801–42816. [Google Scholar] [CrossRef]
  31. Worapaluk, K.; Fugkeaw, S. An Efficiently Revocable Cloud-based Access Control Using Proxy Re-encryption and Blockchain. In Proceedings of the 20th International Joint Conference on Computer Science and Software Engineering (JCSSE), Bangkok, Thailand, 28–30 June 2023. [Google Scholar]
  32. Liang, Y.; Tian, B.; Hao, Y.; Wu, K. Multi-user Search on the Encrypted Network: A Lattice-based Proxy Re-encryption with Keyword Search. In Proceedings of the 2023 8th International Conference on Communication, Image and Signal Processing (CCISP), Chengdu, China, 15–17 December 2023; pp. 97–101. [Google Scholar]
  33. Zhang, K.; Liu, Y.; Wang, L.; Li, L. Identity-Based Proxy Re-Encryption Based on LWE with Short Parameters. In Proceedings of the 2023 International Conference on Mobile Internet, Cloud Computing and Information Security (MICCIS), Nanjing, China, 27–29 October 2023; pp. 118–124. [Google Scholar]
  34. Zhu, F.; Yi, X.; Abuadbba, A.; Khalil, I.; Nepal, S.; Huang, X. Cost-effective authenticated data redaction with privacy protection in IoT. IEEE Internet Things J. 2021, 8, 11678–11689. [Google Scholar] [CrossRef]
Figure 1. The system model of the proposed CL-PRE scheme for IoMT.
Figure 1. The system model of the proposed CL-PRE scheme for IoMT.
Electronics 14 04654 g001
Figure 2. Estimation of computational cost based on benchmarked operations.
Figure 2. Estimation of computational cost based on benchmarked operations.
Electronics 14 04654 g002
Table 1. Definition of notations.
Table 1. Definition of notations.
SymbolDescription
lsecurity parameter
PPsystem-wide public parameters
plarge prime
G1, GTmultiplicative group
ggenerator
ebilinear pairing
H1, H2one-way hash function
αMsk
N (= gα)Mpk
SE, SDsymmetric encryption and decryption functions
dipartial private key of IDi
ssisecret value of IDi
skifull private key of IDi
Yi (= gssi)partial public key of IDi
pkifull public key of IDi
Ksymmetric key
M = (M1, M2, …, Mn)message
CT = (CT1, CT2)ciphertext
CT1 = (EO, 1, EO, 2)partial ciphertext
EO, 1, EO, 2partial ciphertext components
FMFile index of message M
vsecret query number
Vquery token component
Wquery token
h, z, rrandom numbers
Rk = (Rk1, Rk2, Rk3)re-encryption key
CT′ = (CT1, CT2)re-encrypted ciphertext
CT1 = (EO, 1, EO, 2, EO, 3, EO, 4)re-encrypted partial ciphertext
EO, 1, EO, 2, EO, 3, EO, 4re-encrypted partial ciphertext components
Xintermediate decryption value
RVLrevocation list
Table 2. Comparative analysis of several PRE systems.
Table 2. Comparative analysis of several PRE systems.
RDSZZJEEALCOurs
EncryptionB + 4M3B + 3M + 2EB + 4M + EB + 2MB + 2M
ReKeyGen2M2B + 3M + 2EB + 5M2B + 3M2B + 4M
Re-encryptionBBBBB
Decryption3B + M4B + 2M3B + M4B + E3B + 2M + E
Ciphertext Size>>4096 bits≈2048 bits≈3072 bits≈2048 bits≈2048 bits
Re-encryption Key Size>>4096 bits≈3072 bits≈3072 bits≈3072 bits≈3072 bits
Re-encrypted Ciphertext Size>>4096 bits≈4096 bits≈4096 bits≈4096 bits≈4096 bits
Certificateless××
Revocation××
Security LevelCPACPACPACPACCA
Remark: “√” indicates that the feature is supported, and “×” means not supported.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Lin, H.-Y.; Yeh, C.-W.; Chen, C.-S. Certificateless Proxy Re-Encryption Scheme for the Internet of Medical Things. Electronics 2025, 14, 4654. https://doi.org/10.3390/electronics14234654

AMA Style

Lin H-Y, Yeh C-W, Chen C-S. Certificateless Proxy Re-Encryption Scheme for the Internet of Medical Things. Electronics. 2025; 14(23):4654. https://doi.org/10.3390/electronics14234654

Chicago/Turabian Style

Lin, Han-Yu, Ching-Wei Yeh, and Chi-Shiu Chen. 2025. "Certificateless Proxy Re-Encryption Scheme for the Internet of Medical Things" Electronics 14, no. 23: 4654. https://doi.org/10.3390/electronics14234654

APA Style

Lin, H.-Y., Yeh, C.-W., & Chen, C.-S. (2025). Certificateless Proxy Re-Encryption Scheme for the Internet of Medical Things. Electronics, 14(23), 4654. https://doi.org/10.3390/electronics14234654

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop