{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T05:24:13Z","timestamp":1761974653607,"version":"build-2065373602"},"reference-count":57,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T00:00:00Z","timestamp":1761782400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004735","name":"Hunan Provincial Natural Science Foundation of China","doi-asserted-by":"crossref","award":["2025JJ50398"],"award-info":[{"award-number":["2025JJ50398"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Postgraduate Scientific Research Innovation Project of Hunan Province","award":["LXBZZ2024275"],"award-info":[{"award-number":["LXBZZ2024275"]}]},{"name":"Research Project on Teaching Reform of Degree and Graduate Education in Hunan Province","award":["2024JGYB195"],"award-info":[{"award-number":["2024JGYB195"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>The rapid growth of smart healthcare improves medical efficiency through electronic data sharing but introduces security risks like privacy leaks and data tampering. However, existing ciphertext-policy attribute-based encryption faces challenges such as single points of failure, weak authentication, and inadequate integrity protection, hindering secure, efficient medical data sharing. Therefore, we propose LDDV, a lightweight decentralized medical data sharing scheme with dual verification. LDDV constructs a lightweight multi-authority collaborative key management architecture based on elliptic curve cryptography, which eliminates the risk of single point of failure and balances reliability and efficiency. Meanwhile, a lightweight dual verification mechanism based on elliptic curve digital signature provides identity authentication and data integrity verification. Security analysis and experimental results show that LDDV achieves 28\u201342% faster decryption speeds compared to existing schemes and resists specific threats such as chosen plaintext attacks.<\/jats:p>","DOI":"10.3390\/cryptography9040069","type":"journal-article","created":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T05:28:43Z","timestamp":1761888523000},"page":"69","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Lightweight Decentralized Medical Data Sharing Scheme with Dual Verification"],"prefix":"10.3390","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7980-9651","authenticated-orcid":false,"given":"Shaobo","family":"Zhang","sequence":"first","affiliation":[{"name":"Sanya Institute of Hunan University of Science and Technology, Sanya 572024, China"},{"name":"School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6959-9452","authenticated-orcid":false,"given":"Yijie","family":"Yin","sequence":"additional","affiliation":[{"name":"Sanya Institute of Hunan University of Science and Technology, Sanya 572024, China"},{"name":"School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, China"}]},{"given":"Nangui","family":"Chen","sequence":"additional","affiliation":[{"name":"Sanya Institute of Hunan University of Science and Technology, Sanya 572024, China"},{"name":"School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, China"}]},{"given":"Honghui","family":"Ning","sequence":"additional","affiliation":[{"name":"Sanya Institute of Hunan University of Science and Technology, Sanya 572024, China"},{"name":"College of Law and Public Management, Hunan University of Science and Technology, Xiangtan 411201, China"}]}],"member":"1968","published-online":{"date-parts":[[2025,10,30]]},"reference":[{"key":"ref_1","first-page":"1","article-title":"Backdoor attacks and defenses targeting multi-domain ai models: A comprehensive review","volume":"57","author":"Zhang","year":"2025","journal-title":"ACM Comput. Surv."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"121847","DOI":"10.1016\/j.ins.2024.121847","article-title":"APBAM: Adversarial perturbation-driven backdoor attack in multimodal learning","volume":"700","author":"Zhang","year":"2025","journal-title":"Inf. Sci."},{"key":"ref_3","unstructured":"IBM Security & Ponemon Institute (2025, October 25). Cost of a Data Breach Report 2023. Available online: https:\/\/www.ibm.com\/security."},{"key":"ref_4","first-page":"41","article-title":"Anthem health insurance breach or ransomware attacks","volume":"2","author":"Vaka","year":"2017","journal-title":"Int. Sci. J. Contemp. Res. Eng. Sci. Manag."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/j.future.2023.03.022","article-title":"ALPS: Achieving accuracy-aware location privacy service via assisted regions","volume":"145","author":"Zhang","year":"2023","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"6743","DOI":"10.1016\/j.jksuci.2022.06.018","article-title":"A systematic literature review of attribute based encryption in health services","volume":"34","author":"Imam","year":"2022","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"102899","DOI":"10.1016\/j.sysarc.2023.102899","article-title":"A traceable and revocable decentralized multi-authority privacy protection scheme for social metaverse","volume":"140","author":"Zhang","year":"2023","journal-title":"J. Syst. Archit."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1868","DOI":"10.1109\/TIFS.2022.3173412","article-title":"Attribute-based hierarchical access control with extendable policy","volume":"17","author":"Xiao","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"23297","DOI":"10.1109\/JIOT.2024.3384458","article-title":"FSAIR: Fine-grained secure approximate image retrieval for mobile cloud computing","volume":"11","author":"Zhang","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Cui, J., Duan, L., Li, M., and Wang, W. (2022, January 18\u201320). A fine-grained access control framework for data sharing in IoT based on IPFS and cross-blockchain technology. Proceedings of the International Conference on Smart Computing and Communication, New York, NY, USA.","DOI":"10.1007\/978-3-031-28124-2_41"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"104513","DOI":"10.1016\/j.cose.2025.104513","article-title":"VADP: Visitor-attribute-based adaptive differential privacy for IoMT data sharing","volume":"156","author":"Zhang","year":"2025","journal-title":"Comput. Secur."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Li, H., Lin, H., and Luo, J. (2022, January 7\u201310). ABE for circuits with constant-size secret keys and adaptive security. Proceedings of the Theory of Cryptography Conference, Chicago, IL, USA.","DOI":"10.1007\/978-3-031-22318-1_24"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., and Waters, B. (2007, January 20\u201323). Ciphertext-policy attribute-based encryption. Proceedings of the 2007 IEEE Symposium on Security and Privacy, Berkeley, CA, USA.","DOI":"10.1109\/SP.2007.11"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Wang, Y., Pan, J., and Chen, Y. (2021, January 16\u201320). Fine-grained secure attribute-based encryption. Proceedings of the Advances in Cryptology\u2013CRYPTO 2021: 41st Annual International Cryptology Conference, Virtual.","DOI":"10.1007\/978-3-030-84259-8_7"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"4804","DOI":"10.1109\/JSYST.2022.3169601","article-title":"Toward secure and privacy-preserving cloud data sharing: Online\/offline multiauthority CP-ABE with hidden policy","volume":"16","author":"Zhao","year":"2022","journal-title":"IEEE Syst. J."},{"key":"ref_16","unstructured":"Lewko, A., and Waters, B. (2011, January 15\u201319). Decentralizing attribute-based encryption. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"831","DOI":"10.2298\/CSIS180830029Y","article-title":"Privacy-preserving multi-authority attribute-based encryption with dynamic policy updating in PHR","volume":"16","author":"Yan","year":"2019","journal-title":"Comput. Sci. Inf. Syst."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Rouselakis, Y., and Waters, B. (2013, January 4\u20138). Practical constructions and new proof methods for large universe attribute-based encryption. Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, Germany.","DOI":"10.1145\/2508859.2516672"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Zhang, J., Gong, Q., Wei, Z., Wang, X., Yan, X., and Zhang, X. (2022, January 22\u201323). Efficient multi-authority attribute-based encryption with policy hiding and updating. Proceedings of the 2022 IEEE 10th International Conference on Computer Science and Network Technology, Dalian, China.","DOI":"10.1109\/ICCSNT56096.2022.9972943"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"103265","DOI":"10.1016\/j.sysarc.2024.103265","article-title":"A revocable multi-authority attribute-based encryption scheme for fog-enabled IoT","volume":"155","year":"2024","journal-title":"J. Syst. Archit."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Liu, Y., and Du, R. (2020, January 11\u201314). Efficient partially policy-hidden with multi-authority for access control scheme in Internet of Things. Proceedings of the 2020 International Conference on Networking and Network Applications, Haikou, China.","DOI":"10.1109\/NaNA51271.2020.00070"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"18009","DOI":"10.1109\/ACCESS.2018.2820182","article-title":"Improving privacy and security in decentralizing multi-authority attribute-based encryption in cloud computing","volume":"6","author":"Yang","year":"2018","journal-title":"IEEE Access"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"127963","DOI":"10.1016\/j.eswa.2025.127963","article-title":"A novel construction of certificateless aggregate signcryption scheme for smart healthcare","volume":"285","author":"Liu","year":"2025","journal-title":"Expert Syst. Appl."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1884","DOI":"10.1109\/TII.2023.3282317","article-title":"Cryptanalysis and improvement of a blockchain-based certificateless signature for IIoT devices","volume":"20","author":"Yang","year":"2024","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"12256","DOI":"10.1109\/TITS.2024.3367925","article-title":"Efficient and security-enhanced certificateless aggregate signature-based authentication scheme with conditional privacy preservation for VANETs","volume":"25","author":"Yang","year":"2024","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_26","unstructured":"Sahai, A., and Waters, B. (2005, January 22\u201326). Fuzzy identity-based encryption. Proceedings of the Advances in Cryptology\u2013EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark."},{"key":"ref_27","unstructured":"Goyal, V., Pandey, O., Sahai, A., and Waters, B. (November, January 30). Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Hoang, V.H., Lehtihet, E., and Ghamri-Doudane, Y. (2019, January 24\u201328). Forward-secure data outsourcing based on revocable attribute-based encryption. Proceedings of the 2019 15th International Wireless Communications & Mobile Computing Conference, Tangier, Morocco.","DOI":"10.1109\/IWCMC.2019.8766674"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"68","DOI":"10.3390\/math10010068","article-title":"Ciphertext-policy attribute-based encryption for cloud storage: Toward data privacy and authentication in AI-enabled IoT system","volume":"10","author":"Chinnasamy","year":"2021","journal-title":"Mathematics"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1016\/j.future.2021.04.022","article-title":"A partially hidden policy CP-ABE scheme against attribute values guessing attacks with online privacy-protective decryption testing in IoT assisted cloud computing","volume":"123","author":"Zhang","year":"2021","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"983","DOI":"10.1093\/comjnl\/bxv101","article-title":"Practical attribute-based encryption: Traitor tracing, revocation and large universe","volume":"59","author":"Liu","year":"2016","journal-title":"Comput. J."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1109\/TDSC.2020.2977646","article-title":"A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection","volume":"19","author":"Han","year":"2020","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1007\/s12652-021-02922-6","article-title":"PHAS-HEKR-CP-ABE: Partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system","volume":"13","author":"Zhang","year":"2022","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"ref_34","first-page":"1867584","article-title":"Enhanced dual-policy attribute-based encryption for secure data sharing in the cloud","volume":"2022","author":"Wang","year":"2022","journal-title":"Secur. Commun. Netw."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Dang, Q., Zhao, B., Sun, B., Qiu, Y., and Du, C. (2022, January 10\u201312). A secure image-video retrieval scheme with attribute-based encryption and multi-feature fusion in smart grid. Proceedings of the Science of Cyber Security-SciSec 2022 Workshops, Matsue, Japan.","DOI":"10.1007\/978-981-19-7769-5_12"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Lin, H., Cao, Z., Liang, X., and Shao, J. (2008, January 14\u201317). Secure threshold multi authority attribute based encryption without a central authority. Proceedings of the International Conference on Cryptology in India, Kharagpur, India.","DOI":"10.1007\/978-3-540-89754-5_33"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Chase, M., and Chow, S.S. (2009, January 9\u201313). Improving privacy and security in multi-authority attribute-based encryption. Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, IL, USA.","DOI":"10.1145\/1653662.1653678"},{"key":"ref_38","first-page":"665","article-title":"Improving privacy and security in decentralized ciphertext-policy attribute-based encryption","volume":"10","author":"Han","year":"2014","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"785","DOI":"10.1109\/TSC.2016.2520932","article-title":"Flexible and fine-grained attribute-based data storage in cloud computing","volume":"10","author":"Li","year":"2016","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Huang, K. (2020, January 28\u201329). Online\/offline revocable multi-authority attribute-based encryption for edge computing. Proceedings of the 2020 12th International Conference on Measuring Technology and Mechatronics Automation, Phuket, Thailand.","DOI":"10.1109\/ICMTMA50254.2020.00126"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"552","DOI":"10.1109\/TPDS.2022.3225274","article-title":"Securing fine-grained data sharing and erasure in outsourced storage systems","volume":"34","author":"Wei","year":"2022","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"840","DOI":"10.1016\/j.procs.2020.03.423","article-title":"Efficient multi-authority access control using attribute-based encryption in cloud storage","volume":"167","author":"Challagidad","year":"2020","journal-title":"Procedia Comput. Sci."},{"key":"ref_43","first-page":"2261","article-title":"Design of a cloud based emergency healthcare service model","volume":"8","author":"Banerjee","year":"2013","journal-title":"Int. J. Appl. Eng. Res."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1007\/s10916-014-0112-3","article-title":"A secure medical data exchange protocol based on cloud environment","volume":"38","author":"Chen","year":"2014","journal-title":"J. Med. Syst."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/s10916-016-0453-1","article-title":"Improvement of a privacy authentication scheme based on cloud for medical environment","volume":"40","author":"Chiou","year":"2016","journal-title":"J. Med. Syst."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"592","DOI":"10.1007\/s11227-017-2163-y","article-title":"TDRM: Tensor-based data representation and mining for healthcare data in cloud computing environments","volume":"74","author":"Sandhu","year":"2018","journal-title":"J. Supercomput."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"11676","DOI":"10.1109\/ACCESS.2018.2801266","article-title":"Secure attribute-based signature scheme with multiple authorities for blockchain in electronic health records systems","volume":"6","author":"Guo","year":"2018","journal-title":"IEEE Access"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"8949","DOI":"10.1109\/JIOT.2021.3055541","article-title":"O3-R-CP-ABE: An efficient and revocable attribute-based encryption scheme in the cloud-assisted IoMT system","volume":"8","author":"Guo","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"1003","DOI":"10.1109\/TCC.2016.2632110","article-title":"Game theoretical analysis on acceptance of a cloud data access control system based on reputation","volume":"8","author":"Gao","year":"2016","journal-title":"IEEE Trans. Cloud Comput."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Saravana, K.N., Lakshmi, G.R., and Annappa, B. (December, January 30). An Efficient Framework and Access control scheme for cloud health care. Proceedings of the 2015 IEEE 7th International Conference on Cloud Computing Technology and Science, Vancouver, BC, Canada.","DOI":"10.1109\/CloudCom.2015.98"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"933","DOI":"10.1109\/TETC.2021.3052377","article-title":"Secure data sharing with flexible user access privilege update in cloud-assisted IoMT","volume":"10","author":"Hao","year":"2021","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"ref_52","first-page":"6737942","article-title":"A blockchain-assisted electronic medical records by using proxy reencryption and multisignature","volume":"2022","author":"Liu","year":"2022","journal-title":"Secur. Commun. Netw."},{"key":"ref_53","first-page":"18881","article-title":"An ECC-based access control scheme with lightweight decryption and conditional authentication for data sharing in vehicular networks","volume":"24","author":"Qin","year":"2020","journal-title":"Soft Comput.-A Fusion Found. Methodol. Appl."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"102108","DOI":"10.1016\/j.sysarc.2021.102108","article-title":"A lightweight key management scheme for key-escrow-free ECC-based CP-ABE for IoT healthcare systems","volume":"117","author":"Sowjanya","year":"2021","journal-title":"J. Syst. Archit."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.future.2014.10.010","article-title":"A lightweight attribute-based encryption scheme for the internet of things","volume":"49","author":"Yao","year":"2015","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"e7972","DOI":"10.1002\/cpe.7972","article-title":"A secure multi-authority attribute based encryption approach for robust smart grids","volume":"36","author":"Saidi","year":"2024","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"821","DOI":"10.1109\/TII.2022.3167842","article-title":"Multiauthority CP-ABE-based access control model for IoT-enabled healthcare infrastructure","volume":"19","author":"Das","year":"2022","journal-title":"IEEE Trans. Ind. Inform."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/9\/4\/69\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T05:18:10Z","timestamp":1761974290000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/9\/4\/69"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,30]]},"references-count":57,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["cryptography9040069"],"URL":"https:\/\/doi.org\/10.3390\/cryptography9040069","relation":{},"ISSN":["2410-387X"],"issn-type":[{"type":"electronic","value":"2410-387X"}],"subject":[],"published":{"date-parts":[[2025,10,30]]}}}