{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T12:25:27Z","timestamp":1770467127780,"version":"3.49.0"},"reference-count":37,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2023,12,31]],"date-time":"2023-12-31T00:00:00Z","timestamp":1703980800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation","doi-asserted-by":"publisher","award":["61962009"],"award-info":[{"award-number":["61962009"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation","doi-asserted-by":"publisher","award":["62202118"],"award-info":[{"award-number":["62202118"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation","doi-asserted-by":"publisher","award":["[2022]073"],"award-info":[{"award-number":["[2022]073"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation","doi-asserted-by":"publisher","award":["[2023]003"],"award-info":[{"award-number":["[2023]003"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation","doi-asserted-by":"publisher","award":["[2023]018"],"award-info":[{"award-number":["[2023]018"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Research Technology Top Talent Project of Guizhou Provincial Department of Education","award":["61962009"],"award-info":[{"award-number":["61962009"]}]},{"name":"Natural Science Research Technology Top Talent Project of Guizhou Provincial Department of Education","award":["62202118"],"award-info":[{"award-number":["62202118"]}]},{"name":"Natural Science Research Technology Top Talent Project of Guizhou Provincial Department of Education","award":["[2022]073"],"award-info":[{"award-number":["[2022]073"]}]},{"name":"Natural Science Research Technology Top Talent Project of Guizhou Provincial Department of Education","award":["[2023]003"],"award-info":[{"award-number":["[2023]003"]}]},{"name":"Natural Science Research Technology Top Talent Project of Guizhou Provincial Department of Education","award":["[2023]018"],"award-info":[{"award-number":["[2023]018"]}]},{"name":"Science and Technology Tackling Project of Guizhou Education Department","award":["61962009"],"award-info":[{"award-number":["61962009"]}]},{"name":"Science and Technology Tackling Project of Guizhou Education Department","award":["62202118"],"award-info":[{"award-number":["62202118"]}]},{"name":"Science and Technology Tackling Project of Guizhou Education Department","award":["[2022]073"],"award-info":[{"award-number":["[2022]073"]}]},{"name":"Science and Technology Tackling Project of Guizhou Education Department","award":["[2023]003"],"award-info":[{"award-number":["[2023]003"]}]},{"name":"Science and Technology Tackling Project of Guizhou Education Department","award":["[2023]018"],"award-info":[{"award-number":["[2023]018"]}]},{"name":"Hundred-level Innovative Talent Project of Guizhou Provincial Science and Technology Department","award":["61962009"],"award-info":[{"award-number":["61962009"]}]},{"name":"Hundred-level Innovative Talent Project of Guizhou Provincial Science and Technology Department","award":["62202118"],"award-info":[{"award-number":["62202118"]}]},{"name":"Hundred-level Innovative Talent Project of Guizhou Provincial Science and Technology Department","award":["[2022]073"],"award-info":[{"award-number":["[2022]073"]}]},{"name":"Hundred-level Innovative Talent Project of Guizhou Provincial Science and Technology Department","award":["[2023]003"],"award-info":[{"award-number":["[2023]003"]}]},{"name":"Hundred-level Innovative Talent Project of Guizhou Provincial Science and Technology Department","award":["[2023]018"],"award-info":[{"award-number":["[2023]018"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>The emerging cloud storage technology has significantly improved efficiency and productivity in the traditional electronic healthcare field. However, it has also brought about many security concerns. Ciphertext policy attribute-based encryption (CP-ABE) holds immense potential in achieving fine-grained access control, providing robust security for electronic healthcare data in the cloud. However, current CP-ABE schemes still face issues such as inflexible attribute revocation, relatively lower computational capabilities, and key management. To address these issues, this paper introduces a revocable and traceable undeniable ciphertext policy attribute-based encryption scheme (MA-RUABE). MA-RUABE not only enables fast and accurate data traceability, effectively preventing malicious user key leakage, but also includes a direct revocation feature, significantly enhancing computational efficiency. Furthermore, the introduction of a multi-permission mechanism resolves the issue of centralization of power caused by single-attribute permissions. Furthermore, a security analysis demonstrates that our system ensures resilience against chosen plaintext attacks. Experimental results demonstrate that MA-RUABE incurs lower computational overhead, effectively enhancing system performance and ensuring data-sharing security in cloud-based electronic healthcare systems.<\/jats:p>","DOI":"10.3390\/e26010045","type":"journal-article","created":{"date-parts":[[2023,12,31]],"date-time":"2023-12-31T06:37:12Z","timestamp":1704004632000},"page":"45","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Revocable and Traceable Undeniable Attribute-Based Encryption in Cloud-Enabled E-Health Systems"],"prefix":"10.3390","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-0404-6776","authenticated-orcid":false,"given":"Zhongxiang","family":"He","sequence":"first","affiliation":[{"name":"State Key Laboratory of Public Big Data, Guizhou University, Guiyang 550000, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8674-8356","authenticated-orcid":false,"given":"Yuling","family":"Chen","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Public Big Data, Guizhou University, Guiyang 550000, China"}]},{"given":"Yun","family":"Luo","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Public Big Data, Guizhou University, Guiyang 550000, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1250-2633","authenticated-orcid":false,"given":"Lingyun","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Guizhou University, Guiyang 550000, China"}]},{"given":"Yingying","family":"Tang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Guizhou University, Guiyang 550000, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,12,31]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Chen, Y., Tao, J., Li, T., Cai, J., and Ren, X. (2023, December 28). An Effective Security Comparison Protocol in Cloud Computing. Available online: https:\/\/www.researchsquare.com\/article\/rs-2056175\/v1.","DOI":"10.21203\/rs.3.rs-2056175\/v1"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Zhang, L., Chen, Y., Luo, Y., He, Z., and Li, T. (2023). Data Rights Confirmation Scheme Based on Auditable Ciphertext CP-ABE in the Cloud Storage Environment. Appl. Sci., 13.","DOI":"10.3390\/app13074355"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"787","DOI":"10.1109\/TSC.2022.3174909","article-title":"A delegatable attribute-based encryption scheme for a collaborative e-health cloud","volume":"16","author":"Pussewalage","year":"2022","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Yang, X., and Zhang, C. (2022). Blockchain-based multiple authorities attribute-based encryption for EHR access control scheme. Appl. Sci., 12.","DOI":"10.1155\/2022\/2204832"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1080\/13651501.2022.2101927","article-title":"Health care workers\u2019 mental health in the face of COVID-19: A systematic review and meta-analysis","volume":"27","author":"Ghahramani","year":"2023","journal-title":"Int. J. Psychiatry Clin. Pract."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Tang, Y., Chen, Y., Luo, Y., Dong, S., and Li, T. (2023). VR-PEKS: A Verifiable and Resistant to Keyword Guess Attack Public Key Encryption with Keyword Search Scheme. Appl. Sci., 13.","DOI":"10.3390\/app13074166"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"5239","DOI":"10.1109\/TIFS.2021.3127023","article-title":"Dynamic multi-key FHE in asymmetric key setting from LWE","volume":"16","author":"Chen","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"102417","DOI":"10.1016\/j.sysarc.2022.102417","article-title":"Blockchain-assisted searchable attribute-based encryption for e-health systems","volume":"124","author":"Xiang","year":"2022","journal-title":"J. Syst. Archit."},{"key":"ref_9","unstructured":"Goyal, V., Pandey, O., Sahai, A., and Waters, B. (November, January 30). Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., and Waters, B. (2007, January 20\u201323). Ciphertext-policy attribute-based encryption. Proceedings of the 2007 IEEE symposium on security and privacy (SP\u201907), Berkeley, CA, USA.","DOI":"10.1109\/SP.2007.11"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/j.future.2022.01.003","article-title":"MLS-ABAC: Efficient multi-level security attribute-based access control scheme","volume":"131","author":"Aghili","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Zhang, L., Chen, Y., and Qian, X. (2022, January 22\u201325). Data Confirmation Scheme based on Auditable CP-ABE. Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybernetics (Cybernetics), Espoo, Finland.","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData-Cybermatics55523.2022.00095"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"45206","DOI":"10.1109\/ACCESS.2023.3272484","article-title":"Efficient, Traceable and Privacy-Aware Data Access Control in Distributed Cloud-based IoD Systems","volume":"11","author":"Zhuo","year":"2023","journal-title":"IEEE Access"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"5741","DOI":"10.1109\/JSYST.2022.3155156","article-title":"The security of blockchain-based medical systems: Research challenges and opportunities","volume":"16","author":"Liu","year":"2022","journal-title":"IEEE Syst. J."},{"key":"ref_15","unstructured":"Sahai, A., and Waters, B. (2005). Advances in Cryptology\u2013EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 22\u201326 May 2005, Springer. Proceedings 24."},{"key":"ref_16","unstructured":"Hinek, M.J., Jiang, S., Safavi-Naini, R., and Shahandashti, S.F. (2023, December 28). Attribute-Based Encryption with Key Cloning Protection. Report 2008\/478. Available online: https:\/\/eprint.iacr.org\/2008\/478."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Ning, J., Dong, X., Cao, Z., and Wei, L. (2015, January 21\u201325). Accountable authority ciphertext-policy attribute-based encryption with white-box traceability and public auditing in the cloud. Proceedings of the Computer Security\u2013ESORICS 2015: 20th European Symposium on Research in Computer Security, Vienna, Austria. Proceedings, Part II 20.","DOI":"10.1007\/978-3-319-24177-7_14"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"883","DOI":"10.1109\/TDSC.2016.2608343","article-title":"White-box traceable CP-ABE for cloud storage service: How to catch people leaking their access credentials effectively","volume":"15","author":"Ning","year":"2016","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"756","DOI":"10.1109\/JSYST.2022.3175244","article-title":"Black-box accountable authority cp-abe scheme for cloud-assisted e-health system","volume":"17","author":"Liu","year":"2022","journal-title":"IEEE Syst. J."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Qu, Z., Kumari, S., Obaidat, M.S., Alzahrani, B.A., and Xiong, H. (2023). Traceable Attribute-Based Encryption with Equality Test for Cloud-Enabled E-Health System. IEEE J. Biomed. Health Inform., 1\u201310.","DOI":"10.1109\/JBHI.2023.3321939"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Attrapadung, N., and Imai, H. (2009, January 12\u201314). Conjunctive broadcast and attribute-based encryption. Proceedings of the Pairing-Based Cryptography\u2013Pairing 2009: Third International Conference, Palo Alto, CA, USA. Proceedings 3.","DOI":"10.1007\/978-3-642-03298-1_16"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1214","DOI":"10.1109\/TPDS.2010.203","article-title":"Attribute-based access control with efficient revocation in data outsourcing systems","volume":"22","author":"Hur","year":"2010","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1767","DOI":"10.1109\/JSYST.2017.2667679","article-title":"User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage","volume":"12","author":"Li","year":"2017","journal-title":"IEEE Syst. J."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1109\/TDSC.2020.2977646","article-title":"A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection","volume":"19","author":"Han","year":"2022","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"2864","DOI":"10.1109\/TDSC.2021.3065999","article-title":"Revocable Attribute-Based Encryption With Data Integrity in Clouds","volume":"19","author":"Ge","year":"2022","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Chase, M., and Chow, S.S.M. (2009, January 9\u201313). Improving privacy and security in multi-authority attribute-based encryption. Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, IL, USA.","DOI":"10.1145\/1653662.1653678"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.1109\/TPDS.2015.2448095","article-title":"TMACS: A robust and verifiable threshold multi-authority access control system in public cloud storage","volume":"27","author":"Li","year":"2015","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1007\/s00500-016-2330-8","article-title":"Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage","volume":"22","author":"Zhong","year":"2018","journal-title":"Soft Comput."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"102347","DOI":"10.1016\/j.sysarc.2021.102347","article-title":"MACFI: A multi-authority access control scheme with efficient ciphertext and secret key size for fog-enhanced IoT","volume":"123","author":"Sarma","year":"2022","journal-title":"J. Syst. Archit."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.ins.2022.03.081","article-title":"Key escrow-free attribute based encryption with user revocation","volume":"600","author":"Zhang","year":"2022","journal-title":"Inf. Sci."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Yan, X., Tu, S., Alasmary, H., and Huang, F. (2023). Multiauthority Ciphertext Policy-Attribute-Based Encryption (MA-CP-ABE) with Revocation and Computation Outsourcing for Resource-Constraint Devices. Appl. Sci., 13.","DOI":"10.3390\/app132011269"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"10977","DOI":"10.1109\/TII.2023.3242815","article-title":"Attribute-based Data Sharing Scheme with Flexible Search Functionality for Cloud Assisted Autonomous Transportation System","volume":"19","author":"Xiong","year":"2023","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd, I., and Thorbek, R. (2006, January 24\u201326). Linear integer secret sharing and distributed exponentiation. Proceedings of the International Workshop on Public Key Cryptography, New York, NY, USA.","DOI":"10.1007\/11745853_6"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Boneh, D., Goh, E.J., and Nissim, K. (2005, January 10\u201312). Evaluating 2-DNF formulas on ciphertexts. Proceedings of the Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA. Proceedings 2.","DOI":"10.1007\/978-3-540-30576-7_18"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Lewko, A., and Waters, B. (2010, January 9\u201311). New techniques for dual system encryption and fully secure HIBE with short ciphertexts. Proceedings of the 7th Theory of Cryptography Conference, Zurich, Switzerland.","DOI":"10.1007\/978-3-642-11799-2_27"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"8269","DOI":"10.1109\/JIOT.2022.3154039","article-title":"A survey on attribute-based encryption schemes suitable for the internet of things","volume":"9","author":"Rasori","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Lewko, A., Okamoto, T., Sahai, A., Takashima, K., and Waters, B. (June, January 30). Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. Proceedings of the Advances in Cryptology\u2013EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, France. Proceedings 29.","DOI":"10.1007\/978-3-642-13190-5_4"}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/26\/1\/45\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T21:45:20Z","timestamp":1760132720000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/26\/1\/45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,31]]},"references-count":37,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,1]]}},"alternative-id":["e26010045"],"URL":"https:\/\/doi.org\/10.3390\/e26010045","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,31]]}}}