{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T23:47:50Z","timestamp":1769557670674,"version":"3.49.0"},"reference-count":45,"publisher":"MDPI AG","issue":"15","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004479","name":"Natural Science Foundation of Jiangxi Province","doi-asserted-by":"publisher","award":["20212BAB202015"],"award-info":[{"award-number":["20212BAB202015"]}],"id":[{"id":"10.13039\/501100004479","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004479","name":"Natural Science Foundation of Jiangxi Province","doi-asserted-by":"publisher","award":["20232ABC03A18"],"award-info":[{"award-number":["20232ABC03A18"]}],"id":[{"id":"10.13039\/501100004479","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004479","name":"Natural Science Foundation of Jiangxi Province","doi-asserted-by":"publisher","award":["YC2023-S413"],"award-info":[{"award-number":["YC2023-S413"]}],"id":[{"id":"10.13039\/501100004479","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Jiangxi Provincial Special Program 03 and 5G Projects","award":["20212BAB202015"],"award-info":[{"award-number":["20212BAB202015"]}]},{"name":"Jiangxi Provincial Special Program 03 and 5G Projects","award":["20232ABC03A18"],"award-info":[{"award-number":["20232ABC03A18"]}]},{"name":"Jiangxi Provincial Special Program 03 and 5G Projects","award":["YC2023-S413"],"award-info":[{"award-number":["YC2023-S413"]}]},{"name":"2023 Jiangxi Provincial Special Fund Projects for Graduate Student Innovation","award":["20212BAB202015"],"award-info":[{"award-number":["20212BAB202015"]}]},{"name":"2023 Jiangxi Provincial Special Fund Projects for Graduate Student Innovation","award":["20232ABC03A18"],"award-info":[{"award-number":["20232ABC03A18"]}]},{"name":"2023 Jiangxi Provincial Special Fund Projects for Graduate Student Innovation","award":["YC2023-S413"],"award-info":[{"award-number":["YC2023-S413"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Existing attribute-based proxy re-encryption schemes suffer from issues like complex access policies, large ciphertext storage space consumption, and an excessive authority of the authorization center, leading to weak security and controllability of data sharing in cloud storage. This study proposes a Weighted Attribute Authority Multi-Authority Proxy Re-Encryption (WAMA-PRE) scheme that introduces attribute weights to elevate the expression of access policies from binary to multi-valued, simplifying policies and reducing ciphertext storage space. Simultaneously, the multiple attribute authorities and the authorization center construct a joint key, reducing reliance on a single authorization center. The proposed distributed attribute authority network enhances the anti-attack capability of cloud storage. Experimental results show that introducing attribute weights can reduce ciphertext storage space by 50%, proxy re-encryption saves 63% time compared to repeated encryption, and the joint key construction time is only 1% of the benchmark scheme. Security analysis proves that WAMA-PRE achieves CPA security under the decisional q-parallel BDHE assumption in the random oracle model. This study provides an effective solution for secure data sharing in cloud storage.<\/jats:p>","DOI":"10.3390\/s24154939","type":"journal-article","created":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T15:25:23Z","timestamp":1722353123000},"page":"4939","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Weighted Attribute-Based Proxy Re-Encryption Scheme with Distributed Multi-Authority Attributes"],"prefix":"10.3390","volume":"24","author":[{"given":"Wenlong","family":"Yi","sequence":"first","affiliation":[{"name":"School of Software, Jiangxi Agricultural University, Nanchang 330045, China"}]},{"given":"Chuang","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Software, Jiangxi Agricultural University, Nanchang 330045, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0681-9469","authenticated-orcid":false,"given":"Sergey","family":"Kuzmin","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science and Technology, Saint Petersburg Electrotechnical University \u201cLETI\u201d, Saint Petersburg 197022, Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0965-1438","authenticated-orcid":false,"given":"Igor","family":"Gerasimov","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science and Technology, Saint Petersburg Electrotechnical University \u201cLETI\u201d, Saint Petersburg 197022, Russia"}]},{"given":"Xiangping","family":"Cheng","sequence":"additional","affiliation":[{"name":"Institute of Applied Physics, Jiangxi Academy of Sciences, Nanchang 330096, China"}]}],"member":"1968","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"ref_1","first-page":"2013","article-title":"A blockchain-based trusted data management scheme in edge computing","volume":"16","author":"Ma","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"9259","DOI":"10.1109\/TII.2022.3177630","article-title":"Blockchain-Enabled Multiparty Computation for Privacy Preserving and Public Audit in Industrial IoT","volume":"18","author":"Yang","year":"2022","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1080","DOI":"10.1109\/TII.2022.3189170","article-title":"Cloud-IIoT-based electronic health record privacy-preserving by CNN and blockchain-enabled federated learning","volume":"19","author":"Alzubi","year":"2022","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Yi, W., Wang, C., Xie, Q., Zhao, Y., and Jia, J. (2023). PSBF: p-adic Integer Scalable Bloom Filter. Sensors, 23.","DOI":"10.3390\/s23187775"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/MSP.2009.87","article-title":"Data security in the world of cloud computing","volume":"7","author":"Kaufman","year":"2009","journal-title":"IEEE Secur. Priv."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MSP.2010.186","article-title":"Security and privacy challenges in cloud computing environments","volume":"8","author":"Takabi","year":"2010","journal-title":"IEEE Secur. Priv."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1949","DOI":"10.1109\/JBHI.2021.3075995","article-title":"An efficient ciphertext-policy weighted attribute-based encryption for the internet of health things","volume":"26","author":"Li","year":"2021","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"104002","DOI":"10.1016\/j.cose.2024.104002","article-title":"Secured lightweight authentication for 6LoWPANs in machine-to-machine communications","volume":"145","author":"Ashrif","year":"2024","journal-title":"Comput. Secur."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1109\/TII.2021.3077008","article-title":"Blockchain-based fully peer-to-peer energy trading strategies for residential energy systems","volume":"18","author":"AlSkaif","year":"2021","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1643","DOI":"10.1007\/s12083-020-00918-1","article-title":"Attribute-based encryption with outsourced decryption in blockchain","volume":"13","author":"Zheng","year":"2020","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Li, Q., Yi, W., and Xiong, H. (2023). Agricultural IoT Data Storage Optimization and Information Security Method Based on Blockchain. Agriculture, 13.","DOI":"10.3390\/agriculture13020274"},{"key":"ref_12","first-page":"4132597","article-title":"A Blockchain-Based CP-ABE Scheme with Partially Hidden Access Structures","volume":"1","author":"Ba","year":"2021","journal-title":"Secur. Commun. Netw."},{"key":"ref_13","first-page":"2379","article-title":"Blockchain-based private provable data possession","volume":"18","author":"Wang","year":"2019","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"2755","DOI":"10.1109\/TSC.2021.3078119","article-title":"Ehrchain: A blockchain-based ehr system using attribute-based and homomorphic cryptosystem","volume":"15","author":"Li","year":"2021","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"5826","DOI":"10.1109\/TVT.2020.2968094","article-title":"A secure and verifiable data sharing scheme based on blockchain in vehicular social networks","volume":"69","author":"Fan","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Naz, M., Al-zahrani, F.A., Khalid, R., Javaid, N., Qamar, A.M., Afzal, M.K., and Shafiq, M. (2019). A secure data sharing platform using blockchain and interplanetary file system. Sustainability, 11.","DOI":"10.3390\/su11247054"},{"key":"ref_17","unstructured":"Sahai, A., and Waters, B. (2005, January 22\u201326). Fuzzy identity-based encryption. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark."},{"key":"ref_18","unstructured":"Goyal, V., Pandey, O., Sahai, A., and Waters, B. (November, January 30). Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., and Waters, B. (2007, January 20\u201323). Ciphertext-policy attribute-based encryption. Proceedings of the 2007 IEEE symposium on security and privacy (SP\u201907), Oakland, CA, USA.","DOI":"10.1109\/SP.2007.11"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1265","DOI":"10.1109\/TIFS.2016.2523941","article-title":"An efficient file hierarchy attribute-based encryption scheme in cloud computing","volume":"11","author":"Wang","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"e2942","DOI":"10.1002\/dac.2942","article-title":"Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage","volume":"30","author":"Li","year":"2017","journal-title":"Int. J. Commun. Syst."},{"key":"ref_22","first-page":"680","article-title":"A Searchable CP-ABE Privacy Preserving Scheme","volume":"21","author":"Feng","year":"2019","journal-title":"Int. J. Netw. Secur."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"2864","DOI":"10.1109\/TDSC.2021.3065999","article-title":"Revocable attribute-based encryption with data integrity in clouds","volume":"19","author":"Ge","year":"2021","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_24","first-page":"6074322","article-title":"You Are Revoked and Out: Towards Directly Revocable Ciphertext-Policy Attribute-Based Encryption","volume":"1","author":"Yang","year":"2022","journal-title":"Secur. Commun. Netw."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1007\/s12652-021-02922-6","article-title":"PHAS-HEKR-CP-ABE: Partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system","volume":"13","author":"Zhang","year":"2022","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1127345.1127346","article-title":"Improved proxy re-encryption schemes with applications to secure distributed storage","volume":"9","author":"Ateniese","year":"2006","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Green, M., and Ateniese, G. (2007, January 5\u20138). Identity-based proxy re-encryption. Proceedings of the Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China.","DOI":"10.1007\/978-3-540-72738-5_19"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Weng, J., Deng, R.H., Ding, X., Chu, C.-K., and Lai, J. (2009, January 10\u201312). Conditional proxy re-encryption secure against chosen-ciphertext attack. Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, New York, NY, USA.","DOI":"10.1145\/1533057.1533100"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Liang, X., Cao, Z., Lin, H., and Shao, J. (2009, January 10\u201312). Attribute based proxy re-encryption with delegating capabilities. Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, New York, NY, USA.","DOI":"10.1145\/1533057.1533094"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Luo, S., Hu, J., and Chen, Z. (2010, January 15\u201317). Ciphertext policy attribute-based proxy re-encryption. Proceedings of the Information and Communications Security: 12th International Conference, ICICS 2010, Barcelona, Spain.","DOI":"10.1007\/978-3-642-17650-0_28"},{"key":"ref_31","unstructured":"Mizuno, T., and Doi, H. (2009, January 12\u201315). Hybrid proxy re-encryption scheme for attribute-based encryption. Proceedings of the Information Security and Cryptology: 5th International Conference, Inscrypt 2009, Beijing, China."},{"key":"ref_32","unstructured":"Chase, M. (2007, January 21\u201324). Multi-authority attribute based encryption. Proceedings of the Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Lin, H., Cao, Z., Liang, X., and Shao, J. (2008, January 14\u201317). Secure threshold multi authority attribute based encryption without a central authority. Proceedings of the Progress in Cryptology-INDOCRYPT 2008: 9th International Conference on Cryptology in India, Kharagpur, India.","DOI":"10.1007\/978-3-540-89754-5_33"},{"key":"ref_34","unstructured":"Lewko, A., and Waters, B. (2011, January 15\u201319). Decentralizing attribute-based encryption. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"12038","DOI":"10.1109\/TITS.2023.3287643","article-title":"SDSS: Secure Data Sharing Scheme for Edge Enabled IoV Networks","volume":"24","author":"Liu","year":"2023","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Liu, X., Ma, J., Xiong, J., Li, Q., and Ma, J. (2013, January 9\u201311). Ciphertext-policy weighted attribute based encryption for fine-grained access control. Proceedings of the 2013 5th International Conference On Intelligent Networking and Collaborative Systems, Washington, DC, USA.","DOI":"10.1109\/INCoS.2013.18"},{"key":"ref_37","first-page":"437","article-title":"Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data","volume":"16","author":"Liu","year":"2014","journal-title":"Int. J. Netw. Secur."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1951","DOI":"10.1109\/TC.2013.83","article-title":"Arbitrary-state attribute-based encryption with dynamic membership","volume":"63","author":"Fan","year":"2013","journal-title":"IEEE Trans. Comput."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"1661","DOI":"10.1109\/TIFS.2016.2549004","article-title":"Attribute-based data sharing scheme revisited in cloud computing","volume":"11","author":"Wang","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"1440","DOI":"10.1587\/transfun.E101.A.1440","article-title":"Attribute-based encryption for range attributes","volume":"101","author":"Attrapadung","year":"2018","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"1491","DOI":"10.1109\/TC.2017.2693265","article-title":"CABE: A new comparable attribute-based encryption construction with 0-encoding and 1-encoding","volume":"66","author":"Xue","year":"2017","journal-title":"IEEE Trans. Comput."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Li, W., Ni, W., Liu, D., Liu, R.P., and Luo, S. (2018). Unified ciphertext-policy weighted attribute-based encryption for sharing data in cloud computing. Appl. Sci., 8.","DOI":"10.3390\/app8122519"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/s12083-022-01387-4","article-title":"A revocable attribute-based encryption EHR sharing scheme with multiple authorities in blockchain","volume":"16","author":"Yang","year":"2023","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_44","first-page":"102503","article-title":"Multi-authority CP-ABE-based user access control scheme with constant-size key and ciphertext for IoT deployment","volume":"53","author":"Banerjee","year":"2020","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"120930","DOI":"10.1016\/j.ins.2024.120930","article-title":"CCC-TM: Cross-Chain consensus committee method using a trust model","volume":"677","author":"Yi","year":"2024","journal-title":"Inf. Sci."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/15\/4939\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T15:26:36Z","timestamp":1760109996000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/15\/4939"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":45,"journal-issue":{"issue":"15","published-online":{"date-parts":[[2024,8]]}},"alternative-id":["s24154939"],"URL":"https:\/\/doi.org\/10.3390\/s24154939","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,30]]}}}