{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T16:47:57Z","timestamp":1773074877744,"version":"3.50.1"},"reference-count":30,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T00:00:00Z","timestamp":1752537600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2023YFB2704500"],"award-info":[{"award-number":["2023YFB2704500"]}]},{"name":"Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing","award":["2023YFB2704500"],"award-info":[{"award-number":["2023YFB2704500"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>The rapid expansion of blockchain-based digital asset trading raises new challenges in security, privacy, and efficiency. Although traditional attribute-based encryption (ABE) provides fine-grained access control, it imposes considerable computational overhead and introduces additional vulnerabilities when decryption is outsourced. To address these limitations, we present EBODS, an efficient outsourced decryption framework that combines an optimized ABE scheme with a decentralized blockchain layer. By applying policy matrix optimization and leveraging edge decryption servers, EBODS reduces the public key size by 8% and markedly accelerates computation. Security analysis confirms the strong resistance of EBODS to collusion attacks, making it suitable for resource-constrained digital asset platforms.<\/jats:p>","DOI":"10.3390\/sym17071133","type":"journal-article","created":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T08:04:41Z","timestamp":1752566681000},"page":"1133","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Efficient Outsourced Decryption System with Attribute-Based Encryption for Blockchain-Based Digital Asset Transactions"],"prefix":"10.3390","volume":"17","author":[{"given":"Rui","family":"Jin","sequence":"first","affiliation":[{"name":"School of Artificial Intelligence, Beijing University of Posts and Telecommunications, No. 10 Xitucheng Road, Haidian District, Beijing 100876, China"}]},{"given":"Yuxuan","family":"Pan","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence, Beijing University of Posts and Telecommunications, No. 10 Xitucheng Road, Haidian District, Beijing 100876, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7349-8004","authenticated-orcid":false,"given":"Junjie","family":"Li","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence, Beijing University of Posts and Telecommunications, No. 10 Xitucheng Road, Haidian District, Beijing 100876, China"}]},{"given":"Yu","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence, Beijing University of Posts and Telecommunications, No. 10 Xitucheng Road, Haidian District, Beijing 100876, China"}]},{"given":"Daquan","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China"},{"name":"College of Information Science and Technology, Xizang University, Lhasa 850000, China"}]},{"given":"Mengmeng","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence, Beijing University of Posts and Telecommunications, No. 10 Xitucheng Road, Haidian District, Beijing 100876, China"},{"name":"Beijing Academy of Blockchain and Edge Computing, Beijing 100093, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7671-311X","authenticated-orcid":false,"given":"Konglin","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence, Beijing University of Posts and Telecommunications, No. 10 Xitucheng Road, Haidian District, Beijing 100876, China"}]}],"member":"1968","published-online":{"date-parts":[[2025,7,15]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"10068493","DOI":"10.1109\/ACCESS.2023.3257029","article-title":"Blockchain meets metaverse and digital asset management: A comprehensive survey","volume":"11","author":"Truong","year":"2023","journal-title":"IEEE Access"},{"key":"ref_2","first-page":"9805797","article-title":"A hybrid blockchain-edge architecture for electronic health record management with attribute-based cryptographic mechanisms","volume":"19","author":"Guo","year":"2022","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"22946","DOI":"10.1002\/int.22946","article-title":"An efficient blockchain-based privacy-preserving scheme with attribute and homomorphic encryption","volume":"37","author":"Xu","year":"2022","journal-title":"Int. J. Intell. Syst."},{"key":"ref_4","first-page":"10401173","article-title":"Blockchain-assisted hierarchical attribute-based encryption scheme for secure information sharing in industrial internet of things","volume":"20","author":"Sasikumar","year":"2024","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., and Waters, B. (2007, January 20\u201323). Ciphertext-policy attribute-based encryption. Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP\u201907), Berkeley, CA, USA.","DOI":"10.1109\/SP.2007.11"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1089\/big.2021.0301","article-title":"A ring learning with errors-based ciphertext-policy attribute-based proxy re-encryption scheme for secure big data sharing in cloud environment","volume":"12","author":"Li","year":"2022","journal-title":"Big Data"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Qian, X., and Wu, W. (2021, January 23\u201326). An Efficient Ciphertext Policy Attribute-Based Encryption Scheme from Lattices and Its Implementation. Proceedings of the 2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS), Chengdu, China.","DOI":"10.1109\/ICCCS52626.2021.9449182"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"102684","DOI":"10.1016\/j.sysarc.2022.102684","article-title":"Offline\/Online lattice-based ciphertext policy attribute-based encryption","volume":"130","author":"Fu","year":"2022","journal-title":"J. Syst. Archit."},{"key":"ref_9","unstructured":"Green, M., Hohenberger, S., and Waters, B. (2011, January 8\u201312). Outsourcing the Decryption of ABE Ciphertexts. Proceedings of the USENIX Security Symposium, San Francisco, CA, USA."},{"key":"ref_10","first-page":"16186","article-title":"Secure document sharing model based on blockchain technology and attribute-based encryption","volume":"83","author":"Verma","year":"2024","journal-title":"Multimed. Tools Appl."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"10743181","DOI":"10.1109\/ACCESS.2024.3491951","article-title":"Outsourcing Attribute-Based Encryption to Enhance IoT Security and Performance","volume":"12","author":"Taha","year":"2024","journal-title":"IEEE Access"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1007\/s12083-022-01406-4","article-title":"Blockchain-based fair payment for ABE with outsourced decryption","volume":"16","author":"Hong","year":"2023","journal-title":"Peer- Netw. Appl."},{"key":"ref_13","unstructured":"Genise, N., and Micciancio, D. (2025, July 08). Faster Gaussian Sampling for Trapdoor Lattices with Arbitrary Modulus. 2017. Publication Info: A Minor Revision of an IACR Publication in EUROCRYPT 2018. Available online: https:\/\/ia.cr\/2017\/308."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"579","DOI":"10.1109\/TCC.2021.3104323","article-title":"Secure remote cloud file sharing with attribute-based access control and performance optimization","volume":"11","author":"Chen","year":"2023","journal-title":"IEEE Trans. Cloud Comput."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Wu, C.Y., Huang, K.H., and Hsu, C.Y. (2025). A Decentralised Multi-Authority Attribute-Based Encryption for Secure and Scalable IoT Access Control. Appl. Sci., 15.","DOI":"10.3390\/app15073890"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"77","DOI":"10.47760\/cognizance.2025.v05i04.006","article-title":"Blockchain-Enabled, Post-Quantum Cryptographic Framework for Securing Electronic Health Records: A Next-Generation Approach to Healthcare Data Protection","volume":"5","author":"Adeoye","year":"2025","journal-title":"Cogniz. J. Multidiscip. Stud."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"5348","DOI":"10.1109\/TITS.2025.3533757","article-title":"Multi-Authority CP-ABE Scheme With Cryptographic Reverse Firewalls for Internet of Vehicles","volume":"26","author":"Lin","year":"2025","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Konda, B., Yadulla, A.R., Kasula, V.K., Yenugula, M., and Adupa, C. (2025, January 19\u201322). Enhancing Traceability and Security in mHealth Systems: A Proximal Policy Optimization-Based Multi-Authority Attribute-Based Encryption Approach. Proceedings of the 2025 29th International Conference on Information Technology (IT), Zabljak, Montenegro.","DOI":"10.1109\/IT64745.2025.10930307"},{"key":"ref_19","first-page":"1234","article-title":"Quantum-Resilient Cloud Systems: Preemptive Shielding Against Post-Quantum Cryptographic Threats","volume":"10","author":"Cherukupalle","year":"2025","journal-title":"J. Inf. Syst. Eng. Manag."},{"key":"ref_20","first-page":"103822","article-title":"Ciphertext policy attribute-based encryption scheme supporting Boolean circuits over ideal lattices","volume":"84","author":"Ma","year":"2024","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Riad, K. (2025). Robust Access Control for Secure IoT Outsourcing with Leakage Resilience. Sensors, 25.","DOI":"10.3390\/s25030625"},{"key":"ref_22","first-page":"04023","article-title":"ORR-CP-ABE: A secure and efficient outsourced attribute-based encryption scheme with decryption results reuse","volume":"156","author":"Tao","year":"2024","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1525","DOI":"10.1007\/s10586-020-03202-2","article-title":"PMTER-ABE: A practical multi-authority CP-ABE with traceability, revocation and outsourcing decryption for secure access control in cloud systems","volume":"24","author":"Sethi","year":"2021","journal-title":"Clust. Comput."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"2227","DOI":"10.1109\/TDSC.2024.3481497","article-title":"Attribute-Based Access Control Encryption","volume":"22","author":"Wang","year":"2024","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"103758","DOI":"10.1016\/j.csi.2023.103758","article-title":"A lattice-based public key encryption scheme with delegated equality test","volume":"87","author":"Xiao","year":"2024","journal-title":"Comput. Stand. Interfaces"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"3781","DOI":"10.1109\/TCE.2024.3377107","article-title":"A Revocable and Fair Outsourcing Attribute-Based Access Control Scheme in Metaverse","volume":"70","author":"Ruan","year":"2024","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"102318","DOI":"10.1016\/j.cose.2021.102318","article-title":"How to implement secure cloud file sharing using optimized attribute-based access control with small policy matrix and minimized cumulative errors","volume":"107","author":"Chen","year":"2021","journal-title":"Comput. Secur."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1126","DOI":"10.1109\/TSC.2023.3321378","article-title":"PUL-ABE: An efficient and quantum-resistant CP-ABE with policy update in cloud storage","volume":"17","author":"Yang","year":"2023","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1026","DOI":"10.1109\/TSC.2020.2973256","article-title":"RL-ABE: A revocable lattice attribute based encryption scheme based on R-LWE problem in cloud storage","volume":"15","author":"Zhao","year":"2022","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Sravya, G., and Padmavathy, R. (2023, January 2\u20138). Secure Lattice-Based Ciphertext-Policy Attribute-Based Encryption from Module-LWE for Cloud Storage. Proceedings of the 2023 IEEE 16th International Conference on Cloud Computing (CLOUD), Chicago, IL, USA.","DOI":"10.1109\/CLOUD60044.2023.00074"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/17\/7\/1133\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:09:44Z","timestamp":1760033384000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/17\/7\/1133"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,15]]},"references-count":30,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2025,7]]}},"alternative-id":["sym17071133"],"URL":"https:\/\/doi.org\/10.3390\/sym17071133","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,15]]}}}