{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T01:43:33Z","timestamp":1760060613310,"version":"build-2065373602"},"reference-count":27,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T00:00:00Z","timestamp":1757894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61303191","22B0735","24A0532"],"award-info":[{"award-number":["61303191","22B0735","24A0532"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research Foundation of the Education Bureau of Hunan Province, China","award":["61303191","22B0735","24A0532"],"award-info":[{"award-number":["61303191","22B0735","24A0532"]}]},{"name":"Construct Program of Applied Specialty Disciplines in Hunan Province (Hunan Engineering University)","award":["61303191","22B0735","24A0532"],"award-info":[{"award-number":["61303191","22B0735","24A0532"]}]},{"name":"Hunan Provincial College Students\u2019 Innovation Training Program Project, China","award":["61303191","22B0735","24A0532"],"award-info":[{"award-number":["61303191","22B0735","24A0532"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>As an asymmetric encryption method capable of performing one-to-many encryption, the ciphertext-policy attribute-based encryption (CP-ABE) is widely recognized as an ideal cryptographic tool for cloud-based applications. It can empower data owners to independently and flexibly define and enforce access control policies for cloud-stored data. However, the practical implementation of CP-ABE-based cryptographic access control remains hindered by critical challenges. Firstly, malicious users may engage in key abuse by delegating attribute keys to unauthorized parties or exploiting their keys to construct decryption black-boxes for providing illegal decryption services. Consequently, a secure CP-ABE scheme must incorporate the capability to trace such malicious users who misuse their privileges. Secondly, for resource-constrained IoT devices, the substantial computational overhead of CP-ABE becomes prohibitive, making its deployment in scenarios like IoT-cloud services particularly challenging. In this paper, we propose a new CP-ABE scheme with black-box traceability and computational outsourcing capabilities. Our scheme can improve the tracing efficiency from O(N3) or O(rlogN) (as seen in traditional schemes) to O(1), where N is the number of system users. Furthermore, the proposed scheme features compulsory traceability and maintains outstanding performance in the aspects of encryption, decryption, and tracing operations.<\/jats:p>","DOI":"10.3390\/sym17091539","type":"journal-article","created":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T09:43:41Z","timestamp":1757929421000},"page":"1539","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Compulsory Black-Box Traceable CP-ABE with Outsourcing of Computation"],"prefix":"10.3390","volume":"17","author":[{"given":"Ying","family":"Hu","sequence":"first","affiliation":[{"name":"College of Information Science and Engineering, Hunan Institute of Engineering, Xiangtan 411100, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2950-1039","authenticated-orcid":false,"given":"Huidong","family":"Qiao","sequence":"additional","affiliation":[{"name":"College of Information Science and Engineering, Hunan Institute of Engineering, Xiangtan 411100, China"}]},{"given":"Jiangchun","family":"Ren","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology, Changsha 410073, China"}]},{"given":"Zhiying","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology, Changsha 410073, China"}]},{"given":"Junxian","family":"Li","sequence":"additional","affiliation":[{"name":"College of Information Science and Engineering, Hunan Institute of Engineering, Xiangtan 411100, China"}]},{"given":"Peng","family":"Han","sequence":"additional","affiliation":[{"name":"College of Information Science and Engineering, Hunan Institute of Engineering, Xiangtan 411100, China"}]}],"member":"1968","published-online":{"date-parts":[[2025,9,15]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"7706","DOI":"10.1109\/TCSVT.2025.3545868","article-title":"A 3D Memristive Cubic Map With Dual Discrete Memristors: Design, Implementation, and Application in Image Encryption","volume":"35","author":"Gao","year":"2025","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"114958","DOI":"10.1016\/j.chaos.2024.114958","article-title":"Temporal action segmentation for video encryption","volume":"183","author":"Gao","year":"2024","journal-title":"Chaos Solitons Fractals"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"520","DOI":"10.1016\/j.apm.2024.06.016","article-title":"Development of a video encryption algorithm for critical areas using 2D extended Schaffer function map and neural networks","volume":"134","author":"Gao","year":"2024","journal-title":"Appl. Math. Model."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Kamara, S., and Lauter, K. (2010). Cryptographic cloud storage. International Conference on Financial Cryptography and Data Security, Springer.","DOI":"10.1007\/978-3-642-14992-4_13"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., and Waters, B. (2007, January 20\u201323). Ciphertext-policy attribute-based encryption. Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, CA, USA.","DOI":"10.1109\/SP.2007.11"},{"key":"ref_6","unstructured":"Li, J., Ren, K., and Kim, K. (2009). A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control. Cryptol. Eprint Arch., 1\u201316."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Liu, Z., Cao, Z., and Wong, D.S. (2013, January 4\u20138). Blackbox traceable CP-ABE: How to catch people leaking their keys by selling decryption devices on eBay. Proceedings of the ACM Conference on Computer and Communications Security, Berlin, Germany.","DOI":"10.1145\/2508859.2516683"},{"key":"ref_8","first-page":"55","article-title":"Traceable CP-ABE: How to trace decryption devices found in the wild","volume":"10","author":"Liu","year":"2014","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_9","first-page":"551","article-title":"Traceable CP-ABE with short ciphertexts: How to catch people selling decryption devices on ebay efficiently","volume":"Volume 9879","author":"Ning","year":"2016","journal-title":"European Symposium on Research in Computer Security"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.future.2018.05.032","article-title":"Compulsory traceable ciphertext-policy attribute-based encryption against privilege abuse in fog computing","volume":"88","author":"Qiao","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Qiao, H., Ba, H., Zhou, H., Wang, Z., Ren, J., and Hu, Y. (2018). Practical, provably secure, and black-box traceable CP-ABE for cryptographic cloud storage. Symmetry, 10.","DOI":"10.3390\/sym10100482"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"102833","DOI":"10.1016\/j.sysarc.2023.102833","article-title":"An enhanced traceable CP-ABE scheme against various types of privilege leakage in cloud storage","volume":"136","author":"He","year":"2023","journal-title":"J. Syst. Archit."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"756","DOI":"10.1109\/JSYST.2022.3175244","article-title":"Black-box accountable authority cp-abe scheme for cloud-assisted e-health system","volume":"17","author":"Liu","year":"2022","journal-title":"IEEE Syst. J."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Yin, Y., Gan, Q., Zuo, C., Liu, N., Wang, C., and Jiang, Y. (2023, January 24\u201325). A Revocable Outsourced Data Accessing Control Scheme with Black-Box Traceability. Proceedings of the 18th International Conference on Information Security Practice and Experience, Copenhagen, Denmark.","DOI":"10.2139\/ssrn.4379140"},{"key":"ref_15","unstructured":"Green, M., Hohenberger, S., and Waters, B. (2011, January 8\u201312). Outsourcing the Decryption of ABE Ciphertexts. Proceedings of the 20th USENIX Security Symposium, San Francisco, CA, USA."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"2201","DOI":"10.1109\/TPDS.2013.271","article-title":"Securely outsourcing attribute-based encryption with checkability","volume":"25","author":"Li","year":"2014","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1109\/TC.2013.208","article-title":"Identity-based encryption with outsourced revocation in cloud computing","volume":"64","author":"Li","year":"2015","journal-title":"IEEE Trans. Comput."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Parno, B., Raykova, M., and Vaikuntanathan, V. (2012, January 19\u201321). How to delegate and verify in public: Verifiable computation from attribute-based encryption. Proceedings of the 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy.","DOI":"10.1007\/978-3-642-28914-9_24"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"8949","DOI":"10.1109\/JIOT.2021.3055541","article-title":"O3-R-CP-ABE: An efficient and revocable attribute-based encryption scheme in the cloud-assisted IoMT system","volume":"8","author":"Guo","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"705","DOI":"10.1142\/S0129054117400147","article-title":"Accountable CP-ABE with public verifiability: How to effectively protect the outsourced data in cloud","volume":"28","author":"Yu","year":"2017","journal-title":"Int. J. Found. Comput. Sci."},{"key":"ref_21","first-page":"102435","article-title":"Practical traceable multi-authority CP-ABE with outsourcing decryption and access policy updation","volume":"51","author":"Sethi","year":"2020","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Ziegler, D., Marsalek, A., and Palfinger, G. (2021, January 20\u201322). White-box traceable attribute-based encryption with hidden policies and outsourced decryption. Proceedings of the 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Shenyang, China.","DOI":"10.1109\/TrustCom53373.2021.00059"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Zhang, R., Hui, L., Yiu, S., Yu, X., Liu, Z., and Jiang, Z.L. (2017, January 11). A traceable outsourcing cp-abe scheme with attribute revocation. Proceedings of the 2017 IEEE Trustcom\/BigDataSE\/ICESS, Sydney, Australia.","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.259"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Naor, D., Naor, M., and Lotspiech, J. (2001, January 19\u201323). Revocation and tracing schemes for stateless receivers. Proceedings of the Advances in Cryptology\u2013CRYPTO 2001: 21st Annual International Cryptology Conference, Santa Barbara, CA, USA.","DOI":"10.1007\/3-540-44647-8_3"},{"key":"ref_25","unstructured":"Beimel, A. (1996). Secure Schemes for Secret Sharing and Key Distribution. [Ph.D. Thesis, Israel Institute of Technology]."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/978-3-642-19379-8_4","article-title":"Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization","volume":"6571","author":"Waters","year":"2011","journal-title":"Lect. Notes Comput. Sci."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"De Caro, A., and Iovino, V. (July, January 28). JPBC: Java pairing based cryptography. Proceedings of the 16th IEEE Symposium 595 on Computers and Communications, ISCC 2011, Kerkyra, Greece.","DOI":"10.1109\/ISCC.2011.5983948"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/17\/9\/1539\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:45:37Z","timestamp":1760035537000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/17\/9\/1539"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,15]]},"references-count":27,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2025,9]]}},"alternative-id":["sym17091539"],"URL":"https:\/\/doi.org\/10.3390\/sym17091539","relation":{},"ISSN":["2073-8994"],"issn-type":[{"type":"electronic","value":"2073-8994"}],"subject":[],"published":{"date-parts":[[2025,9,15]]}}}