Traceable and revocable multi-authority ABE supporting decryption outsourcing and policy update for cloud data access control
en-GBde-DEes-ESfr-FR

Traceable and revocable multi-authority ABE supporting decryption outsourcing and policy update for cloud data access control

28/04/2026 HEP Journals

Nowadays, vast and rapidly growing information acts as digital records of social activities and is widely collected and stored as economic assets. To reduce the difficulty and local data management’s cost significantly, cloud storage services provide a highly available, high-performance, and low-cost solution for user data hosting, enabling remote access, backup, and sharing of data stored by the cloud. However, this service model is not without security risks, including user privacy exposure, low trustworthiness of data, and unauthorized access. To address these concerns, attribute-based encryption
(ABE) schemes allow for the implementation of fine-grained access policies while ensure the confidentiality and availability of data stored under the cloud environment. The issues of collusion among authorities, excessive decryption computation overhead, and high complexity in attribute revocation have aroused many researchers’ attention, and many works have emerged. However, expanding the functionality of ABE schemes to satisfy multiple requirements and improving existing functionality of ABE schemes are still urgent problems to be solved.
Motivated by these problems, a research team led by Yanqing YAO published their new research on 15 April 2026 in Frontiers of Computer Science co-published by Higher Education Press and Springer Nature.
The team proposed a novel multi-functional multi-authority ABE scheme that incorporates functional features such as multi-authority key generation, outsourced decryption, malicious user tracking, flexible attribute revocation, and real-time policy updates, thereby providing fine-grained access control as well as confidentiality for data stored under cloud environments. Similar to prior works, they analyzed the static security, forward security, and resistance to collusion attacks of their proposed scheme for completeness. Storage and computational efficiency evaluation shows that their proposed scheme achieves lower storage costs and computational overhead compared
to existing schemes with similar functionalities.
In the research, they present a multi-functional multi-authority ABE data sharing model. Based on the above model, they propose a multi-functional multi-authority ABE access control scheme which is traceable and revocable with high efficiency. This scheme adopts the multi-authority approach in ciphertext-policy ABE to achieve fine-grained access control while guaranteeing the confidentiality of cloud data. Here, data users can utilize the outsourcing servers to perform high-cost decryption operations, thereby reducing the computational burden on local terminals. By introducing attribute version keys in the scheme, authorities and cloud servers collaborate to execute efficient attribute revocation algorithms, achieving dual updates of keys and ciphertexts. Through delegating tracking servers to execute the white-box tracking algorithm, authorities can obtain the identities of users that maliciously leak decryption keys and expel them from the system. In addition, this scheme holds a flexible access policy update mechanism that allows data owners to change access permissions at any time and promptly updates the ciphertexts and access policies stored in the cloud.
They provide the correctness verification, security proofs and performance comparison results for their proposed scheme. The correctness verification confirms that their scheme can be performed correctly in algorithms such as encryption, decryption and outsourcing decryption. Similar to prior works, they give security proofs under a q−type assumption called q-1 assumption. They prove that this scheme can resist collusion attacks while maintaining static and forward security. By testing the operating costs of each algorithm module under different data scales, this scheme can significantly improve time efficiency, reduce key size, and shorten ciphertext length compared to known schemes, effectively decreasing the computation and storage costs.
Future work can focus on increasing the efficiency of the scheme and applying it to specific access control in the cloud environment.

DOI:10.1007/s11704-025-41356-7
Archivos adjuntos
  • System model of the multi-functional MA-ABE scheme for cloud data access control
28/04/2026 HEP Journals
Regions: Asia, China
Keywords: Applied science, Computing

Disclaimer: AlphaGalileo is not responsible for the accuracy of content posted to AlphaGalileo by contributing institutions or for the use of any information through the AlphaGalileo system.

Testimonios

We have used AlphaGalileo since its foundation but frankly we need it more than ever now to ensure our research news is heard across Europe, Asia and North America. As one of the UK’s leading research universities we want to continue to work with other outstanding researchers in Europe. AlphaGalileo helps us to continue to bring our research story to them and the rest of the world.
Peter Dunn, Director of Press and Media Relations at the University of Warwick
AlphaGalileo has helped us more than double our reach at SciDev.Net. The service has enabled our journalists around the world to reach the mainstream media with articles about the impact of science on people in low- and middle-income countries, leading to big increases in the number of SciDev.Net articles that have been republished.
Ben Deighton, SciDevNet
AlphaGalileo is a great source of global research news. I use it regularly.
Robert Lee Hotz, LA Times

Trabajamos en estrecha colaboración con...


  • The Research Council of Norway
  • SciDevNet
  • Swiss National Science Foundation
  • iesResearch
Copyright 2026 by DNN Corp Terms Of Use Privacy Statement