iconOpen Access

ARTICLE

Toward Secure and Auditable Data Sharing: A Cross-Chain CP-ABE Framework

Ye Tian1,*, Zhuokun Fan1, Yifeng Zhang2

1 College of Computer Science and Technology, Taiyuan Normal University, Jinzhong, 030619, China
2 State Grid Shanxi Electric Power Research Institute, Taiyuan, 030001, China

* Corresponding Author: Ye Tian. Email: email

Computers, Materials & Continua 2026, 87(1), 62 https://doi.org/10.32604/cmc.2025.073935

Abstract

Amid the increasing demand for data sharing, the need for flexible, secure, and auditable access control mechanisms has garnered significant attention in the academic community. However, blockchain-based ciphertext-policy attribute-based encryption (CP-ABE) schemes still face cumbersome ciphertext re-encryption and insufficient oversight when handling dynamic attribute changes and cross-chain collaboration. To address these issues, we propose a dynamic permission attribute-encryption scheme for multi-chain collaboration. This scheme incorporates a multi-authority architecture for distributed attribute management and integrates an attribute revocation and granting mechanism that eliminates the need for ciphertext re-encryption, effectively reducing both computational and communication overhead. It leverages the InterPlanetary File System (IPFS) for off-chain data storage and constructs a cross-chain regulatory framework—comprising a Hyperledger Fabric business chain and a FISCO BCOS regulatory chain—to record changes in decryption privileges and access behaviors in an auditable manner. Security analysis shows selective indistinguishability under chosen-plaintext attack (sIND-CPA) security under the decisional q-Parallel Bilinear Diffie-Hellman Exponent Assumption (q-PBDHE). In the performance and experimental evaluations, we compared the proposed scheme with several advanced schemes. The results show that, while preserving security, the proposed scheme achieves higher encryption/decryption efficiency and lower storage overhead for ciphertexts and keys.

Keywords

Data sharing; blockchain; attribute-based encryption; dynamic permissions

1  Introduction

With the advent of the digital era, data sharing has emerged as a crucial driver of cross-industry collaboration and efficiency enhancement, particularly in sectors such as healthcare, finance, and the Internet of Things, where cross-organizational data exchange has become routine [1]. The frequent circulation of sensitive information necessitates stricter security. In privacy protection, users expect fine-grained control over access rights to prevent unauthorized access and abuse [2]. Traditional centralized storage, although convenient to manage, faces single-point failures, susceptibility to attack, and risks of tampering, making it unsuitable for complex, high-sensitivity sharing scenarios [3].

Against this backdrop, blockchain—a decentralized, immutable, and traceable ledger—is widely recognized as an emerging solution for securing data sharing [4,5]. When combined with distributed storage systems (e.g., InterPlanetary File System IPFS), it improves availability while strengthening integrity and trustworthiness [6,7]. In terms of access control, attribute-based encryption (ABE) has become a key encryption technology for ensuring data privacy because it supports flexible encryption mechanisms based on user attributes [8]. In particular, ciphertext-policy attribute-based encryption (CP-ABE) allows data owners to embed access policies directly into ciphertext, ensuring that only authorized users can decrypt the data [9]. This mechanism has been widely applied to fine-grained access control and privacy protection. With the rise of blockchain, blockchain-based CP-ABE schemes have attracted increasing attention and become an important research direction for constructing trustworthy data-sharing mechanisms.

Nevertheless, current blockchain-based CP-ABE schemes still have several limitations. First, many schemes rely on centralized Attribute Authorities (AAs), which create single points of failure and abuse of authority. Second, existing solutions lack an effective combination of attribute revocation and granting mechanisms and generally rely on ciphertext re-encryption, resulting in high computational and communication costs that are difficult to meet in blockchain environments with limited resources. Furthermore, most solutions adopt a single-chain architecture [10] and lack on-chain and off-chain coordination, making it difficult to support complex scenarios where data circulation and regulation oversight exist simultaneously.

In response to these shortcomings, we propose a dynamic permission attribute encryption scheme under multi-chain collaboration, which supports multi-institution attribute management and dynamic permission updates. The main contributions include:

•   We designed a dynamic attribute revocation and granting mechanism without ciphertext updates, eliminating the computational burden of frequent re-encryption in traditional solutions and enabling more fine-grained and dynamic permission management.

•   We constructed a multi-authority collaborative key-generation mechanism that allows multiple AAs to distribute and manage user keys independently, enhancing security and flexibility while mitigating single-authority concentration risk.

•   We designed a multi-chain CP-ABE access-control framework based on Hyperledger Fabric, FISCO BCOS, and IPFS in Fig. 1, supporting structured auditing and traceability of user decryption behavior and dynamic attribute management operations.

images

Figure 1: Multi-chain collaborative CP-ABE access control scheme

2  Related Work

CP-ABE has become a key technology for safeguarding data privacy, owing to its unique advantages in data access control. However, traditional CP-ABE schemes typically rely on centralized authorities, leading to over-centralized privilege management in large-scale systems. To overcome this limitation, researchers have proposed Multi-Authority CP-ABE (MA-CP-ABE) [1115], which distributes attribute management across multiple Attribute Authorities (AA) to avoid single-point failures. As user privileges evolve, attribute revocation becomes essential for fine-grained access control. Revocation mechanisms can be categorized into user-level and attribute-level revocation. User-level revocation [16] revokes all attribute authorizations once a user loses access rights. Although this approach is simple and direct, it can result in over-restriction of permissions. By contrast, attribute-level revocation [1719] targets only specific attributes affected by privilege changes. This method improves fine-grained access control but introduces higher computational complexity.

To further enhance security and decentralization, blockchain has been integrated with CP-ABE. Ren et al. [20] developed a blockchain-based distributed key management system combined with Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge (zk-SNARKs), which eliminates single points of failure while protecting access policy privacy, though it does not address attribute revocation. Guo et al. [21] proposed blockchain-aided ABE with escrow-free (BC-ABE-EF) in a consortium chain setting, achieving no key escrow and immediate user revocation. Despite solving key-escrow issues, it still relies on periodic group-key updates and ciphertext re-encryption, incurring significant computation and communication overhead. To reduce update overhead, Li and Qi [22] introduced a pre-decryption mechanism combined with an attribute revocation list, enabling real-time on-chain revocation. However, their approach imposes a fixed upper limit on attribute sets, limiting its scalability in large-scale environments. More recently, Thakur et al. [23] presented the Blockchain-based CP-ABE (BloCPABE) scheme, embedding revocation tags into attribute keys to achieve immediate revocation and anonymous key generation within a blockchain framework.

In addition to security, researchers have sought to improve data-sharing efficiency by reducing blockchain’s high storage costs. One approach integrates IPFS with blockchain [2426]. In such designs, where blockchain stores only data indexes and audit records, while the actual data are stored on IPFS, reducing on-chain storage demands without compromising immutability. However, as application scenarios expand and requirements grow more complex, single blockchain networks increasingly face challenges in scalability, performance, and cross-organizational collaboration [27]. Consortium blockchains, such as Hyperledger Fabric, have emerged as important solutions owing to their advantages in channel management, chaincode control, and private data collection [28]. Meanwhile, the “Data islands” phenomenon across heterogeneous blockchains has become more pronounced. To address this, cross-chain technologies have emerged: Cosmos [29] and Polkadot [30] enable efficient interoperability via heterogeneous-chain protocols, in parallel, domestic research efforts such as WeCross are drawing growing attention from the academic community.

Despite notable progress in access control and privacy protection, important gaps remain. First, most CP-ABE revocation approaches still rely on key updates and ciphertext re-encryption, imposing heavy computational and storage burdens. Moreover, they do not fully integrate dynamic attribute revocation and granting without ciphertext updates. Second, most blockchain-based CP-ABE schemes use single-chain architectures and provide limited support for multi-chain environments, cross-chain data sharing and coordinated auditing remain unresolved.

In order to tackle these problems, we design a dynamic permission attribute-encryption scheme under multi-chain collaboration, integrating a multi-authority mechanism to improve security, flexibility, and scalability.

3  Preliminaries

3.1 Blockchain Technology and Cross-Chain Communication

Blockchain is a type of distributed ledger technology (DLT) that operates as a decentralized, jointly maintained database where network participants contribute to and manage records. The blockchain system uses digital signatures and encryption algorithms to generate blocks containing data and relies on a consensus mechanism to ensure the majority approval of the participating nodes, making the data secure, safe, and unforgeable. Depending on node access permissions, blockchains are categorized as public, consortium, or private. Constrained by their architectural design, single blockchain systems cannot efficiently exchange data and value with other chains, leading to the so-called “data-island” effect. In order to solve this problem, cross-chain technology has emerged, providing a chain-to-chain communication protocol to enable secure, trustworthy, and efficient data and asset interaction across different chains.

3.2 CP-ABE

CP-ABE, embeds an access policy directly into the ciphertext, allowing data owners to define flexible access control rules. Unlike traditional identity-based encryption, CP-ABE determines decryption eligibility by matching a user’s attribute set against the embedded policy, plaintext can only be successfully restored when the user attributes meet the policy. This scheme typically comprises four fundamental algorithms:

•   Setup(λ)(PP,MK): A trusted authority defines the λ and generates the PP and MK.

•   KeyGen(PP,MK,S)SK: Given PP, MK, and S, this algorithm outputs the corresponding SK.

•   Encrypt(PP,Λ,data)CT: With PP, an access policy Λ, and plaintext data as inputs, this algorithm outputs the ciphertext (CT).

•   Decrypt(PP,CT,SK)Data: Given PP and SK, this algorithm attempts to recover the plaintext from CT, successful decryption occurs only if the user’s attributes satisfy the policy.

3.3 Bilinear Pairings

•   Define G1, G2 and GT as multiplicative cyclic groups, they are all prime order p, g1G1,g2G2 are the generators. We define: e:G1×G2GT, which satisfies the following properties:

•   Bilinearity: g1G1,g2G2,a,bZpe(g1a,g2b)=e(g1,g2)ab.

•   Non-degeneracy: e(g1,g2)1.

•   Computability: g1G1,g2G2,there exists an efficient polynomial-time algorithm to compute e(g1,g2).

3.4 Linear Secret Sharing Schemes (LSSS)

Assume that an access structure Λ converts an l×n matrix MZpl×n and a mapping function ρ:{1,2,,l}𝒫, where each row of the M is mapped to an attribute, ρ(i)𝒫. A random vector v=(s,r2,,rn)Zpn is chosen, s represents the value of the shared secret. The share of row i is computed as λi=Miv,i{1,,l}. During decryption, if the user’s attribute set S𝒫 satisfies Λ, a set of reconstruction coefficients {ωiZp}iI exists, making iIωiMi=(1,0,,0) where I={i:ρ(i)S}. Thus, the user can recover the secret by computing iIωiλi=s.

3.5 Decisional q-Parallel Bilinear Diffie-Hellman Exponent Assumption(q-PBDHE)

Define G1, G2, GT as multiplicative cyclic groups, they are all prime order P. g1G1, g2G2 be the generators. e:G1×G2GT is bilinear mapping. Define X=(g2s,g2as,,g2aqs), a,sZp, Y=(g1,g1a,,g1aq,g1aq+2,,g1a2q). The challenge is to distinguish whether Z=e(g1,g2)αq+1s or ZGT. The advantage of an adversary 𝒜 is given by:

Adv𝒜qPBDHE=|Pr[𝒜(Y,X,Z)=1|Z=e(g1,g2)aq+1s]Pr[𝒜(Y,X,Z)=1|ZGT]|(1)

If for all probabilistic polynomial-time (PPT) Adv𝒜qBDHEε and ε is negligible, then the q-PBDHE is said to hold in group (G1,G2,GT).

4  System Model

4.1 System Architecture

To enable dynamic access control for data sharing and regulatory auditing, we propose an integrated architecture that combines on-chain and off-chain collaboration with dynamic attribute-based encryption, as shown in Fig. 2. The architecture is composed of the Hyperledger Fabric business chain, the FISCO BCOS regulatory chain, IPFS, and an off-chain encryption module. These components provide secure data storage, flexible authorization, auditable record-keeping, and fine-grained access control. The system model involves six core participant categories:

•   Central Authority (CA): Initializes the system and generates global public parameters.

•   Attribute Authority (AA): Independently manages attributes by category. Each AA issues user attributes with private keys for its managed attributes and supports attribute revocation and granting.

•   Data Owner (DO): Responsible for processing raw data, setting access policies, uploading attribute ciphertexts, etc. to the business chain after hybrid encryption.

•   Data User (DU): Holds a set of attributes and obtains attribute private keys from the relevant AAs. Using these keys, the DUs decrypt and access data stored on the regulatory chain.

•   Regulator Node (RN): Participates in the regulatory chain, receives summaries of regulatory data uploaded from the business chain, and audits user activity records.

•   Cross-Chain Network:

•   Business Chain: Built on the Hyperledger Fabric Consortium blockchain, it stores IPFS content identifiers (CID), attribute ciphertexts, and other business-related data.

•   Regulatory Chain: Implemented on the FISCO BCOS blockchain, it stores structured audit information, including regulatory logs, decryption records, and attribute revocation or granting events.

images

Figure 2: System architecture

4.2 Algorithm Description

The algorithms of this system operate between different participants and collaborate to achieve key generation, data encryption and decryption, access control and audit operations. The notation used is listed in Table 1. The core algorithms are defined as follows:

•   Setup(λ)(PP,MK): Executed by the CA, initializes with λ, outputs PP, MK.

•   KeyGen(PP,MK,K,S)SK: User Autonomous Generation (K,k), generate attribute private key components for their managed attributes separately and jointly SK.

•   Encrypt(PP,Λ,Ksym)CT: Executed by the DO, takes Ksym, Λ as input, outputs CT.

•   PreDecrypt(PP,CT,SK)CTmid/: Executed by the RN, takes (SK, CT) as input, outputs CTmid if attributes satisfy the access policy, otherwise ⊥.

•   Decrypt(CT,CTmid,k)Ksym: Executed locally by the user with k, outputs the Ksym.

•   Revoke(PP, SK, attr)SK: Executed by the AA, Given SK and a target attribute attr to be revoked, outputs updated SK.

•   Grant(PP,SK, attr)SK: Executed by the AA, Given SK, it assigns a new attribute attr to the user and outputs the updated secret key SK.

images

4.3 Security Objectives

•   Confidentiality: Unauthorized users, even if they possess partial attributes and key information, cannot recover the original plaintext from the ciphertext, thereby ensuring the confidentiality of the data.

•   Pre-Decryption Correctness: Users whose attributes satisfy the access policy can correctly compute the intermediate ciphertext using their private keys and ciphertext. This intermediate ciphertext is then used for subsequent symmetric key recovery and plaintext decryption, thereby ensuring the functionality of the system.

•   Forward Security: When a user’s attribute is revoked, the system ensures that even if they previously held a valid key, they are unable to decrypt subsequent ciphertext, thus providing forward security.

•   Anti-Collusion: Users who do not satisfy the access policy, even when combining their respective attributes and private key components, cannot bypass the policy to recover the plaintext, effectively preventing illegal collusion attacks.

4.4 Attack Model

To formally describe the confidentiality security of this scheme under the off-chain pre-decryption structure, we define a game-based security model to simulate the interaction between an attacker 𝒜 and a challenger 𝒞 under the selective indistinguishability under chosen-plaintext attack (sIND-CPA):

•   Initialization. 𝒜 commits to a target access policy Λ to be challenged. The goal of A is to gather sufficient information via adaptive queries to obtain a non-negligible advantage in distinguishing which of two challenge ciphertexts is encrypted.

•   System setup. 𝒞 runs the system initialization algorithm Setup(λ) and sends PP to 𝒜.

•   Stage 1: Attribute private key query. 𝒜 can adaptively initiate private key queries multiple times on any attribute set S, but none of these attribute sets satisfy Λ. 𝒞 runs algorithm KeyGen(PP,MK,K,S) to generate the SKi and returns it to 𝒜.

•   Challenge. 𝒜 submits two equal-length symmetric keys {Ksym0,Ksym1}, 𝒞 randomly selects a bit b{0,1}, performs the algorithm Encrypt(PP,Λ,Ksymb) and returns the challenge ciphertexts CT to 𝒜.

•   Stage 2: Pre-decryption query. 𝒜 can again adaptively query 𝒞 for any attributes set S that does not satisfy the Λ, requesting its attribute private key or pre-decrypted value. If the attribute private key is queried, 𝒞 returns the corresponding SKi (same as in stage 1). If the pre-decrypted value is queried, 𝒞 executes PreDecrypt(PP,CT,SKi) and returns .

•   Guess. 𝒜 outputs a guess b{0,1}, if b=b the attack is considered successful. The advantage of an attacker is defined as

Adv𝒜INDCPA(λ)=|Pr[b=b]12|(2)

For any probabilistic polynomial time (PPT) 𝒜, if its advantage over the security parameter λ is a negligible function, then the scheme is considered secure under sIND-CPA.

5  Dynamic Permission Attribute-Encryption Scheme under Multi-Chain Coordination

5.1 System Initialization

5.1.1 Public Parameter Generation

The system generates public parameters through Setup(λ)(PP,MK), CA defines e:G1×G2GT, g1G1,g2G2, randomly select the system master secret αZp, calculates e(g1,g2)α and defines H:{0,1}G1. The public parameters PP and master key MK are generated as follows:

PP={g1,g2,e(g1,g2)α,H},MK=α(3)

5.1.2 Attribute Authority Configuration

AASetup(PP,id): A certain type of attribute in the system is managed by a unique attribute authority AAi, which initializes and registers the jurisdiction attribute domain 𝒳i={xi1,xi2,,xin}𝒫. For each user requesting access to a set of attributes S𝒳i, the corresponding attribute authority AA performs a per-attribute check of the request.

5.2 Multi-Authority Secret Key Generation

5.2.1 User’s Private Key Generation

The user DU randomly selects kZp and computes K=1/k, generating the private key (K,k).

5.2.2 Attribute Secret Key Generation

Let S={attr1,attr2,,attrn}𝒫, CA issues dynamic factors τZp during the registration phase and coordinates with each AA to calculate the corresponding attribute private key component and master key component for each attribute attrjS𝒳i under its responsibility:

K2[attrj]=H(attrj)τK1=g1αKg1τ(4)

Finally, the complete attribute private key is output:

SK=(K1,{K2[attrj]}j=1n)(5)

5.3 Design of Encryption Storage and Blockchain Synchronization

5.3.1 Off-Chain Encryption and Storage Design

DO locally generates a symmetric key for encrypting the original plaintext data M, computes the ciphertext C, and uploads it to the IPFS network, retrieving the unique content identifier CID.

C=Encsym(Ksym,M)(6)

5.3.2 Symmetric Encryption and Strategy Packaging

DO executes Encrypt(PP,Λ,Ksym)CT performing the access policy encryption, as follows:

•   Strategy matrix generation: DO sets Λ and generates an access matrix M of size l×n based on its threshold structure, where the i-th row corresponds to the attribute ρ(i)𝒫.

•   Linear secret sharing: DO randomly selects a secret value s and constructs a vector v=(s,r2,,rn)Zpl×n, based on the linear secret sharing scheme, the corresponding secret share for each attribute is calculated as: λi=Miv,i{1,2,..,l}.

•   Attribute ciphertext component

C1=msge(g1,g2)αs,C2=g2s,C3[i]=g2λiCT=(C1,C2,{C3[i]}i=1l)(7)

5.3.3 Fabric Blockchain Evidence Storage and FISCO Chain Synchronization

To ensure data storage and regulatory audit capabilities, we deployed the Business Data.go smart contract on the Hyperledger Fabric business chain. This contract stores the CID and attribute ciphertext uploaded by DO. In the implementation, RN on the chain invoke the smart contract’s RecordMetadata function, which first checks whether a record with the same recordID exists. If it does, an error is returned. Next, the current system timestamp is obtained, and the FileCID structure is created, serialized into JSON format and attaches signature. Finally, the function checks if the record is regulatory data and, if so, triggers the NewRegulatoryRecord event. The core algorithm for RecordMetadata is shown in Algorithm 1.

images

When the NewRegulatoryRecord event is triggered on the Fabric chain, the WeCross routing module extracts data such as recordID, cid, attrCipher, and the current system timestamp. These data are then encapsulated into a cross-chain invocation request and synchronized to the FISCO BCOS regulatory chain via the WeCross routing module. On the regulatory chain, the RN nodes first verify the signature of the cross-chain transmitted data and, if the verification is successful, store the regulatory data on the chain. If the cross-chain invocation fails, the system logs the error and returns the corresponding error message. The core algorithm is shown in Algorithm 2.

images

5.4 Decrypting Behavior Auditing Mechanism

5.4.1 Attribute Verification and Intermediate Ciphertext Recovery

The off-chain RN executes the algorithm PreDecrypt(PP,CT,SK)CTmid/. M are retrieved from the ciphertext, and can find the set of row indices that match the policy I[1,l], if the set S satisfies the access policy, it makes {ρ(i)}iIS. The corresponding Lagrange reconstruction coefficients {ωi}iI are computed, and the intermediate ciphertext is calculated as follows:

CTmid=e(K1,C2)i=1le(g1c,C3[i])ωi=e(g,g)αs/k(8)

If the user’s attribute set does not satisfy the policy, return .

5.4.2 Symmetric Key Recovery

DU locally executes the final decryption algorithm Decrypt(CT,CTmid,k) to recover the symmetric key Ksym.

Ksym=C1CTmidk(9)

5.4.3 On-Chain Decryption Behavior Auditing

After RN completes the pre-decryption of the ciphertext, it triggers the RecordDecryption interface in the AccessAudit smart contract. The system first retrieves the current user identifier, decryption success flag, and timestamp, and packages this information into a request to log the data on the blockchain. Regardless of whether the decryption is successful, this ensures the traceability and regulatory compliance of each decryption operation. The core algorithm is shown in Algorithm 3.

images

5.5 Dynamic Permission Management

To support fine-grained access control in a blockchain environment, this study designs a set of on-chain operable dynamic attribute management mechanisms that do not require the ciphertext re-encryption. Specifically, it includes three steps: attribute revocation, attribute granting, and on-chain audit records.

5.5.1 Attribute Revocation

When the attribute attr𝒫 of a user DU is revoked, AA execute the Revoke(PP, SK, attr)SK algorithm. It first computes new dynamic factor τRZp, based on the updated dynamic factor, the secret key is recalculated as: K1=g1αKg1τ, K2[attr]=H(attr)τ. Finally, the new private key is reconstructed:

SK=(K1,{K2[attrj]}j=1n)(10)

5.5.2 Attribute Granting

When a new attribute is assigned to a user DU, the existing encryption structure does not need to be modified. Only the private key component corresponding to the new attribute needs to be recalculated, and updated the user’s private key:

SK=(K1,{K2[attrj]}j=1n+1)(11)

5.5.3 On-Chain Permission Auditing

After completing the attribute revocation operation, the RN calls the RevokeAttribute interface in the AccessAudit smart contract. The system first retrieves the attribute to be revoked attr, the user identifier, and the current timestamp. Then, it iterates through the target user’s attribute list and removes attr. Once the operation is completed, a unique logId is generated, and the attribute revocation is logged on the regulatory chain. Unlike revocation, the attribute granting operation adds the attribute to the target user’s attribute list. A unique logId is also generated, and the attribute grant is recorded on the regulatory chain. The core algorithm is shown in Algorithms 4 and 5.

images

images

6  Scheme Analysis

6.1 Decryption Correctness Analysis

CTmid=e(K1,C2)i=1le(g1c,C3[i])ωi=e(g1α/kg1c,g2s)i=1le(g1c,g2λi)ωi=e(g1,g2)αs/ke(g1,g2)csi=1le(g1,g2)cλiωi=e(g1,g2)αs/ke(g1,g2)cse(g1,g2)ci=1lλiωi=e(g1,g2)αs/ke(g1,g2)cse(g1,g2)cs=e(g1,g2)αs/k(12)

The user finally restores the symmetric key:

Ksym=C1CTmidk=Ksyme(g1,g2)αs(e(g1,g2)αs/k)k(13)

6.2 sIND-CPA Security Proof

This section proves the confidentiality of the proposed scheme under the selective IND-CPA model defined in Section 4.4.

Theorem. If the q-PBDHE assumption in Section 3.5 holds for the group (G1,G2,GT) for any PPT adversary the advantage in the sIND-CPA game, Adv𝒜sINDCPA(λ), is negligible in λ hence the scheme is secure in the sIND-CPA model.

Proof. We constructed a PPT simulator β that interacts with 𝒜 to solve the q-PBDHE problem. The group setting and notation are described in Section 3.5. Throughout the interaction, β perfectly simulates the 𝒞 in the game described in Section 4.4.

Initialization. 𝒜 first outputs a target access policy Λ, β receives a q-PBDHE instance.

(Y,X,Z)=(g1,g1a,,g1a2q,g2s,g2as,,g2aqs,Z)(14)

Setup. β embeds the components of Y into public parameters and publishes PP to 𝒜, MK is implicitly kept for simulation. H:attrG1 is programmed as a random oracle: on the first query for an attribute attr, pick tattrZp and set H(attr)=g1tattrG1.

Step 1: Attribute private key query. 𝒜 can adaptively request attribute private key queries for any attribute set S that does not satisfy Λ, let I={i:ρ(i)S}. By the LSSS property there exist zero-reconstruction coefficients {γi}iIZp, such that iIγiMi=(0,η2,,ηn) and define a polynomial PS(x) of degree at most 2q whose coefficient of xq+1 is zero. Then β can compute g1PS(a) using only {g1aj}jq+1, without knowing g1aq+1, return a secret key with the same distribution as in the real system:

K1=(g1PS(a))1/kg1τ,K2[attr]=H(attr)τ(15)

Challenge phase. 𝒜 submits two equal-length symmetric keys (Ksym0,Ksym1), β randomly selects b{0,1}, constructs the challenge ciphertext CT as follows and returns 𝒜.

C1=KsymbZ,C2=X[0]=g2s,C3[i]=g2λi(16)

Distribution claim. If Z=e(g1,g2)aq+1s, CT is distributed identically to the real encryption Encrypt(PP,Λ,Ksymb). If ZRGT, C1 is independent of the message and leaks no information about b.

Stage 2: Pre-decryption query. 𝒜 continues to query the attribute set S that does not satisfy Λ:

•   attribute private key queries, answered as in Phase 1.

•   pre-decryption queries on any ciphertext, including CT, β returns an invalid output , consistent with the real system for non-satisfying sets:

PreDecrypt(PP,CT,SKS)=(17)

Conclusion. If 𝒜 can distinguish challenge ciphertexts with a non-negligible advantage ε, then β would determine the q-PBDHE instance with an advantage of at least ε, contradicting the q-PBDHE assumption in Section 3.5. Therefore Adv𝒜sIND-CPA(λ) is negligible, and the scheme is secure under sIND-CPA.□

6.3 Forward Security Analysis

In this scheme, each user’s attribute private key is bound to a unified dynamic factor τ. When an attribute is revoked, a new dynamic factor τZp is generated for the user, and the new attribute private key is recomputed. If the user does not update the corresponding SK, the pairing check will fail to match the ciphertext, resulting in a decryption failure. Therefore, the system ensures that users with revoked attributes cannot successfully decrypt the ciphertext without updating their keys, thus satisfying the forward security requirement.

6.4 Anti-Collusion Analysis

In this scheme, the user’s attribute private key components, K1=g1αKg1τ including the user’s local public key K and dynamic factor τ, are private parameters. Even if multiple users exchange the attribute keys they hold, the different dynamic factors for each user prevent the pairing check in the decryption process from correctly canceling out the exponent terms. As a result, even if multiple users hold the complete set of attributes, their private keys being non-homogeneous ensures that they cannot successfully decrypt the ciphertext. This satisfies the anti-collusion requirement.

6.5 Real-World Threat Model

To enhance the security and robustness of the proposed cross-chain architecture, we expand on the theoretical security model by incorporating practical threat models such as cross-chain replay attacks and man-in-the-middle (MITM) attacks.

6.5.1 Cross-Chain Replay Attacks

Replay attacks occur when an attacker intercepts and replays a legitimate request, thereby executing unauthorized actions, such as resubmitting data or operations. As shown in Algorithm 2, to effectively prevent cross-chain replay attacks, our scheme incorporates the current system timestamp when the WeCross routing module extracts regulatory data. This ensures that each cross-chain transaction request contains a unique, time-stamped entry. Moreover, the use of a unique regulatorId further strengthens the integrity of the cross-chain request, ensuring that only requests with the correct regulatorId are accepted. If the system detects a replayed request, it will reject it. This mechanism ensures that even if an attacker intercepts and replays a request, no duplicate actions will be executed, thereby preserving the integrity of the data synchronization process.

6.5.2 Man-in-the-Middle Attacks

MITM attacks occur when an attacker intercepts, alters, or injects malicious data into the communication between two parties, without their knowledge. In the context of cross-chain data exchange, MITM attacks can compromise data integrity, enabling the attacker to manipulate the contents of the request. To effectively prevent MITM attacks, our scheme employs a digital signature mechanism. As shown in Algorithm 1, we first compute the hash of the serialized data and sign it with a private key, ensuring that the data remains tamper-proof. When the data is cross-chain transmitted to the regulatory chain, the RN node on the chain verifies the validity of the request using the corresponding public key. As shown in Algorithm 2, if the signature verification fails, the request will be rejected. By incorporating the signature verification mechanism, we ensure that the data transmitted across chains remains unaltered during the process. Even if an attacker intercepts and modifies the request, the system will reject it due to the signature mismatch. This mechanism effectively prevents MITM attacks and ensures the integrity and authenticity of the cross-chain data.

7  Theoretical Analysis

7.1 Performance Analysis

In this chapter, we compare the proposed scheme with other similar schemes and analyze their performance in detail. As shown in Table 2, we evaluate various aspects such as the granularity of encryption, attribute granting, ciphertext re-encryption, free-key management, multi-authority attributes, blockchain structure, encryption for external/public requests, and anti-collusion.

images

We define NU as the number of attributes held by the user, NP as the number of rows of attributes in access policy, |G| as the size of elements in the source group, |GT| as the size of elements in the target group, EG is an exponential operation on |G|, EGT is an exponential operation on |GT|, P is a linear pairing operation, and H is a hash-to-group operation.

From the storage comparison results shown in Table 3, it can be seen that the proposed scheme reduces the storage overhead effectively, with fewer elements to store. The ciphertext size is only (NP+1)|G|+|GT|, and the attribute private key size is only (NU+1)|G|, which is significantly smaller than the other four schemes.

images

We focus on evaluating the computational overhead of the schemes involved in terms of key generation, encryption, and decryption processes in Table 4. In the key generation phase, the proposed scheme requires only (NU+2)EG exponentiation operations, resulting in lower computational overhead compared to other schemes. Regarding encryption costs, the encryption complexity of schemes [11,23] is relatively high, especially in scheme [14], which involves a large number of attribute-level pairing operations. In contrast, the proposed scheme only requires one bilinear pairing operation, significantly reducing encryption computational overhead. For decryption, the proposed scheme adopts a separated architecture with off-chain pre-decryption by regulatory nodes and final decryption by the user. The off-chain regulatory node needs to perform (NU+1)P+NUEGT computational operations, which is still much lower than the scheme [21]. The user’s side has a very low computational burden, requiring only one EGT operation, significantly lower than other schemes.

images

7.2 Experimental Analysis

This section presents the experimental environment used to evaluate the proposed scheme. The experimental platform is built on an Intel Core (TM) i9-12900H processor, with 16 GB of RAM and a 512 GB SSD, running on Ubuntu operating system. The cryptographic environment utilizes the Charm-Crypto library, combined with GNU Multiple Precision Arithmetic (GMP) and Pairing-Based Cryptography (PBC), running in a Conda environment. Bilinear pairings are implemented using the SS512 elliptic curve over a 160-bit prime order, ensuring the security and efficiency of the cryptographic operations. The detailed configuration is as Table 5:

images

In addition to the cryptographic environment, the experiment also simulates a realistic cross-chain regulatory framework, with Hyperledger Fabric deployed as the business chain and FISCO BCOS as the regulatory chain. Specifically, the Fabric network consists of 4 orderer nodes and 2 peer nodes, while FISCO BCOS is deployed with 4 nodes, ensuring high availability and scalability of the network. The cross-chain routing and communication mechanism established through the WeCross platform guarantees secure and real-time data interaction between the two blockchain networks. The detailed configuration of the blockchain network is shown in the Table 6:

images

To validate the cross-chain transaction performance of our scheme, we conducted a comparative analysis of the cross-chain transaction latency with Dong et al. [31] their paper proposes a hierarchical attribute-based encryption algorithm (MSC-CP-ABE) based on the main-sidechain architecture, where the sidechain stores the addresses and keys of encrypted data, while the mainchain is responsible for storing the data indices of the sidechain. Cross-chain data transmission is achieved through the P-TL smart contract, ensuring data interaction between the mainchain and sidechain. In our experiment, we used the JMeter performance testing tool to evaluate the maximum latency, minimum latency, and average latency of cross-chain transactions under different transaction volumes (ranging from 50 to 250 transactions), as shown in the Fig. 3. The experimental results demonstrate that under high concurrency, our scheme maintains relatively low latency, showing a performance advantage, especially under higher transaction volumes, where the latency increases at a slower rate, indicating good scalability.

images

Figure 3: Cross-chain performance comparison

In the cryptographic scheme comparison, to enhance the consistency and reliability of the experiment, all ciphertexts uniformly adopt the ‘AND’ access strategy, and each attribute-scale scenario is repeated 30 times, with the average value calculated. Since other schemes do not involve pre-decryption algorithms, this experiment selects only Scheme [14] and Scheme [21] for comparison. It is important to note that the experimental data for the comparison schemes are based on Java Pairing-Based Cryptography (JPBC) 2.0.0, while this paper uses Charm-Crypto with GMP/PBC. However, both use Type-A and SS512 parameter sets, which are symmetric supersingular pairings (Embedding degree k = 2, subgroup order 160-bit), with consistent security strength (80-bit), making their comparison valid in terms of algorithm complexity and growth trend with attribute size.

Fig. 4a,b shows the comparative results of different schemes in terms of key generation and encryption overheads with respect to the number of attributes. As the number of attributes increases, the overheads of the proposed scheme in both encryption and key generation are significantly lower than those of the compared schemes. Especially in the encryption phase, it remains almost at a very low level, due to the scheme requiring only one bilinear pairing operation. In the comparison of decryption overhead (as shown in Fig. 4c), the scheme [21] transfers a large amount of pre-decryption computation to cloud servers with the help of outsourced decryption technology, which is better than this scheme in terms of pre-decryption. However, it is worth noting that our scheme only requires one exponential operation for final decryption, greatly reducing the computational burden. This makes our scheme especially suitable for devices with constrained computing resources, such as mobile terminals. Additionally, we analyzed the overhead of each phase of our scheme with varying attribute sizes. As shown in Fig. 4d, the costs increased approximately linearly with the number of attributes. Encryption remained consistently low, while key generation and granting increased moderately. Revocation required more time due to the need to generate and disseminate update information to affected attributes, an inherent cost of policy updates. However, even with 100 attributes, all operations remained sub-second, indicating good scalability.

images

Figure 4: The comparison between several schemes: (a) Key gen cost (b) Encrypt cost (c) Decrypt cost (d) Cost of ours scheme

8  Conclusion

The dynamic authority attribute encryption scheme under multi-chain collaboration proposed in this research has achieved some success in solving the problems of attribute revocation and granting without ciphertext update, cross-chain supervisory collaboration, and multi-authority key distribution. Through functional analysis, comparative evaluation of storage and computation overheads, and simulation experiments, we demonstrate that the scheme significantly reduces key generation and encryption/decryption delays while maintaining high security, especially suitable for cross-organization and high-frequency authority change application scenarios. In addition, the current design is mainly oriented to the consortium chain, and future work could explore aspects such as authority management strategies in open networks and incentive/reward mechanisms for multi-authority nodes, to enhance the scalability and robustness in a wider range of application scenarios.

Acknowledgement: We are grateful to the Shanxi Key Laboratory of Intelligent Optimization Computing and Blockchain Technology for its vibrant intellectual environment and stimulating discussions.

Funding Statement: The authors received no specific funding for this study.

Author Contributions: The authors confirm contribution to the paper as follows: Investigation, study conception and design, methodology, experimental simulation and draft manuscript preparation: Ye Tian, Zhuokun Fan. Data curation, resources, funding acquisition and review and editing: Ye Tian, Yifeng Zhang. All authors reviewed the results and approved the final version of the manuscript.

Availability of Data and Materials: No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Ethics Approval: Not applicable.

Conflicts of Interest: The authors declare no conflicts of interest to report regarding the present study.

References

1. Chhetri TR, Dehury CK, Varghese B, Fensel A, Srirama SN, DeLong RJ. Enabling privacy-aware interoperable and quality IoT data sharing with context. Future Gener Comput Syst. 2024;157:164–79. doi:10.1016/j.future.2024.03.039. [Google Scholar] [CrossRef]

2. Li Q, Liu G, Zhang Q, Han L, Chen W, Li R, et al. Efficient and fine-grained access control with fully-hidden policies for cloud-enabled IoT. Digit Commun Netw. 2025;11(2):473–81. doi:10.1016/j.dcan.2024.05.007. [Google Scholar] [CrossRef]

3. Islam S, Apu KU. Decentralized vs. centralized database solutions in blockchain: advantages, challenges, and use cases. Glob Mainstream J Innov Eng Emerg Technol. 2024;3(4):58–68. doi:10.62304/jieet.v3i04.195. [Google Scholar] [CrossRef]

4. Zheng Z, Xie S, Dai HN, Chen X, Wang H. Blockchain challenges and opportunities: a survey. Int J Web Grid Serv. 2018;14(4):352. doi:10.1504/ijwgs.2018.095647. [Google Scholar] [CrossRef]

5. Liang B, Yuan F, Deng J, Wu Q, Gao J. Cs-pbft: a comprehensive scoring-based practical Byzantine fault tolerance consensus algorithm. J Supercomput. 2025;81(7):859. doi:10.1007/s11227-025-07342-3. [Google Scholar] [CrossRef]

6. Chen Y, Li H, Li K, Zhang J. An improved P2P file system scheme based on IPFS and blockchain. In: Proceedings of the 2017 IEEE International Conference on Big Data (Big Data); 2017 Dec 11–14; Boston, MA, USA. Piscataway, NJ, USA: IEEE; 2018. p. 2652–7. doi:10.1109/BigData.2017.8258226. [Google Scholar] [CrossRef]

7. Azbeg K, Ouchetto O, Jai Andaloussi S. BlockMedCare: a healthcare system based on IoT, blockchain and IPFS for data management security. Egypt Inform J. 2022;23(2):329–43. doi:10.1016/j.eij.2022.02.004. [Google Scholar] [CrossRef]

8. Sahai A, Waters B. Fuzzy identity-based encryption. In: Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques; 2005 May 22–26; Aarhus, Denmark. Berlin/Heidelberg, Germany: Springer; 2005. p. 457–73. [Google Scholar]

9. Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP ’07); 2007 May 20–23; Berkeley, CA, USA. Piscataway, NJ, USA: IEEE; 2007. p. 321–34. doi:10.1109/SP.2007.11. [Google Scholar] [CrossRef]

10. Mao H, Nie T, Sun H, Shen D, Yu G. A survey on cross-chain technology: challenges, development, and prospect. IEEE Access. 2023;11:45527–46. doi:10.1109/ACCESS.2022.3228535. [Google Scholar] [CrossRef]

11. Huang K. Accountable and revocable large universe decentralized multi-authority attribute-based encryption for cloud-aided IoT. IEEE Access. 2021;9:123786–804. doi:10.1109/ACCESS.2021.3110824. [Google Scholar] [CrossRef]

12. Sandhia GK, Kasmir Raja SV, Jansi KR. Multi-authority-based file hierarchy hidden CP-ABE scheme for cloud security. Serv Oriented Comput Appl. 2018;12(3):295–303. doi:10.1007/s11761-018-0240-6. [Google Scholar] [CrossRef]

13. Sethi K, Pradhan A, Bera P. PMTER-ABE: a practical multi-authority CP-ABE with traceability, revocation and outsourcing decryption for secure access control in cloud systems. Clust Comput. 2021;24(2):1525–50. doi:10.1007/s10586-020-03202-2. [Google Scholar] [CrossRef]

14. Yang K, Jia X. Expressive, efficient, and revocable data access control for multi-authority cloud storage. IEEE Trans Parallel Distrib Syst. 2014;25(7):1735–44. doi:10.1109/TPDS.2013.253. [Google Scholar] [CrossRef]

15. Xie M, Ruan Y, Hong H, Shao J. A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices. Future Gener Comput Syst. 2021;121:114–22. doi:10.1016/j.future.2021.03.021. [Google Scholar] [CrossRef]

16. Zhang R, Li J, Lu Y, Han J, Zhang Y. Key escrow-free attribute based encryption with user revocation. Inf Sci. 2022;600:59–72. doi:10.1016/j.ins.2022.03.081. [Google Scholar] [CrossRef]

17. Wei J, Chen X, Huang X, Hu X, Susilo W. RS-HABE: revocable-storage and hierarchical attribute-based access scheme for secure sharing of e-health records in public cloud. IEEE Trans Dependable Secure Comput. 2021;18(5):2301–15. doi:10.1109/TDSC.2019.2947920. [Google Scholar] [CrossRef]

18. Deng S, Yang G, Dong W, Xia M. Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation. Multimed Tools Appl. 2023;82(14):22251–74. doi:10.1007/s11042-022-13537-0. [Google Scholar] [CrossRef]

19. Lan C, Liu L, Wang C, Li H. An efficient and revocable attribute-based data sharing scheme with rich expression and escrow freedom. Inf Sci. 2023;624:435–50. doi:10.1016/j.ins.2022.12.052. [Google Scholar] [CrossRef]

20. Ren Z, Yan E, Chen T, Yu Y. Blockchain-based CP-ABE data sharing and privacy-preserving scheme using distributed KMS and zero-knowledge proof. J King Saud Univ Comput Inf Sci. 2024;36(3):101969. doi:10.1016/j.jksuci.2024.101969. [Google Scholar] [CrossRef]

21. Guo Y, Lu Z, Ge H, Li J. Revocable blockchain-aided attribute-based encryption with escrow-free in cloud storage. IEEE Trans Comput. 2023;72(7):1901–12. doi:10.1109/TC.2023.3234210. [Google Scholar] [CrossRef]

22. Li J, Qi Y. Blockchain data access control method with revocable attribute encryption. Comput Eng Des. 2024;45(2):348–55. (In Chinese). doi:10.16208/j.issn1000-7024.2024.02.004. [Google Scholar] [CrossRef]

23. Thakur A, Ranga V, Agarwal R. Revocable and privacy-preserving CP-ABE scheme for secure mHealth data access in blockchain. Concurr Comput Pract Exp. 2025;37(9–11):e70064. doi:10.1002/cpe.70064. [Google Scholar] [CrossRef]

24. Mishra RK, Yadav RK, Nath P. Integration of blockchain and IPFS: healthcare data management & sharing for IoT environment. Multimed Tools Appl. 2025;84(23):27229–50. doi:10.1007/s11042-024-20092-3. [Google Scholar] [CrossRef]

25. Mahmud M, Sohan MSH, Reno S, Baten Sikder MA, Hossain FS. Advancements in scalability of blockchain infrastructure through IPFS and dual blockchain methodology. J Supercomput. 2024;80(6):8383–405. doi:10.1007/s11227-023-05734-x. [Google Scholar] [CrossRef]

26. Sun J, Yao X, Wang S, Wu Y. Blockchain-based secure storage and access scheme for electronic medical records in IPFS. IEEE Access. 2020;8:59389–401. doi:10.1109/ACCESS.2020.2982964. [Google Scholar] [CrossRef]

27. Yuan F, Zuo Z, Jiang Y, Shu W, Tian Z, Ye C, et al. AI-driven optimization of blockchain scalability, security, and privacy protection. Algorithms. 2025;18(5):263. doi:10.3390/a18050263. [Google Scholar] [CrossRef]

28. Cachin C. Architecture of the Hyperledger blockchain fabric. In: Workshop on distributed cryptocurrencies and consensus ledgers. Zurich, Switzerland: IBM Research; 2016. p. 1–4. [Google Scholar]

29. Kwon J, Buchman E. A network of distributed ledgers. Cosm White Pap. 2018;1–41. [Google Scholar]

30. Wood DG. Polkadot: vision for a heterogeneous multi-chain framework. White Pap. 2016;21(2327):4662. [Google Scholar]

31. Dong J, Jiang R, Zhang Y, Tian S, Wu B. A hierarchical access control and sharing model for healthcare data with on-chain-off-chain collaboration. J Intell Fuzzy Syst. 2025;48(3):215–31. doi:10.3233/jifs-238935. [Google Scholar] [CrossRef]


Cite This Article

APA Style
Tian, Y., Fan, Z., Zhang, Y. (2026). Toward Secure and Auditable Data Sharing: A Cross-Chain CP-ABE Framework. Computers, Materials & Continua, 87(1), 62. https://doi.org/10.32604/cmc.2025.073935
Vancouver Style
Tian Y, Fan Z, Zhang Y. Toward Secure and Auditable Data Sharing: A Cross-Chain CP-ABE Framework. Comput Mater Contin. 2026;87(1):62. https://doi.org/10.32604/cmc.2025.073935
IEEE Style
Y. Tian, Z. Fan, and Y. Zhang, “Toward Secure and Auditable Data Sharing: A Cross-Chain CP-ABE Framework,” Comput. Mater. Contin., vol. 87, no. 1, pp. 62, 2026. https://doi.org/10.32604/cmc.2025.073935


cc Copyright © 2026 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 408

    View

  • 150

    Download

  • 0

    Like

Share Link