A Symmetrically Verifiable Outsourced Decryption Data Sharing Scheme with Privacy-Preserving for VANETs
Abstract
1. Introduction
- (1)
- We propose a Symmetrically Verifiable Outsourced Decryption Data Sharing Scheme with Privacy-Preserving for VANETs (VODDS). In VODDS, AAs are partitioned into groups, and a PBFT-style Byzantine protocol is introduced during the in-group negotiation of key-distribution credentials. This mechanism spreads computation across authorities while tolerating partial faults. Users derive hash-based pseudonyms that bind to attribute keys for key extraction, and access policies are concealed via an LSSS-based construction to protect private information.
- (2)
- VODDS leverages blockchain and smart contracts to enable a symmetrically verifiable outsourced decryption. A hash of the verification ciphertext, generated during encryption, is stored on the blockchain as a commitment. During verification, the smart contract performs a symmetric check by matching the hash computed by the user from the returned result against the on-chain commitment. This process reliably detects incorrect or tampered outsourced decryption results, establishing a trust anchor for secure data sharing.
- (3)
- We conduct a rigorous security analysis and a detailed performance evaluation of VODDS. The scheme’s security is formally proven under the q-parallel BDHE and DDH assumptions, complemented by an informal analysis; additionally, a comprehensive performance evaluation from both theoretical and experimental perspectives demonstrates its high efficiency through comparisons with existing schemes in terms of functionality, storage, and computational overhead.
2. Related Work
2.1. CP-ABE
2.2. Access Policy Hiding
2.3. Outsourced Decryption of CP-ABE
2.4. Multi-Authority CP-ABE
3. Preliminaries
3.1. Bilinear Map
- (1)
- : For all and , it holds that .
- (2)
- -: which ensures that the map is not trivially constant.
- (3)
- : There exists an efficient algorithm to compute for any .
3.2. Group Key Agreement
3.3. Byzantine Agreement
- (1)
- : All honest nodes must output the same value.
- (2)
- : If all honest nodes propose the same value v, then any honest node’s output must be v.
- (3)
- : The protocol remains secure and functional as long as no more than t nodes exhibit arbitrary faulty behavior, where and n is the total number of nodes.
3.4. Decisional q-Parallel BDHE Assumption
4. Problems Formulation
4.1. System Model
- (1)
- : TA is the fully trusted administrator of the system, responsible for system initialization and user registration with aa. In addition, TA also assists in constructing the AAs attribute group.
- (2)
- : AAs are registered by TA authentication and are responsible for issuing attribute keys to users. They are semi-trusted, meaning they are “honest-but-curious”. While they execute assigned tasks honestly, they may attempt to extract private information from user identities or abuse their permissions by distributing keys to unauthorized users. Unlike most multi-AA key distribution schemes, in which each AA manages a different attribute or attribute set, VODDS assigns frequently used attributes to be jointly managed by multiple AAs. These AAs form a management group for the corresponding attribute. In addition, the allocation of the group is not static, and we support AA to join and exit a certain attribute group. Upon receiving a user request, AA generates attribute key for the user using the key distribution credential obtained from the group.
- (3)
- : CSS stores the ciphertext uploaded by the user for a long time and sends the ciphertext in response to the RSU’s request. CSS does not store authentication ciphertext in our scenario. They are semi-credible.
- (4)
- : RSUs are communication facilities deployed on the side of the road, honest but curious. They are responsible for receiving decryption requests from users and providing outsourced decryption.
- (5)
- : DO are the initiators of data sharing and gain legal status by registering with TAs. After obtaining the data collected by the vehicle’s sensors, DO can develop an access policy to encrypt the data to be shared and upload it to CSS.
- (6)
- : The DU is the recipient of data sharing and also must register with the TA. A DU may be a vehicle, a pedestrian, or an infrastructure node. The DU requests services from the RSU. Upon receiving the outsourced decryption results provided by the RSU, the DU verifies them through a verification mechanism. Ultimately, the DU can perform the decryption operation independently.
4.2. Security Model
- Collusion DU: Multiple data users may collude by pooling their attribute keys in an attempt to access data that none of them could individually decrypt.
- Semi-Trusted AAs: A subset of AAs may be malicious and refuse to reach a consensus with other legitimate AAs during the credential generation process.
- Semi-Trusted CSS and RSU: The CSS and RSU are considered “honest-but-curious.” They will execute the protocol faithfully but may try to learn additional information from the ciphertexts or intermediate results they process.
4.3. Formal Definition of VODDS
5. Specific Construction of VODDS
5.1. System Initialization
5.2. Data Uploads
5.3. Data Download
6. Security Analysis
6.1. IND-sCPA Security
6.2. Leak-Freeness of the Distributed Key Extraction
6.3. Collusion Resistance
- (1)
- Resistance to User Collusion
- (2)
- Resistance to AA Collusion
7. Performance Evaluation
7.1. Functional Comparison
7.2. Experimental Environment
7.3. Storage and Computation Overhead Comparison
8. Conclusions and Discussions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Cunha, F.; Villas, L.; Boukerche, A.; Maia, G.; Viana, A.; Mini, R.A.; Loureiro, A.A. Data communication in VANETs: Protocols, applications and challenges. Ad Hoc Netw. 2016, 44, 90–103. [Google Scholar] [CrossRef]
- Zhao, C.; Zhang, L.; Wu, Q.; Rezaeibagha, F. Publicly Accountable Data-Sharing Scheme Supporting Privacy Protection for Fog-Enabled VANETs. IEEE Trans. Veh. Technol. 2024, 73, 8487–8502. [Google Scholar] [CrossRef]
- Qu, F.; Wu, Z.; Wang, F.Y.; Cho, W. A Security and Privacy Review of VANETs. IEEE Trans. Intell. Transp. Syst. 2015, 16, 2985–2996. [Google Scholar] [CrossRef]
- Zhao, Y.; Zhang, X.; Xie, X.; Ding, Y.; Kumar, S. A verifiable hidden policy CP-ABE with decryption testing scheme and its application in VANET. Trans. Emerg. Telecommun. Technol. 2022, 33, e3785. [Google Scholar] [CrossRef]
- Lu, J.; Yu, C.; Qi, M.; Luo, H.; Tian, J.; Li, J. A Symmetry-Enhanced Secure and Traceable Data Sharing Model Based on Decentralized Information Flow Control for the End–Edge–Cloud Paradigm. Symmetry 2025, 17, 1771. [Google Scholar] [CrossRef]
- Xia, Y.; Liu, X.; Ou, J.; Ma, O. RLID-V: Reinforcement Learning-Based Information Dissemination Policy Generation in VANETs. IEEE Trans. Intell. Transp. Syst. 2023, 24, 14151–14161. [Google Scholar] [CrossRef]
- Guo, Z.; Wang, G.; Li, Y.; Ni, J.; Du, R.; Wang, M. Accountable Attribute-Based Data-Sharing Scheme Based on Blockchain for Vehicular Ad Hoc Network. IEEE Internet Things J. 2023, 10, 7011–7026. [Google Scholar] [CrossRef]
- Islam, M.A.; Madria, S.K. Attribute-Based Encryption Scheme for Secure Multi-Group Data Sharing in Cloud. IEEE Trans. Serv. Comput. 2022, 15, 2158–2172. [Google Scholar] [CrossRef]
- Li, Z.; Li, W.; Jin, Z.; Zhang, H.; Wen, Q. An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption. IEEE Access 2019, 7, 29023–29037. [Google Scholar] [CrossRef]
- Ding, S.; Li, C.; Li, H. A Novel Efficient Pairing-Free CP-ABE Based on Elliptic Curve Cryptography for IoT. IEEE Access 2018, 6, 27336–27345. [Google Scholar] [CrossRef]
- Li, H.; Pei, L.; Liao, D.; Chen, S.; Zhang, M.; Xu, D. FADB: A Fine-Grained Access Control Scheme for VANET Data Based on Blockchain. IEEE Access 2020, 8, 85190–85203. [Google Scholar] [CrossRef]
- Wang, Z.; Wang, J.; Liu, Y.; Yang, X.; Qi, F.; Song, W. Privacy-Preserving Attribute-Based Access Control Scheme With Intrusion Detection and Policy Hiding for Data Sharing in VANET. IEEE Internet Things J. 2024, 11, 23348–23369. [Google Scholar] [CrossRef]
- Wei, Z.; Li, J.; Wang, X.; Gao, C.Z. A Lightweight Privacy-Preserving Protocol for VANETs Based on Secure Outsourcing Computing. IEEE Access 2019, 7, 62785–62793. [Google Scholar] [CrossRef]
- Sharma, S.; Kaul, A. VANETs Cloud: Architecture, Applications, Challenges, and Issues. Arch. Comput. Methods Eng. 2021, 28, 1134–3060. [Google Scholar] [CrossRef]
- Miao, Y.; Li, F.; Li, X.; Ning, J.; Li, H.; Choo, K.K.R.; Deng, R.H. Verifiable Outsourced Attribute-Based Encryption Scheme for Cloud-Assisted Mobile E-Health System. IEEE Trans. Dependable Secur. Comput. 2024, 21, 1845–1862. [Google Scholar] [CrossRef]
- Safi, Q.G.K.; Luo, S.; Wei, C.; Pan, L.; Yan, G. Cloud-based security and privacy-aware information dissemination over ubiquitous VANETs. Comput. Stand. Interfaces 2018, 56, 107–115. [Google Scholar] [CrossRef]
- Lu, J.; Li, W.; Sun, J.; Xiao, R.; Liao, B. Secure and Real-Time Traceable Data Sharing in Cloud-Assisted IoT. IEEE Internet Things J. 2024, 11, 6521–6536. [Google Scholar] [CrossRef]
- Li, J.; Sha, F.; Zhang, Y.; Huang, X.; Shen, J. Verifiable outsourced decryption of attribute-based encryption with constant ciphertext length. Secur. Commun. Netw. 2017, 2017, 3596205. [Google Scholar] [CrossRef]
- Sahai, A.; Waters, B. Fuzzy Identity-Based Encryption. In Advances in Cryptology—EUROCRYPT 2005, Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 22–26 May 2005; Cramer, R., Ed.; Springer: Berlin/Heidelberg, Germany, 2005; pp. 457–473. [Google Scholar]
- Goyal, V.; Pandey, O.; Sahai, A.; Waters, B. Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS ’06), Alexandria, VA, USA, 30 October–3 November 2006; pp. 89–98. [Google Scholar] [CrossRef]
- Cheung, L.; Newport, C. Provably secure ciphertext policy ABE. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS ’07), Alexandria, VA, USA, 2 November–31 October 2007; pp. 456–465. [Google Scholar] [CrossRef]
- Bethencourt, J.; Sahai, A.; Waters, B. Ciphertext-Policy Attribute-Based Encryption. In Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP ’07), Berkeley, CA, USA, 20–23 May 2007; pp. 321–334. [Google Scholar] [CrossRef]
- Guo, R.; Yang, G.; Shi, H.; Zhang, Y.; Zheng, D. O3-R-CP-ABE: An Efficient and Revocable Attribute-Based Encryption Scheme in the Cloud-Assisted IoMT System. IEEE Internet Things J. 2021, 8, 8949–8963. [Google Scholar] [CrossRef]
- Boneh, D.; Waters, B. Conjunctive, Subset, and Range Queries on Encrypted Data. In Theory of Cryptography, Proceedings of the 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, 21–24 February 2007; Vadhan, S.P., Ed.; Springer: Berlin/Heidelberg, Germany, 2007; pp. 535–554. [Google Scholar]
- Nishide, T.; Yoneyama, K.; Ohta, K. Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures. In Applied Cryptography and Network Security, Proceedings of the 6th International Conference, ACNS 2008, New York, NY, USA, 3–6 June 2008; Bellovin, S.M., Gennaro, R., Keromytis, A., Yung, M., Eds.; Springer: Berlin/Heidelberg, Germany, 2008; pp. 111–129. [Google Scholar]
- Hao, J.; Huang, C.; Ni, J.; Rong, H.; Xian, M.; Shen, X.S. Fine-grained data access control with attribute-hiding policy for cloud-based IoT. Comput. Netw. 2019, 153, 1–10. [Google Scholar] [CrossRef]
- Beimel, A. Secret-Sharing Schemes: A Survey. In Coding and Cryptology, Proceedings of the Third International Workshop, IWCC 2011, Qingdao, China, 30 May–3 June 2011; Chee, Y.M., Guo, Z., Ling, S., Shao, F., Tang, Y., Wang, H., Xing, C., Eds.; Spinger: Berlin/Heidelberg, Germany, 2011; pp. 11–46. [Google Scholar]
- Xue, J.; Shi, L.; Zhang, W.; Li, W.; Zhang, X.; Zhou, Y. Poly-ABE: A traceable and revocable fully hidden policy CP-ABE scheme for integrated demand response in multi-energy systems. J. Syst. Archit. 2023, 143, 102982. [Google Scholar] [CrossRef]
- Green, M.; Hohenberger, S.; Waters, B. Outsourcing the Decryption of ABE Ciphertexts. In Proceedings of the 20th USENIX Security Symposium (USENIX Security 11), San Francisco, CA, USA, 8–12 August 2011. [Google Scholar]
- Li, J.; Huang, X.; Li, J.; Chen, X.; Xiang, Y. Securely Outsourcing Attribute-Based Encryption with Checkability. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 2201–2210. [Google Scholar] [CrossRef]
- Ge, C.; Liu, Z.; Susilo, W.; Fang, L.; Wang, H. Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract. IEEE Trans. Dependable Secur. Comput. 2024, 21, 937–948. [Google Scholar] [CrossRef]
- Chen, L.; Xu, S.; Zhang, H.; Weng, J. Fair-and-Exculpable-Attribute-Based Searchable Encryption With Revocation and Verifiable Outsourced Decryption Using Smart Contract. IEEE Internet Things J. 2025, 12, 4302–4317. [Google Scholar] [CrossRef]
- Geng, Z.; Yanan, W.; Guojing, L.; Xueqing, W.; Kaiqiang, G.; Jiye, W. A Trusted Data Storage and Access Control Scheme for Power CPS Combining Blockchain and Attribute-Based Encryption. In Proceedings of the 2021 IEEE 21st International Conference on Communication Technology (ICCT), Tianjin, China, 13–16 October 2021; pp. 355–359. [Google Scholar] [CrossRef]
- Ghorbel, A.; Ghorbel, M.; Jmaiel, M. Accountable privacy preserving attribute-based access control for cloud services enforced using blockchain. Int. J. Inf. Secur. 2022, 21, 489–508. [Google Scholar] [CrossRef]
- Belguith, S.; Kaaniche, N.; Hammoudeh, M. Analysis of attribute-based cryptographic techniques and their application to protect cloud services. Trans. Emerg. Telecommun. Technol. 2022, 33, e3667. [Google Scholar] [CrossRef]
- Zhang, L.; Qiu, F.; Hao, F.; Kan, H. 1-Round Distributed Key Generation With Efficient Reconstruction Using Decentralized CP-ABE. IEEE Trans. Inf. Forensics Secur. 2022, 17, 894–907. [Google Scholar] [CrossRef]
- Ren, Z.; Yan, E.; Chen, T.; Yu, Y. Blockchain-based CP-ABE data sharing and privacy-preserving scheme using distributed KMS and zero-knowledge proof. J. King Saud Univ.-Comput. Inf. Sci. 2024, 36, 101969. [Google Scholar] [CrossRef]
- Lin, Y.; Xiong, H.; Su, H.; Yeh, K.H. Multi-Authority CP-ABE Scheme With Cryptographic Reverse Firewalls for Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 2025, 26, 5348–5359. [Google Scholar] [CrossRef]
- Wu, Q.; Mu, Y.; Susilo, W.; Qin, B.; Domingo-Ferrer, J. Asymmetric Group Key Agreement. In Advances in Cryptology—EUROCRYPT 2009, Proceedings of the 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, 26–30 April 2009; Joux, A., Ed.; Springer: Berlin/Heidelberg, Germany, 2009; pp. 153–170. [Google Scholar]
- Waters, B. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization. In Public Key Cryptography–PKC 2011, Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, 6–9 March 2011; Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A., Eds.; Springer: Berlin/Heidelberg, Germany, 2011; pp. 53–70. [Google Scholar]
- Zhang, Y.; Li, J.; Yan, H. Constant Size Ciphertext Distributed CP-ABE Scheme With Privacy Protection and Fully Hiding Access Structure. IEEE Access 2019, 7, 47982–47990. [Google Scholar] [CrossRef]
- Zheng, Z.; Xie, S.; Dai, H.N.; Chen, X.; Wang, H. Blockchain challenges and opportunities: A survey. Int. J. Web Grid Serv. 2018, 14, 352–375. [Google Scholar] [CrossRef]
- Xue, K.; Xue, Y.; Hong, J.; Li, W.; Yue, H.; Wei, D.S.L.; Hong, P. RAAC: Robust and Auditable Access Control With Multiple Attribute Authorities for Public Cloud Storage. IEEE Trans. Inf. Forensics Secur. 2017, 12, 953–967. [Google Scholar] [CrossRef]
- Das, S.; Namasudra, S. Multiauthority CP-ABE-based Access Control Model for IoT-enabled Healthcare Infrastructure. IEEE Trans. Ind. Inform. 2023, 19, 821–829. [Google Scholar] [CrossRef]
- Wang, L.; Zhong, H.; Cui, J.; Zhang, J.; Wei, L.; Bolodurina, I.; He, D. Privacy-Preserving and Secure Distributed Data Sharing Scheme for VANETs. IEEE Trans. Mob. Comput. 2024, 23, 13882–13897. [Google Scholar] [CrossRef]







| Symbols | Meaning |
|---|---|
| p-order cyclic groups with | |
| p-order finite field | |
| g | Generator of group |
| Master private key | |
| Common parameter set | |
| Identifier of | |
| Public key of | |
| Private key of | |
| Identifier of user | |
| v | Secret value of user |
| Private key of user | |
| Public key of the group | |
| Private key of the group | |
| S | Attribute set |
| m | Plaintext |
| C | Ciphertext |
| Verification ciphertext | |
| Blinded key | |
| Symmetric encryption algorithm | |
| Outsource decryption results |
| Scheme | Privacy Protection | Multi- Authority | Distributed Key Distribution | Access Structure | Anti- Collusion for AAs | Anti- Collusion for DU | Verifiability of Outsourced Decryption | Verifiability of Ciphertext Integrity |
|---|---|---|---|---|---|---|---|---|
| [8] | × | × | × | Tree | − | ✓ | ✓ | × |
| [9] | × | × | × | LSSS | − | × | ✓ | × |
| [10] | × | × | × | LSSS | − | ✓ | × | × |
| [43] | × | ✓ | ✓ | LSSS | × | ✓ | × | × |
| [44] | × | ✓ | × | LSSS | × | ✓ | × | × |
| [28] | ✓ | − | × | LSSS | − | × | × | × |
| [7] | ✓ | ✓ | × | LSSS | ✓ | ✓ | ✓ | × |
| Ours | ✓ | ✓ | ✓ | LSSS | ✓ | ✓ | ✓ | ✓ |
| Category | Configuration |
|---|---|
| Hardware | |
| CPU | AMD Ryzen 7 7745HX @ 3.60 GHz |
| Software | |
| Operating System | Windows 11 Pro 24H2 (64-bit) |
| Development Platform | IntelliJ IDEA 2024.1.2 |
| Cryptographic Library | JPBC |
| Cryptographic Parameters | |
| Bilinear Group | Type A (Symmetric, Prime Order) |
| Prime (p) Size | 512 bits ( bits) |
| Group Element Size | bits |
| Experimental Method | |
| Measurements per Point | 1000 independent runs (results averaged) |
| Symbols | Meaning |
|---|---|
| the length of the element in | |
| the length of the element in | |
| the length of the element in | |
| E | exponential operations in |
| exponential operations in | |
| M | multiplication operation in |
| multiplication operation in | |
| P | bilinear pairing |
| H | hash evaluation |
| m | total number of system attributes |
| n | number of attribute authorities |
| z | size of an attribute group |
| size of user’s attribute set | |
| l | number of rows in the access matrix M |
| a | the number of attribute authority associated with the user attribute |
| N | number of system users |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Luo, H.; Qi, M.; Yu, C.; Liu, Q.; Lu, J. A Symmetrically Verifiable Outsourced Decryption Data Sharing Scheme with Privacy-Preserving for VANETs. Symmetry 2025, 17, 2032. https://doi.org/10.3390/sym17122032
Luo H, Qi M, Yu C, Liu Q, Lu J. A Symmetrically Verifiable Outsourced Decryption Data Sharing Scheme with Privacy-Preserving for VANETs. Symmetry. 2025; 17(12):2032. https://doi.org/10.3390/sym17122032
Chicago/Turabian StyleLuo, Han, Menglong Qi, Chengzhi Yu, Qianxi Liu, and Jintian Lu. 2025. "A Symmetrically Verifiable Outsourced Decryption Data Sharing Scheme with Privacy-Preserving for VANETs" Symmetry 17, no. 12: 2032. https://doi.org/10.3390/sym17122032
APA StyleLuo, H., Qi, M., Yu, C., Liu, Q., & Lu, J. (2025). A Symmetrically Verifiable Outsourced Decryption Data Sharing Scheme with Privacy-Preserving for VANETs. Symmetry, 17(12), 2032. https://doi.org/10.3390/sym17122032

