| Version | Summary | Created by | Modification | Content Size | Created at | Operation |
|---|---|---|---|---|---|---|
| 1 | Shuwang Wang | -- | 1078 | 2026-01-21 04:18:20 | | | |
| 2 | Catherine Yang | Meta information modification | 1078 | 2026-01-21 09:37:48 | | |
The elastic computing has significantly facilitated communication and collaboration among all stakeholders, but security is still a major concern in public cloud environment. Attribute based encryption (ABE) can implement fine-grained access control on encrypted data, but most ABE schemes involve in much complex computation to guarantee robust security. It is hard to enable consistent ABE encryption and decryption among resource-constrained nodes. It is a practical and fundamental problem to realize lightweight ABE owing to constrained computing resources and storage capacity of terminal devices.
The elastic computing is a groundbreaking technology that establishes a global network of interconnected machines enabling the ability to communicate and sharing data via the cloud. It has significantly facilitated communication and collaboration among all stakeholders, but security is still a major concern in public cloud environment. Data managed by off-premise infrastructure is highly threatened by attackers and human interventions to increase the financial benefits and also sensitive medical data theft in increases for third-party use[1]. Along with the explosive growth and widespread integration of edge computing and Internet of Things (IoT) devices, achieving fine-grained access control for shared data on resource-constrained devices has emerged as a significant research focus. Attribute based encryption (ABE)[2] can implement fine-grained access control on encrypted data, which is such a cryptographic primitive suitable for secure and flexible data sharing. In the ABE, relationship between user and ciphertext is fuzzily described by a tuple of attribute set and access policy. Original data can be extracted from ciphertext only when attribute set satisfies access policy. There are two types of ABE schemes, namely ciphertext policy attribute based encryption (CP-ABE)[3] and key policy attribute based encryption (KP-ABE)[2]. However, most ABE schemes involve in much complex computation to guarantee robust security, which lead to a time-consuming process. And the access policy is built at cost of complex structure to achieve rich expressiveness. Owing to the large amount of data, the limited resources such as low bandwidth and high communication latency[4], it is hard to enable consistent ABE encryption and decryption among resource-constrained nodes. It is a practical and fundamental problem to realize lightweight ABE owing to constrained computing resources and storage capacity of terminal devices.
The first ABE is proposed by Sahai and Waters[5], who first use attribute set to respectively represent the fuzzy identity of user and the access policy of ciphertext. Only when two attribute sets are similar enough, user can successfully decrypt the ciphertext. This work laid a good foundation for ABE, which is potentially suitable for establishing secure access control. Goyal et. al.[2] proposed a formal definition of ABE. By introducing an access tree they propose a key policy scheme (KP-ABE). Each private key is associated with an access policy and each ciphertext is associated with an attribute set. Bethencourt et. al.[3] propose a different ciphertext policy scheme (CP-ABE), in which each ciphertext is associated with an access policy and each private is associated with an attribute set. CP-ABE provides flexible access control on encrypted data by allowing the encryptor to define access policy, but much more computation overhead is required.
Extensive research has been conducted to alleviate the computational and storage overhead of ABE. Early efforts, such as the CP-ABE scheme proposed by Waters[6], established a foundation for expressive access control, though the costs of encryption and decryption remained linearly dependent on policy complexity. To address these overheads, Odelu et al.[7] designed a CP-ABE with constant-size private keys and ciphertexts, while Oualha and Nguyen[8] introduced pre-computation techniques to shift heavy calculations before the encryption phase. In multi-authority scenarios, Pleata et al.[9] and Xu et al.[10] enhanced efficiency through hierarchical mechanisms and proxy re-encryption for fine-grained revocation. Furthermore, to mitigate the key escrow problem in single-authority systems, Hur[11] and later Zhang et al.[12] utilized two-party computation, whereas Lin et al.[13] proposed collaborative key management protocols to prevent illegal key exposure. A significant milestone in efficiency optimization is the introduction of outsourcing mechanisms. Green et al.[14] pioneered outsourced decryption (OD-ABE) to delegate intensive pairings to high-performance servers. This was further refined by Lai et al.[15] and Lin et al.[16], who introduced verifiability to ensure the integrity of outsourced results. Recent frameworks, such as those by Tu et al.[17], now support the simultaneous outsourcing of both encryption and decryption. Karati et al.[18] presented a novel scheme without pairing but with the loss of policy expressiveness. In the era of IoT and 6G, this trend has evolved towards Cloud-Fog-Edge architectures. Sun et al.[19] and Sasikumar et al.[20] shifted the heavy lifting of cryptographic operations to local fog or edge nodes, enabling IoT devices to perform only simple group operations. Additionally, Vinnarasi and Dayana[21] applied modified sandpiper optimization (MSO) to find optimal parameters for key generation, further reducing the computational overhead. They also present an enhanced gravitational search to quickly converge to an optimal set of revoked keys. However, these state-of-the-art outsourcing paradigms often introduce high dependency on the availability of edge layers. Our work addresses this limitation by proposing an efficient pairing-free paradigm that simplifies the underlying access policy logic, ensuring that terminal devices can maintain high performance even in autonomous environments.
The expressiveness of access policies is also a cornerstone of fine-grained control in ABE schemes. Traditional constructions, such as those by Waters[6] and Ostrovsky et al.[22], primarily rely on Boolean formulas or Linear Secret Sharing Schemes (LSSS) to represent complex access structures. While powerful, these methods often result in ciphertext size and computational overhead that grows fast with the number of attributes and logic gates. To mitigate this, several recent works have explored policy simplification. For instance, Lin et al.[8], and more recently Sun et al.[19] designed lightweight schemes for fog-assisted IoT environments. However, these schemes often sacrifice policy flexibility or still involve heavy bilinear pairing operations, which remain a bottleneck for resource-constrained devices. A promising alternatives is the weighted attribute-based encryption, which assigns numerical weights to attributes to simplify the gate logic. Although existing WABE paradigms[23][24][25] offer better compactness than standard tree-based policies, they frequently operate under a weak security model or fail to eliminate the expensive pairing computations. Distinct from these prior efforts, we introduce a simplified weighted access policy that not only achieves rich expressiveness with a significantly reduced structure but also operates in a pairing-free environment. This approach ensures high computational efficiency while maintaining a robust security model, specifically tailored for the dynamic requirements of cloud data sharing.