Skip to main content

Secure outsourced attribute-based signcryption for cloud-based Internet of Vehicles in a smart city


The rapid growth of wireless communication and sensing technology will lead to an Internet of Vehicles (IoV) that builds a large network with interactions among the vehicles, roadside infrastructure, and the surrounding environment. This will allow a large amount of data to be gathered from vehicles through IoV nodes. On the other hand, the cloud provides on-demand computing resources and self-service. Therefore, the vast amounts of data collected by the IoV can be deployed to the cloud, and an authorized user can access it anytime from anywhere via the Internet. However, privacy and authorized access of data are the main issues for the data stored in the cloud. To deal with the security issues in a cloud environment, an attribute-based signcryption (ABSC) was presented that provides confidentiality, authenticity, and sender secrecy of the data stored in the cloud. However, an extensive amount of modular exponential operations and pairing incur an unfavorable computational overhead during the signcryption and key-distributing process in ABSC. To deal with the above challenges, we present a novel secure outsourced attribute-based signcryption for a cloud-based Internet of Vehicles in a smart city (SOABSC-IoV). The proposed scheme provides data confidentiality, data authentication, and key issuing and decreases the signcryption computational load in ABSC. Furthermore, this work reduces the computational load at the IoV node and the authorized user’s side by outsourcing the signcryption and unsigncryption algorithms. Finally, the experimental results demonstrate that our scheme is highly appropriate for cloud and IoV environments and has a lower computational complexity than the existing schemes.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4


  1. Zanella A, Bui N, Castellani A, Vangelista L, Zorzi M (2014) Internet of things for smart cities. IEEE Internet Things J 1(1):22–32

    Article  Google Scholar 

  2. Ang L-M, Seng KP, Zungeru AM, Ijemaru GK (2017) Big sensor data systems for smart cities. IEEE Internet Things J 4(5):1259–1271

    Article  Google Scholar 

  3. Csáji BC, Kemény Z, Pedone G, Kuti A, Váncza J (2017) Wireless multi-sensor networks for smart cities: a prototype system with statistical data analysis. IEEE Sensors J 17(23):7667–7676

    Article  Google Scholar 

  4. Su K, Li J, Fu H (2011) Smart city and the applications. In: 2011 international conference on electronics, communications and control (ICECC). IEEE, pp 1028–1031

  5. Kumar N, Rodrigues JJ, Chilamkurti N (2014) Bayesian coalition game as-a-service for content distribution in internet of vehicles. IEEE Internet Things J 1(6):544–555

    Article  Google Scholar 

  6. Ning Z, Hu X, Chen Z, Zhou M, Hu B, Cheng J, Obaidat MS (2020) Corrections to? A cooperative quality-aware service access system for social internet of vehicles? IEEE Internet Things J 7(7):6663–6663

    Article  Google Scholar 

  7. Malik RQ, Alsattar H, Ramli K, Zaidan B, Zaidan A, Kareem ZH, Ameen HA, Garfan S, Mohammed A, Zaidan RA (2019) Mapping and deep analysis of vehicle-to-infrastructure communication systems: coherent taxonomy, datasets, evaluation and performance measurements, motivations, open challenges, recommendations, and methodological aspects. IEEE Access 7:126753–126772

    Article  Google Scholar 

  8. Elhabob R, Zhao Y, Sella I, Xiong H (2019) Efficient certificateless public key cryptography with equality test for internet of vehicles. IEEE Access 7:68957–68969

    Article  Google Scholar 

  9. Contreras-Castillo J, Zeadally S, Guerrero-Ibañez JA (2017) Internet of vehicles: architecture, protocols, and security. IEEE Internet Things J 5(5):3701–3709

    Article  Google Scholar 

  10. Sharma Y, Gupta H, Khatri SK (2019) A security model for the enhancement of data privacy in cloud computing. In: 2019 amity international conference on artificial intelligence (AICAI). IEEE, pp 898–902

  11. Esposito C, Castiglione A, Martini B, Choo K-KR (2016) Cloud manufacturing: security, privacy, and forensic concerns. IEEE Cloud Comput 3(4):16–22

    Article  Google Scholar 

  12. Gagné M, Narayan S, Safavi-Naini R (2010) Threshold attribute-based signcryption. In: International conference on security and cryptography for networks. Springer, pp 154–171

  13. Deng F, Wang Y, Peng L, Xiong H, Geng J, Qin Z (2018) Ciphertext-policy attribute-based signcryption with verifiable outsourced designcryption for sharing personal health records. IEEE Access 6:39473–39486

    Article  Google Scholar 

  14. Sedaghat SM, Ameri MH, Delavar M, Mohajeri J, Aref MR (2018) An efficient and secure attribute-based signcryp-tion scheme for smart grid applications, Cryptology ePrint Archive, Report 2018/263, Tech Rep.

  15. Xu Q, Tan C, Fan Z, Zhu W, Xiao Y, Cheng F (2018) Secure multi-authority data access control scheme in cloud storage system based on attribute-based signcryption. IEEE Access 6:34051–34074

    Article  Google Scholar 

  16. Li M, Yu S, Zheng Y, Ren K, Lou W (2012) Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parall Distrib Sys 24(1):131–143

    Article  Google Scholar 

  17. Ming Y, Fan L, Jing-Li H, Zhao-Li W (2011) An efficient attribute based encryption scheme with revocation for outsourced data sharing control. In: 2011 first international conference on instrumentation, measurement, computer, communication and control. IEEE, pp 516–520

  18. Green M, Hohenberger S, Waters B et al (2011) Outsourcing the decryption of abe ciphertexts. In: USENIX security symposium, vol 2011

  19. Hur J (2013) Attribute-based secure data sharing with hidden policies in smart grid. IEEE Trans Parall Distrib Sys 24(11):2171–2180

    Article  Google Scholar 

  20. Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 2010 Proceedings IEEE INFOCOM. IEEE, pp 1–9

  21. Atallah MJ, Pantazopoulos KN, Rice JR, Spafford EH (2001) Secure outsourcing of scientific computations. Adv Comput 54(6):215–272

    Google Scholar 

  22. Benjamin D, Atallah MJ (2008) Private and cheating-free outsourcing of algebraic computations. In: 2008 sixth annual conference on privacy, security and trust. IEEE, pp 240–245

  23. Wang C, Ren K, Wang J (2011) Secure and practical outsourcing of linear programming in cloud computing. In: 2011 Proceedings IEEE Infocom. IEEE, pp 820–828

  24. Li J, Lin X, Zhang Y, Han J (2016) Ksf-oabe: outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Trans Serv Comput 10(5):715–725

    Article  Google Scholar 

  25. Li J, Yao W, Zhang Y, Qian H, Han J (2016) Flexible and fine-grained attribute-based data storage in cloud computing. IEEE Trans Serv Comput 10(5):785–796

    Article  Google Scholar 

  26. Li J, Sha F, Zhang Y, Huang X, Shen J (2017) Verifiable outsourced decryption of attribute-based encryption with constant ciphertext length. Secur Commun Netw 2017

  27. Wang H, He D, Han J (2017) Vod-adac: anonymous distributed fine-grained access control protocol with verifiable outsourced decryption in public cloud. IEEE Trans Serv Comput

  28. Xiong H, Zhao Y, Peng L, Zhang H, Yeh K-H (2019) Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing. Futur Gener Comput Syst 97:453–461

    Article  Google Scholar 

  29. Yang P, Cao Z, Dong X (2011) Fuzzy identity based signature with applications to biometric authentication. Comput Elect Eng 37(4):532–540

    Article  Google Scholar 

  30. Maji HK, Prabhakaran M, Rosulek M (2011) Attribute-based signatures. In: Cryptographers track at the RSA conference. Springer, pp 376–392

  31. Shahandashti SF, Safavi-Naini R (2009) Threshold attribute-based signatures and their application to anonymous credential systems. In: International conference on cryptology in Africa. Springer, pp 198–216

  32. Li J, Au MH, Susilo W, Xie D, Ren K (2010) Attribute-based signature and its applications. In: Proceedings of the 5th ACM symposium on information, computer and communications security, pp 60–69

  33. Herranz J, Laguillaumie F, Libert B, Ràfols C (2012) Short attribute-based signatures for threshold predicates. In: Cryptographers track at the RSA conference. Springer, pp 51–67

  34. Rao YS, Dutta R (2016) Efficient attribute-based signature and signcryption realizing expressive access structures. Int J Inf Secur 15(1):81–109

    Article  Google Scholar 

  35. Ge A-J, Ma C-G, Zhang Z-F (2012) Attribute-based signature scheme with constant size signature in the standard model. IET Inf Secur 6(2):47–54

    Article  Google Scholar 

  36. Zeng F, Xu C, Li Q, Zhang X (2012) Attribute-based signature scheme with constant size signature. J Comput Inf Sys 8(7):2875–2882

    Google Scholar 

  37. Xiong H, Bao Y, Nie X, Assor YI (2019) Server-aided attribute-based signature supporting expressive access structures for industrial internet of things. IEEE Trans Indust Inf

  38. Xiong H, Mei Q, Zhao Y (2019) Efficient and provably secure certificateless parallel key-insulated signature without pairing for iiot environments. IEEE Sys J

  39. Chen C-M, Xiang B, Liu Y, Wang K-H (2019) A secure authentication protocol for internet of vehicles. IEEE Access 7:12047–12057

    Article  Google Scholar 

  40. Wu T-Y, Chen C-M, Wang K-H, Wu JM-T (2019) Security analysis and enhancement of a certificateless searchable public key encryption scheme for iiot environments. IEEE Access 7:49232–49239

    Article  Google Scholar 

  41. Hundera NW, Mei Q, Xiong H, Geressu DM (2020) A secure and efficient identity-based proxy signcryption in cloud data sharing. KSII Trans Internet Inf Sys 14(1)

  42. Kumar G, Rai M, Saha R, Buchanan WJ, Thomas R, Geetha G, Kim T-H, Rodrigues J (2020) A privacy-preserving secure framework for electric vehicles in iot using matching market and signcryption. IEEE Trans Vehicul Technol

  43. Khan MA, Ullah I, Nisar S, Noor F, Qureshi IM, Khanzada FU, Amin NU (2020) An efficient and provably secure certificateless key-encapsulated signcryption scheme for flying ad-hoc network. IEEE Access 8:36807–36828

    Article  Google Scholar 

  44. Nayak B (2020) Elliptic curve cryptography-based signcryption scheme with a strong designated verifier for the internet of things. In: Machine learning and information processing. Springer, pp 485–492

  45. Wei J, Hu X, Liu W (2014) Traceable attribute-based signcryption. Secur Commun Netw 7(12):2302–2317

    Article  Google Scholar 

  46. Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 457–473

  47. Emura K, Miyaji A, Rahman MS (2012) Dynamic attribute-based signcryption without random oracles. Int J Appl

  48. Hu C, Zhang N, Li H, Cheng X, Liao X (2013) Body area network security: a fuzzy attribute-based signcryption scheme. IEEE J Selec Areas Commun 31(9):37–46

    Article  Google Scholar 

  49. Guo Z, Li M, Fan X (2013) Attribute-based ring signcryption scheme. Secur Commun Netw 6(6):790–796

    Article  Google Scholar 

  50. Rao YS (2017) A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing. Futur Gener Comput Syst 67:133–151

    Article  Google Scholar 

  51. Rao YS, Dutta R (2014) Expressive attribute based signcryption with constant-size ciphertext. In: International conference on cryptology in Africa. Springer, pp 398–419

  52. Liu J, Huang X, Liu JK (2015) Secure sharing of personal health records in cloud computing: ciphertext-policy attribute-based signcryption. Futur Gener Comput Syst 52:67–76

    Article  Google Scholar 

  53. Lynn B (2014) The pairing-based cryptography library benchmarks,

Download references


This work was supported in part by the 13th Five-Year Plan of the National Cryptography Development Fund for Cryptographic Theory of China under Grant MMJJ20170204, in part by the Fundamental Research Funds for the Central Universities under Grant ZYGX2016J091, the Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems, and in part by the Natural Science Foundation of China under Grants U1401257, 61472064, and 61602096.

Author information

Authors and Affiliations


Corresponding author

Correspondence to Negalign Wake Hundera.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Hundera, N.W., Jin, C., Aftab, M.U. et al. Secure outsourced attribute-based signcryption for cloud-based Internet of Vehicles in a smart city. Ann. Telecommun. 76, 605–616 (2021).

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI:


  • Attribute-based signcryption
  • Signcryption
  • Unsigncryption
  • Cloud
  • Internet of Vehicles (IoV)