Abstract: Highlights•The CCA security model for ABE with outsourced decryption is proposed.•A concrete CCA-secure ABE scheme with outsourced decryption is proposed.•The security analysis and experimental results show that our proposal is secure and practical for fog computing.
Loading