“…Moreover, ABE serves as a prevalent privacy protection method, playing a crucial role in safeguarding personal privacy and ensuring the secure communication of data in various domains such as cloud computing, medical insurance, intelligent transportation, and the Internet of Things. For instance, Zhang et al [5] surveyed various ABE-based techniques for securing cloud data, Rasori et al [6] proposed a KP-ABE scheme against the potential threat of malicious attacks of untrustworthy cloud servers, Kumar et al [7] researched how to combine IoT with ABE to protect user privacy, and Jaiswal et al [8] compared and analyzed various ABE schemes in medical privacy scenarios. In addition, there has been a plethora of research related to privacy protection, such as the adoption of the secure encryption random permutation pseudo algorithm (SERPPA) to enhance network security and energy efficiency [9], investigations into ABE in the post-quantum era [10], and the development of privacy-preserving schemes in federated learning [11], among others.…”