“…Although online/offline key generation techniques and cryptographic reverse firewalls, as seen in Refs. [ [29] , [30] , [31] ], can enhance the security of CP-ABE keys, preventing key leakage in an unreliable edge computing environment is an issue that needs additional attention. Additionally, while offloading some computational tasks to more powerful devices or cloud servers, as explored in Refs.…”