Abstract: The dynamic dissemination of sensitive documents across multi-hop networks necessitates rigorous data provenance. However, existing methods face significant challenges: traditional audit ...