{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T22:12:18Z","timestamp":1770329538821,"version":"3.49.0"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172404"],"award-info":[{"award-number":["62172404"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172411"],"award-info":[{"award-number":["62172411"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U2336205"],"award-info":[{"award-number":["U2336205"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Beijing Municipal Science and Technology Project","award":["Z231100005923047"],"award-info":[{"award-number":["Z231100005923047"]}]},{"name":"Special Task Project of the Ministry of Industry and Information Technology of China","award":["ZTZB-23-990-024"],"award-info":[{"award-number":["ZTZB-23-990-024"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Parallel Distrib. Syst."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1109\/tpds.2025.3529776","type":"journal-article","created":{"date-parts":[[2025,1,13]],"date-time":"2025-01-13T20:08:44Z","timestamp":1736798924000},"page":"520-536","source":"Crossref","is-referenced-by-count":2,"title":["GPABE: GPU-Based Parallelization Framework for Attribute-Based Encryption Schemes"],"prefix":"10.1109","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8994-7131","authenticated-orcid":false,"given":"Wenhan","family":"Xu","sequence":"first","affiliation":[{"name":"State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering (IIE), Chinese Academy of Sciences (CAS), Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8359-5158","authenticated-orcid":false,"given":"Hui","family":"Ma","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering (IIE), Chinese Academy of Sciences (CAS), Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4221-1311","authenticated-orcid":false,"given":"Rui","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering (IIE), Chinese Academy of Sciences (CAS), Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6268-8304","authenticated-orcid":false,"given":"Jianhao","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering (IIE), Chinese Academy of Sciences (CAS), Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046628"},{"key":"ref3","first-page":"1","article-title":"Realizing massive-scale conditional access systems through attribute-based cryptosystems","volume-title":"Proc. Netw. Distrib. Syst. Secur. Symp.","author":"Traynor"},{"key":"ref4","first-page":"611","article-title":"Sieve: Cryptographically enforced access control for user data in untrusted clouds","volume-title":"Proc. Symp. Netw. Syst. Des. Implementation","author":"Wang"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516672"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134014"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20465-4_5"},{"key":"ref9","article-title":"PBC Library: The pairing-based cryptography library","author":"Lynn","year":"2006"},{"key":"ref10","article-title":"The RELIC toolkit","author":"Aranha","year":"2014"},{"key":"ref11","article-title":"MCL: A fast pairing-based cryptography library","author":"Shigeo","year":"2015"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i2.192-239"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54631-0_17"},{"key":"ref14","first-page":"34","article-title":"Outsourcing the decryption of ABE ciphertexts","volume-title":"Proc. USENIX Secur. Symp.","author":"Green"},{"key":"ref15","article-title":"Regulation (EU) 2016\/679, general data protection regulation","year":"2016"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10868-6_17"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45741-3_29"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533094"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414465"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000223"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.5220\/0011278400003283"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17455-1_2"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_11"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_30"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04852-9_1"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53018-4_20"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-018-9280-5"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.1007\/s13389-013-0057-3","article-title":"Charm: A framework for rapidly prototyping cryptosystems","volume-title":"Proc. Netw. Distrib. Syst. Secur. Symp.","author":"Akinyele"},{"key":"ref29","article-title":"The openabe library","year":"2023"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2329681"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD.2019.8935702"},{"key":"ref32","article-title":"CUDA programming guide","year":"2023"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_20"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12280-9_18"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23951-9_28"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04873-4_1"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30574-3_23"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85053-3_6"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2603974"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.2995562"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i4.114-148"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/11693383_22"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36413-7_19"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20465-4_31"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_31"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-022-01093-5"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_14"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3104255"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2015.7372666"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC43674.2020.9286218"},{"key":"ref51","article-title":"CUDA 10 features revealed: Turing, CUDA graphs, and more","author":"Pramod","year":"2018"},{"key":"ref52","article-title":"CUDA PTX-ISA","year":"2023"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14712-8_6"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516718"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.17487\/RFC9380"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/11792086_36"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/HPCSim.2016.7568376"},{"key":"ref58","article-title":"Chacha20 drng","author":"Mueller","year":"2017"},{"key":"ref59","article-title":"On the alpha value of polynomials in the tower number field sieve algorithm","author":"Guillevic","year":"2019","journal-title":"Cryptol. ePrint Arch."}],"container-title":["IEEE Transactions on Parallel and Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/71\/10850501\/10839624.pdf?arnumber=10839624","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T05:29:22Z","timestamp":1738301362000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10839624\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3]]},"references-count":59,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tpds.2025.3529776","relation":{},"ISSN":["1045-9219","1558-2183","2161-9883"],"issn-type":[{"value":"1045-9219","type":"print"},{"value":"1558-2183","type":"electronic"},{"value":"2161-9883","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3]]}}}