{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:13:49Z","timestamp":1750220029159,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,16]],"date-time":"2022-12-16T00:00:00Z","timestamp":1671148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,16]]},"DOI":"10.1145\/3584376.3584532","type":"proceedings-article","created":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T22:54:51Z","timestamp":1681944891000},"page":"873-877","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Parallel Optimized Attribute-Based Encryption Scheme Based on SM9"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-9168-0605","authenticated-orcid":false,"given":"Xuguang","family":"Wu","sequence":"first","affiliation":[{"name":"College of Cryptography Engineering, Engineering University of People's Armed Police, China"}]}],"member":"320","published-online":{"date-parts":[[2023,4,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_3_2_1_3_1","volume-title":"International Conference on Security and Privacy in Communication Systems","author":"Yu S","year":"2009","unstructured":"Yu S , Ren K , Lou W , Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems [J]. International Conference on Security and Privacy in Communication Systems , 2009 . Yu S, Ren K, Lou W, Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems [J]. International Conference on Security and Privacy in Communication Systems, 2009."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2021.3075995"},{"key":"e_1_3_2_1_6_1","volume-title":"Identity-Based Cryptosystems and Signature Schemes [J]","author":"Shamir A.","year":"1984","unstructured":"Shamir A. Identity-Based Cryptosystems and Signature Schemes [J] . Springer , Berlin, Heidelberg , 1984 . Shamir A. Identity-Based Cryptosystems and Signature Schemes [J]. Springer, Berlin, Heidelberg, 1984."},{"key":"e_1_3_2_1_7_1","volume-title":"Annual International Cryptology Conference. Springer","author":"Dan B","year":"2001","unstructured":"Dan B , Franklin M. Identity-Based Encryption from the Weil Pairing [C] . Annual International Cryptology Conference. Springer , Berlin, Heidelberg , 2001 . Dan B, Franklin M. Identity-Based Encryption from the Weil Pairing [C]. Annual International Cryptology Conference. Springer, Berlin, Heidelberg, 2001."},{"issue":"1","key":"e_1_3_2_1_8_1","first-page":"1","article-title":"Server-aided immediate and robust user revocation mechanism for sm9 [J]","volume":"3","year":"2020","unstructured":"SUN S, MA H, ZHANG R , Server-aided immediate and robust user revocation mechanism for sm9 [J] . Cybersecurity , 2020 , 3 ( 1 ): 1 - 13 . SUN S, MA H, ZHANG R, Server-aided immediate and robust user revocation mechanism for sm9 [J]. Cybersecurity, 2020, 3 (1): 1-13.","journal-title":"Cybersecurity"},{"key":"e_1_3_2_1_9_1","first-page":"440","volume-title":"International Conference on Electronics, Communications and Networks","volume":"345","year":"2022","unstructured":"KE W, YUAN Z, SONG L, A new identity based encryption scheme with accountable authority based on sm9 [C] . International Conference on Electronics, Communications and Networks : volume 345 , 2022 : 440 - 449 . KE W, YUAN Z, SONG L, A new identity based encryption scheme with accountable authority based on sm9 [C]. International Conference on Electronics, Communications and Networks: volume 345, 2022: 440-449."},{"issue":"5","key":"e_1_3_2_1_10_1","first-page":"897","article-title":"An efficient identity-based broadcast encryption scheme based on SM9","volume":"44","author":"Lai JC","year":"2021","unstructured":"Lai JC , Huang XY , He DB . An efficient identity-based broadcast encryption scheme based on SM9 . Chinese Journal of Computers , 2021 , 44 ( 5 ): 897 \u2013 907 . Lai JC, Huang XY, He DB. An efficient identity-based broadcast encryption scheme based on SM9. Chinese Journal of Computers, 2021, 44 (5): 897\u2013907.","journal-title":"Chinese Journal of Computers"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76900-2_12"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2020.1858757"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_14_1","volume-title":"Secure schemes for secret sharing and key distribution [J]","author":"Beimel A.","year":"1996","unstructured":"Beimel A. Secure schemes for secret sharing and key distribution [J] . 1996 . Beimel A. Secure schemes for secret sharing and key distribution [J]. 1996."},{"issue":"8","key":"e_1_3_2_1_15_1","first-page":"3621","article-title":"Parallel multi-recipient signcryption for imbalanced wireless networks [J], International Journal of Innovative Computing","volume":"6","author":"Han YL","year":"2010","unstructured":"Han YL , Gui XL , Wu XG . Parallel multi-recipient signcryption for imbalanced wireless networks [J], International Journal of Innovative Computing , Information and Control . 2010 , Vol. 6 No. 8 : 3621 - 3630 . Han YL, Gui XL, Wu XG. Parallel multi-recipient signcryption for imbalanced wireless networks [J], International Journal of Innovative Computing, Information and Control. 2010, Vol. 6 No. 8: 3621-3630.","journal-title":"Information and Control"},{"key":"e_1_3_2_1_16_1","first-page":"211","volume-title":"International Conference on Information Security and Cryptology","author":"Wu","year":"2017","unstructured":"Wu , Xuguang, Yiliang Han , Minqing Zhang, and Shuaishuai Zhu . Parallel long messages encryption scheme based on certificateless cryptosystem for big data [C] . In International Conference on Information Security and Cryptology , pp. 211 - 222 . Springer, Cham , 2017 . Wu, Xuguang, Yiliang Han, Minqing Zhang, and Shuaishuai Zhu. Parallel long messages encryption scheme based on certificateless cryptosystem for big data [C]. In International Conference on Information Security and Cryptology, pp. 211-222. Springer, Cham, 2017."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-018-1317-9"},{"key":"e_1_3_2_1_18_1","first-page":"28009","article-title":"A Parallel and Forward Private Searchable Public-Key Encryption for Cloud-Based Data Sharing [J]","volume":"2020","author":"Chen Biwen","unstructured":"Chen Biwen , Libing Wu, Li Li , Kim-Kwang Raymond Choo, and Debiao He . A Parallel and Forward Private Searchable Public-Key Encryption for Cloud-Based Data Sharing [J] . IEEE Access 8. 2020 : 28009 - 28020 . Chen Biwen, Libing Wu, Li Li, Kim-Kwang Raymond Choo, and Debiao He. A Parallel and Forward Private Searchable Public-Key Encryption for Cloud-Based Data Sharing [J]. IEEE Access 8. 2020: 28009-28020.","journal-title":"IEEE Access 8."},{"key":"e_1_3_2_1_19_1","first-page":"1","article-title":"Parallel incremental attribute-based encryption for mobile cloud data storage and sharing [J]","volume":"2021","author":"Ke G","unstructured":"Ke G , Wang S , Wu H . Parallel incremental attribute-based encryption for mobile cloud data storage and sharing [J] . Journal of Ambient Intelligence and Humanized Computing , 2021 : 1 - 11 . Ke G, Wang S, Wu H. Parallel incremental attribute-based encryption for mobile cloud data storage and sharing [J]. Journal of Ambient Intelligence and Humanized Computing, 2021: 1-11.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.parco.2021.102856"},{"key":"e_1_3_2_1_21_1","volume-title":"Parallel programming in OpenMP [M]. Morgan kaufmann","author":"Chandra R","year":"2001","unstructured":"Chandra R , Dagum L , Kohr D , Parallel programming in OpenMP [M]. Morgan kaufmann , 2001 . Chandra R, Dagum L, Kohr D, Parallel programming in OpenMP [M]. Morgan kaufmann, 2001."},{"key":"e_1_3_2_1_22_1","volume-title":"Using MPI: portable parallel programming with the message-passing interface [M]","author":"Gropp W","year":"1999","unstructured":"Gropp W , Gropp W D , Lusk E , Using MPI: portable parallel programming with the message-passing interface [M] . MIT press , 1999 . Gropp W, Gropp W D, Lusk E, Using MPI: portable parallel programming with the message-passing interface [M]. MIT press, 1999."},{"key":"e_1_3_2_1_23_1","volume-title":"On the implementation of pairing-based cryptosystems [D]","author":"Lynn B.","year":"2007","unstructured":"Lynn B. On the implementation of pairing-based cryptosystems [D] . Stanford University , 2007 . Lynn B. On the implementation of pairing-based cryptosystems [D]. Stanford University, 2007."},{"key":"e_1_3_2_1_24_1","volume-title":"Accessed","author":"Mhash","year":"2022","unstructured":"Mhash : An open source hash library . Accessed Dec 12, 2022 at http:\/\/mhash.sourceforge.net\/. Mhash: An open source hash library. Accessed Dec 12, 2022 at http:\/\/mhash.sourceforge.net\/."}],"event":{"name":"RICAI 2022: 2022 4th International Conference on Robotics, Intelligent Control and Artificial Intelligence","acronym":"RICAI 2022","location":"Dongguan China"},"container-title":["Proceedings of the 2022 4th International Conference on Robotics, Intelligent Control and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3584376.3584532","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3584376.3584532","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:43Z","timestamp":1750182703000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3584376.3584532"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,16]]},"references-count":24,"alternative-id":["10.1145\/3584376.3584532","10.1145\/3584376"],"URL":"https:\/\/doi.org\/10.1145\/3584376.3584532","relation":{},"subject":[],"published":{"date-parts":[[2022,12,16]]},"assertion":[{"value":"2023-04-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}