{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T01:36:46Z","timestamp":1766281006544},"publisher-location":"Boston","reference-count":15,"publisher":"Kluwer Academic Publishers","isbn-type":[{"type":"print","value":"1402081405"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/1-4020-8141-3_6","type":"book-chapter","created":{"date-parts":[[2006,2,21]],"date-time":"2006-02-21T15:15:11Z","timestamp":1140534911000},"page":"37-50","source":"Crossref","is-referenced-by-count":19,"title":["Remove key Escrow from the Identity-Based Encryption System"],"prefix":"10.1007","author":[{"given":"Zhaohui","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Richard","family":"Comley","sequence":"additional","affiliation":[]},{"given":"Luminita","family":"Vasiu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"S. S. Al-Riyami and K. G. Paterson, \u201cCertificateless Public Key Cryptography\u201d, Advances in Cryptology-Asiacrypt\u2019 2003, LNCS 2894, 2003.","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"M. Bellare, A. Desai, D. Pointcheval and P. Rogaway, \u201cRelations among notions of security for public-key encryption schemes\u201d, In Advances in Cryptology CRYPTO 98, LNCS 1462, 1998.","DOI":"10.1007\/BFb0055718"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"D. Boneh and M. Franklin, \u201cIdentity Based Encryption from The Weil Pairing\u201d, extended abstract in Advances in Cryptology-Crypto 2001, LNCS 2139, 2001.","DOI":"10.1007\/3-540-44647-8_13"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway, \u201cRandom Oracles are Practical: A Paradigm for Desiging Efficient Protocols\u201d, Proc. of First ACM Conference on Computer and Communication Security, November 1993.","DOI":"10.1145\/168588.168596"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"C. Cocks, \u201cAn Identity Based Encryption Scheme Based on Quadratic Residues\u201d, Cryptography and Coding, LNCS 2260, 2001.","DOI":"10.1007\/3-540-45325-3_32"},{"key":"6_CR6","unstructured":"L. Chen and C. Kudla, \u201cIdentity Based Authenticated Key Agreement from Pairings\u201d, Cryptology ePrint Archive, Report 2002\/184."},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"W. Diffie and M.E. Hellman, \u201cNew Directions in Cryptography\u201d, IEEE Transactions on Information Theory 22, 1976.","DOI":"10.1109\/TIT.1976.1055638"},{"key":"6_CR8","unstructured":"P. Gemmel, \u201cAn Intoduction to Threshold Cryptography\u201d, CryptoBytes, a technical newsletter of RSA Laboratories, Vol. 2, No. 7, 1997."},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"C. Gentry and A. Silverberg, \u201cHierarchical ID-Based Cryptography\u201d, Proceedings of Asiacrypt 2002, LNCS 2501, 2002.","DOI":"10.1007\/3-540-36178-2_34"},{"key":"6_CR10","unstructured":"F. He \u03b2, \u201cEfcient Identity Based Signature Schemes Based on Pairings\u201d, In K. Nyberg and H. Heys, editors, Selected Areas in Cryptography 9th Annual International Workshop, SAC 2002, LNCS 2595, 2003."},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"D. L. Long and A. Wigderson, \u201cThe discrete logarithm problem hides O(log n) bits\u201d, SIAM J. Computing, 17(2), April 1988.","DOI":"10.1137\/0217021"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"U. Maurer and S. Wolf, \u201cDiffie-Hellman Oracles\u201d, Advances in Cryptology-CRYPTO\u2019 96 Proceedings, Springer-Verlag, 1996.","DOI":"10.1007\/3-540-68697-5_21"},{"key":"6_CR13","unstructured":"A. Shamir, \u201cIdentity-Based Cryptosystems and Signature Schemes\u201d, in Advances in Cryptology-Crypto\u2019 84, LNCS 196, 1984."},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"J. Silverman, \u201cThe Arithmetic of Elliptic Curve\u201d, Springer-Verlag, 1986.","DOI":"10.1007\/978-1-4757-1920-8"},{"key":"6_CR15","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1049\/el:20020387","volume":"38","author":"N. P. Smart","year":"2002","unstructured":"N. P. Smart, \u201cAn Identity Based Authenticated Key Agreement Protocol Based on the Weil Pairing\u201d, Electronics Letters 38 (2002), pp. 630\u2013632, 2002","journal-title":"Electronics Letters"}],"container-title":["IFIP International Federation for Information Processing","Exploring New Frontiers of Theoretical Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/1-4020-8141-3_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T20:28:25Z","timestamp":1619555305000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/1-4020-8141-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["1402081405"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/1-4020-8141-3_6","relation":{},"subject":[]}}