{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:23:01Z","timestamp":1725560581805},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540281023"},{"type":"electronic","value":"9783540318682"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11534310_89","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T13:48:30Z","timestamp":1127828910000},"page":"845-852","source":"Crossref","is-referenced-by-count":0,"title":["Identity Based Conference Key Distribution Scheme from Parings"],"prefix":"10.1007","author":[{"given":"Shiqun","family":"Li","sequence":"first","affiliation":[]},{"given":"Kefei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xiangxue","family":"Li","sequence":"additional","affiliation":[]},{"given":"Rongxing","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"89_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1007\/3-540-46416-6_50","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"S. Berkovits","year":"1991","unstructured":"Berkovits, S.: How to Broadcast a Secret. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 535\u2013541. Springer, Heidelberg (1991)"},{"key":"89_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"89_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 514\u2013532. Springer, Heidelberg (2001)"},{"key":"89_CR4","unstructured":"Cha, J.C., Cheon, J.H.: An identity-based signature from gap Diffie-Hellman groups, Cryptology ePrint Archive, Report 2002\/018, available at http:\/\/eprint.iacr.org\/2002\/018\/"},{"key":"89_CR5","unstructured":"Chang, C.C., Lin, T.H.: How to Converse Securely in a conference. In: Proc. IEEE 30th Ann. Int\u2019l Camahan Conf., pp. 42\u201345 (1996)"},{"issue":"11","key":"89_CR6","doi-asserted-by":"publisher","first-page":"1015","DOI":"10.1049\/el:19920645","volume":"28","author":"T. Chikazawa","year":"1992","unstructured":"Chikazawa, T., Yamagishi, A.: Improved identity- based key sharing system for multiaddress communcation. Electr. Lett.\u00a028(11), 1015\u20131017 (1992)","journal-title":"Electr. Lett."},{"key":"89_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/3-540-45325-3_32","volume-title":"Cryptography and Coding","author":"C. Cocks","year":"2001","unstructured":"Cocks, C.: An identity based encryption scheme based on quadratic residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol.\u00a02260, pp. 360\u2013363. Springer, Heidelberg (2001)"},{"issue":"5","key":"89_CR8","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1109\/49.223877","volume":"11","author":"L. Harn","year":"1993","unstructured":"Harn, L., Yang, S.: ID-based cryptographic schemes for user identification, digital signature, and key distribution. IEEE J. on sele. areas in comm.\u00a011(5), 757\u2013760 (1993)","journal-title":"IEEE J. on sele. areas in comm."},{"key":"89_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/3-540-36492-7_20","volume-title":"Selected Areas in Cryptography","author":"F. Hess","year":"2003","unstructured":"Hess, F.: Efficient identity based signature schemes based on pairings. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 310\u2013324. Springer, Heidelberg (2003)"},{"key":"89_CR10","unstructured":"Hess, F.: Exponent group signature schemes and efficient identity based signature schemes based on pairings, Cryptology ePrint Archive, Report 2002\/012, available at http:\/\/eprint.iacr.org\/2002\/012\/"},{"key":"89_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1007\/3-540-46035-7_31","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"J. Horwitz","year":"2002","unstructured":"Horwitz, J., Lynn, B.: Toward hierarchical identity-based encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 466\u2013481. Springer, Heidelberg (2002)"},{"issue":"1","key":"89_CR12","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1049\/ip-cdt:19949890","volume":"141","author":"T. Hwang","year":"1994","unstructured":"Hwang, T., Chen, J.L.: Identity-based conference key broadcast systems. IEE Proc. Comput. Digit. Tech.\u00a0141(1), 57\u201360 (1994)","journal-title":"IEE Proc. Comput. Digit. Tech."},{"issue":"5","key":"89_CR13","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1109\/TIT.1982.1056542","volume":"28","author":"I. Ingemarsson","year":"1982","unstructured":"Ingemarsson, I., Tang, D.T., Wong, C.K.: A Conference Key Distribution System. IEEE Trans. Information Theory\u00a028(5), 714\u2013720 (1982)","journal-title":"IEEE Trans. Information Theory"},{"key":"89_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/10722028_23","volume-title":"Algorithmic Number Theory","author":"A. Joux","year":"2000","unstructured":"Joux, A.: A one round protocol for tripartite Diffie-Hellman. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol.\u00a01838, pp. 385\u2013394. Springer, Heidelberg (2000)"},{"key":"89_CR15","unstructured":"Klein, B., Otten, M., Beth, T.: Conference Key Distribution Protocols in Distributed Systems. In: Proc. Codes and Ciphers-Cryptography and Coding IV, pp. 225\u2013242 (1995)"},{"key":"89_CR16","unstructured":"Mao, J., Yang, B.: Anonymous and dynamic conference-key distribution system. In: The 14m IEEE 2003 lntemational Symposium on PersonalJndoor and Mobile Radio Communication Proceedings, pp. 2784\u20132788 (2003)"},{"key":"89_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1007\/0-387-34805-0_40","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"R. Merkle","year":"1990","unstructured":"Merkle, R.: One way hash functions and DES. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 428\u2013446. Springer, Heidelberg (1990)"},{"key":"89_CR18","doi-asserted-by":"crossref","unstructured":"Naor, M., Yung, M.: Universal one-way hash functions and their cryptographic 1989. LNCS, vol.\u00a0435, pp. 428\u2013446 (1989)","DOI":"10.1145\/73007.73011"},{"issue":"4","key":"89_CR19","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1109\/49.17711","volume":"7","author":"E. Okamoto","year":"1989","unstructured":"Okamoto, E., Tanaka, K.: Key distribution system based on identification information. IEEE Journal on Selected areas in comm\u00a07(4), 481\u2013485 (1989)","journal-title":"IEEE Journal on Selected areas in comm"},{"key":"89_CR20","unstructured":"Paterson, K.G.: ID-based signatures from pairings on elliptic curves, Cryptology ePrint Archive, Report 2002\/004, available at http:\/\/eprint.iacr.org\/2002\/004\/"},{"issue":"11","key":"89_CR21","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to Share a Secret. Communications of the ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Communications of the ACM"},{"key":"89_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"89_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/3-540-45539-6_32","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"V. Shoup","year":"2000","unstructured":"Shoup, V.: A composition theorem for universal one-way hash functions. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, p. 445. Springer, Heidelberg (2000)"},{"issue":"13","key":"89_CR24","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1049\/el:20020387","volume":"38","author":"N.P. Smart","year":"2002","unstructured":"Smart, N.P.: An identity based authenticated key agreement protocol based on the Weil pairing. Electron. Lett.\u00a038(13), 630\u2013632 (2002)","journal-title":"Electron. Lett."},{"key":"89_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1007\/3-540-48184-2_29","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"H. Tanaka","year":"1988","unstructured":"Tanaka, H.: A realization scheme for the identity based cryptosystem. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.\u00a0293, pp. 340\u2013349. Springer, Heidelberg (1988)"},{"issue":"4","key":"89_CR26","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1109\/49.17709","volume":"7","author":"S. Tsuji","year":"1989","unstructured":"Tsuji, S., Itoh, T.: An ID-based cryptosystem based on the discrete logarithm problem. IEEE Journal of Selected Areas in Communications\u00a07(4), 467\u2013473 (1989)","journal-title":"IEEE Journal of Selected Areas in Communications"},{"issue":"4","key":"89_CR27","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1109\/12.995447","volume":"51","author":"W.G. Tzeng","year":"2002","unstructured":"Tzeng, W.G.: A Secure Fault-Tolerant Conference-Key Agreement Protocol. IEEE Trans. on Computers\u00a051(4), 373\u2013379 (2002)","journal-title":"IEEE Trans. on Computers"},{"issue":"2","key":"89_CR28","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1049\/ip-cdt:19971120","volume":"14","author":"T.C. Wu","year":"1997","unstructured":"Wu, T.C.: Conference key distribution system with user anonymity based on algebraic approach. IEE Proceedings Computers and Digital Techniques\u00a014(2), 145\u2013148 (1997)","journal-title":"IEE Proceedings Computers and Digital Techniques"},{"key":"89_CR29","unstructured":"Xu, S., Tilborg, H.: A new identity-based conference key distribution scheme. In: Proc. IEEE Int. Symp. on Information Theory, p. 269 (2000)"},{"key":"89_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/3-540-45067-X_27","volume-title":"Information Security and Privacy","author":"F. Zhang","year":"2003","unstructured":"Zhang, F., Kim, K.: Efficient ID-based blind signature and proxy signature from bilinear pairings. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol.\u00a02727, pp. 312\u2013323. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Networking and Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11534310_89.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:10:45Z","timestamp":1605643845000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11534310_89"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540281023","9783540318682"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/11534310_89","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}