{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T08:22:46Z","timestamp":1769934166037,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540290018","type":"print"},{"value":"9783540319306","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11556992_25","type":"book-chapter","created":{"date-parts":[[2010,9,28]],"date-time":"2010-09-28T04:05:31Z","timestamp":1285646731000},"page":"344-358","source":"Crossref","is-referenced-by-count":34,"title":["Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System"],"prefix":"10.1007","author":[{"given":"Yong Ho","family":"Hwang","sequence":"first","affiliation":[]},{"given":"Dae Hyun","family":"Yum","sequence":"additional","affiliation":[]},{"given":"Pil Joong","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"25_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/984334.984335","volume":"7","author":"G. Ateniese","year":"2004","unstructured":"Ateniese, G.: Verifiable encryption of digital signatures and applications. ACM Transactions on Information and System Security\u00a07(1), 1\u201320 (2004) (Parts of this paper appeared in ACM CCS 1999 and in CT-RSA 2002)","journal-title":"ACM Transactions on Information and System Security"},{"key":"25_CR2","unstructured":"Ateniese, G., Medeiros, B., Goodrich, M.T.: TRICERT: a distributed certified e-mail scheme. In: ISOC NDSS 2001 (2001)"},{"issue":"4","key":"25_CR3","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1109\/49.839935","volume":"18","author":"N. Asokan","year":"2000","unstructured":"Asokan, N., Shoup, V., Waidner, M.: Optimistic fair exchange of digital signatures. IEEE Journal on Selected Areas of Communications\u00a018(4), 591\u2013610 (2000) (Extended abstract of this paper appeared in EUROCRYPT 1998)","journal-title":"IEEE Journal on Selected Areas of Communications"},{"key":"25_CR4","unstructured":"Blake, I.F., Chan, A.C.-F.: Scalable, server-passive, user-anonymous timed release public key encryption from bilinear pairing. Cryptology ePrint Archive (2004), Available at http:\/\/eprint.iacr.org\/2004\/211\/"},{"key":"25_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1007\/BFb0055718","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"M. Bellare","year":"1998","unstructured":"Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations among notions of security for public-key encryption schems. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 26\u201345. Springer, Heidelberg (1998)"},{"key":"25_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"25_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signature from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 514\u2013532. Springer, Heidelberg (2001)"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: ACM CCS 1993, pp. 62\u201373 (1993)","DOI":"10.1145\/168588.168596"},{"key":"25_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1007\/3-540-48910-X_6","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"G.D. Crescenzo","year":"1999","unstructured":"Crescenzo, G.D., Ostrovsky, R., Rajagopalan, S.: Conditional oblivious transfer and timed-release encryption. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 74\u201389. Springer, Heidelberg (1999)"},{"key":"25_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/3-540-45455-1_3","volume-title":"Algorithmic Number Theory","author":"A. Joux","year":"2002","unstructured":"Joux, A.: The Weil and Tate pairing as building blocks for public key cryptosystems. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol.\u00a02369, pp. 20\u201332. Springer, Heidelberg (2002)"},{"key":"25_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/978-3-540-24632-9_14","volume-title":"Public Key Cryptography \u2013 PKC 2004","author":"B. Libert","year":"2004","unstructured":"Libert, B., Quisquater, J.-J.: Efficient signcryption with key privacy from Gap Diffie-Hellman groups. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol.\u00a02947, pp. 187\u2013200. Springer, Heidelberg (2004)"},{"key":"25_CR12","unstructured":"May, T.C.: Timed-releas crypto. Manuscript (1993), Available at http:\/\/www.cyphernet.org\/cyphernomicon\/chapter14\/14.5.html"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Micali, S.: Simple and fast optimistic protocols for fair electronic exchange. In: PODC 2003, pp. 12\u201319 (2003)","DOI":"10.1145\/872035.872038"},{"key":"25_CR14","unstructured":"Osipkov, I., Kim, Y., Cheon, J.H.: Timed-release public key based authetnicated encryption. Cryptology ePrint Archive (2004), Available at http:\/\/eprint.iacr.org\/2004\/231\/"},{"key":"25_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/3-540-45353-9_13","volume-title":"Topics in Cryptology - CT-RSA 2001","author":"T. Okamoto","year":"2001","unstructured":"Okamoto, T., Pointcheval, D.: REACT: rapid enhanced-security asymmetric cryptosystem transform. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol.\u00a02020, pp. 159\u2013174. Springer, Heidelberg (2001)"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Pfitzmann, B., Schunter, M., Waidnet, M.: Optinal efficiency of optimistic contract signing. In: PODC 1998, pp. 113\u2013122 (1998)","DOI":"10.1145\/277697.277717"},{"key":"25_CR17","unstructured":"Rivest, R.L., Shamir, A., Wagner, D.A.: Time-lock puzzles and timed-release crypto. MIT LCS Tech. Report MIT\/LCS\/TR-684 (1996)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11556992_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:48:02Z","timestamp":1605642482000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11556992_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540290018","9783540319306"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11556992_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}