{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:56:54Z","timestamp":1742921814743,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540494966"},{"type":"electronic","value":"9783540494973"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11935308_19","type":"book-chapter","created":{"date-parts":[[2006,11,15]],"date-time":"2006-11-15T06:26:42Z","timestamp":1163572002000},"page":"260-281","source":"Crossref","is-referenced-by-count":14,"title":["From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution"],"prefix":"10.1007","author":[{"given":"Himanshu","family":"Khurana","sequence":"first","affiliation":[]},{"given":"Jin","family":"Heo","sequence":"additional","affiliation":[]},{"given":"Meenal","family":"Pant","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"Adida, B., Hohenberger, S., Rivest, R.L.: Lightweight Encryption for Email. In: Proceedings of Usenix\u2019s Symposium on Reducing Unwanted Traffic on the Internet (SRUTI 2005) (July 2005)"},{"key":"19_CR2","unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: Proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 3-4 (2005)"},{"key":"19_CR3","unstructured":"Bentley, D., Rose, G.G., Whalen, T.: ssmail: Opportunistic Encryption in sendmail. In: Proceedings of the 13th Usenix Systems Administration Conference (LISA) (1999)"},{"key":"19_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/BFb0054122","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"M. Blaze","year":"1998","unstructured":"Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 127\u2013144. Springer, Heidelberg (1998)"},{"issue":"3","key":"19_CR5","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D. Boneh","year":"2003","unstructured":"Boneh, D., Franklin, M.: Identity based encryption from the Weil pairing. SIAM Journal of Computing\u00a032(3), 586\u2013615 (2003)","journal-title":"SIAM Journal of Computing"},{"key":"19_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1007\/11535218_16","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"D. Boneh","year":"2005","unstructured":"Boneh, D., Gentry, C., Waters, B.: Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 258\u2013275. Springer, Heidelberg (2005)"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Brownlee, N., Guttman, E.: Expectations for Computer Security Incident Response, IETF Network Working Group, RFC 2350 (June 1998)","DOI":"10.17487\/rfc2350"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Callas, J., Donnerhacke, L., Finney, H., Thayer, R.: OpenPGP Message Format, IETF Network Working Group, Request for Comments, RFC 2440 (November 1998)","DOI":"10.17487\/rfc2440"},{"key":"19_CR9","unstructured":"Callas, J.: Identity-Based Encryption with Conventional Public-Key Infrastructure. In: Proceedings of the 4th Annual PKI R&D Workshop (2005)"},{"key":"19_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1007\/11602897_24","volume-title":"Information and Communications Security","author":"Y.-P. Chiu","year":"2005","unstructured":"Chiu, Y.-P., Lei, C.-L., Huang, C.-Y.: Secure Multicast Using Proxy Encryption. In: Qing, S., Mao, W., L\u00f3pez, J., Wang, G. (eds.) ICICS 2005. LNCS, vol.\u00a03783, pp. 280\u2013290. Springer, Heidelberg (2005)"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Crocker, S., Freed, N., Galvin, J., Murphy, S.: MIME Object Security Services, IETF Network Working Group, Request for Comments, 1848 (October 1995)","DOI":"10.17487\/rfc1848"},{"key":"19_CR12","unstructured":"Delaney, M. (ed.): Domain-based Email Authentication Using Public-Keys, IETF Internet Draft (September 2005)"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Ding, X., Tsudik, G.: Simple Identity-Based Cryptography with Mediated RSA. In: Proceedings of the RSA Conference. Cryptographer\u2019s Track (2003)","DOI":"10.1007\/3-540-36563-X_13"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Fazio, N.: Public Key Broadcast Encryption for Stateless Receivers. In: ACM Workshop on Digital Rights Management (DRM) (November 2002)","DOI":"10.1007\/978-3-540-44993-5_5"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Franklin, M., Tsudik, G.: Secure group barter: multi-party fair exchange with semi-trusted neutral parties. In: Financial Cryptography (1998)","DOI":"10.1007\/BFb0055475"},{"issue":"4","key":"19_CR16","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T.E. Gamal","year":"1985","unstructured":"Gamal, T.E.: A Public Key Cryptosystem and a Signature Scheme Based on the Discrete Logarithm. IEEE Transactions of Information Theory\u00a031(4), 469\u2013472 (1985)","journal-title":"IEEE Transactions of Information Theory"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Hoffman, P. (ed.): Enhanced Security Services for S\/MIME, IETF Network Working Group, RFC 2634 (June 1999)","DOI":"10.17487\/rfc2634"},{"key":"19_CR18","unstructured":"Ivan, A., Dodis, Y.: Proxy Cryptography Revisited. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (February 2003)"},{"key":"19_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/3-540-49162-7_9","volume-title":"Public Key Cryptography","author":"M. Jakobsson","year":"1999","unstructured":"Jakobsson, M.: On quorum controlled asymmetric proxy re-encryption. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol.\u00a01560, pp. 112\u2013121. Springer, Heidelberg (1999)"},{"key":"19_CR20","unstructured":"Khurana, H., Slagell, A., Bonilla, R.: SELS: A Secure E-mail List Service. In: The Security Track of the ACM Symposium on Applied Computing (SAC) (March 2005)"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Khurana, H., Hahm, H.-S.: Certified Mailing Lists. In: Proceedings of the ACM Symposium on Communication, Information, Computer and Communication Security (ASIACCS 2006), Taipei, Taiwan (March 2006)","DOI":"10.1145\/1128817.1128828"},{"key":"19_CR22","doi-asserted-by":"crossref","unstructured":"Khurana, H., Koleva, R.: Scalable Security and Accounting Services for Content-Based Publish Subscribe Systems. International Journal of E-Business Research\u00a02(3) (2006)","DOI":"10.4018\/jebr.2006070101"},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"Kim, Y., Perrig, A., Tsudik, G.: Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups. In: Proceedings of 7th ACM Conference on Computer and Communication Security (CCS) (2000)","DOI":"10.1145\/352600.352638"},{"key":"19_CR24","doi-asserted-by":"crossref","unstructured":"Linn, J.: Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures. IETF PEM WG RFC 21 (1993)","DOI":"10.17487\/rfc1421"},{"key":"19_CR25","unstructured":"Mambo, M., Okamoto, E.: Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts. IEICE Transactions on Fundamentals\u00a0E80-A(1) (1997)"},{"key":"19_CR26","doi-asserted-by":"crossref","unstructured":"Ramsdell, B. (ed.): Secure\/Multipurpose Internet Mail Extensions (S\/MIME) Version 3.1 Message Specification, IETF Network Working Group, Request for Comments, RFC 3851 (July 2004)","DOI":"10.17487\/rfc3851"},{"key":"19_CR27","unstructured":"Smetters, D.K., Durfee, G.: Domain-based authentication of identity-based cryptosystems for secure email and IPsec. In: Proceedings of the 12th Usenix Security Symposium, Washington, DC, August 4-8 (2003)"},{"key":"19_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/11602897_23","volume-title":"Information and Communications Security","author":"W. Wei","year":"2005","unstructured":"Wei, W., Ding, X., Chen, K.: Multiplex Encryption: A Practical Approach to Encrypting Multi-Recipient Emails. In: Qing, S., Mao, W., L\u00f3pez, J., Wang, G. (eds.) ICICS 2005. LNCS, vol.\u00a03783, pp. 269\u2013279. Springer, Heidelberg (2005)"},{"key":"19_CR29","doi-asserted-by":"crossref","unstructured":"West-Brown, M.J., Stikvoort, D., Kossakowski, K.-P., Killcrece, G., Ruefle, R., Zajicek, M.: Handbook for Computer Security Incident Response Teams (CSIRTs), CERT Handbook, CMU\/SEI-2003-HB-002 (April 2003), available at: \n                    \n                      http:\/\/www.cert.org\/archive\/pdf\/csirt-handbook.pdf","DOI":"10.21236\/ADA413778"},{"issue":"1","key":"19_CR30","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/90.836475","volume":"8","author":"C.K. Wong","year":"2000","unstructured":"Wong, C.K., Gouda, M.G., Lam, S.S.: Secure group communications using key graphs. IEEE\/ACM Transactions on Networking\u00a08(1), 16\u201330 (2000)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"19_CR31","volume-title":"The Official PGP User\u2019s Guide","author":"P. Zimmerman","year":"1995","unstructured":"Zimmerman, P.: The Official PGP User\u2019s Guide. MIT Press, Cambridge (1995)"},{"key":"19_CR32","doi-asserted-by":"crossref","unstructured":"Zhou, J.: On the Security of a Multi-Party Certified Email Protocol. In: Proceedings of the International Conference on Information and Communications Security, Malaga, Spain (October 2004)","DOI":"10.1007\/978-3-540-30191-2_4"},{"key":"19_CR33","unstructured":"Zhou, L., Marsh, M.A., Schneider, F.B., Redz, A.: Distributed Blinding for Distributed ElGamal Re-Encryption. In: International Conference on Distributed Computing Systems (ICDCS), pp. 815\u2013824 (2005)"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11935308_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:08:48Z","timestamp":1566763728000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11935308_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540494966","9783540494973"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/11935308_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}