{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T22:12:12Z","timestamp":1775167932274,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540001713","type":"print"},{"value":"9783540361787","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-36178-2_34","type":"book-chapter","created":{"date-parts":[[2007,5,3]],"date-time":"2007-05-03T13:30:14Z","timestamp":1178199014000},"page":"548-566","source":"Crossref","is-referenced-by-count":554,"title":["Hierarchical ID-Based Cryptography"],"prefix":"10.1007","author":[{"given":"Craig","family":"Gentry","sequence":"first","affiliation":[]},{"given":"Alice","family":"Silverberg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,11,8]]},"reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"S. S. Al-Riyami and K. G. Paterson. Authenticated three party key agreement protocols from pairings. Cryptology e-Print Archive, http:\/\/eprint.iacr.org\/2002\/035\/ .","DOI":"10.1007\/978-3-540-40974-8_27"},{"key":"34_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/3-540-45708-9_23","volume-title":"Advances in Cryptology-Crypto 2002","author":"P. S. L. M. Barreto","year":"2002","unstructured":"P. S. L. M. Barreto, H. Y. Kim, B. Lynn, and M. Scott. Efficient algorithms for pairing-based cryptosystems, in Advances in Cryptology-Crypto 2002, Lecture Notes in Computer Science 2442 (2002), Springer, 354\u2013368."},{"key":"34_CR3","series-title":"Lect Notes Comput Sci","first-page":"335","volume-title":"Advances in Cryptology-Eurocrypt\u2019 84","author":"R. Blom","year":"1984","unstructured":"R. Blom. An optimal class of symmetric key generation systems, in Advances in Cryptology-Eurocrypt\u2019 84, Lecture Notes in Computer Science 209 (1984), Springer, 335\u2013338."},{"key":"34_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1007\/3-540-48071-4_33","volume-title":"Advances in Cryptology-Crypto\u2019 92","author":"C. Blundo","year":"1993","unstructured":"C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, M. Yung. Perfectly-secure key distribution for dynamic conferences, in Advances in Cryptology-Crypto\u2019 92, Lecture Notes in Computer Science 740 (1993), Springer, 471\u2013486."},{"key":"34_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology-Crypto 2001","author":"D. Boneh","year":"2001","unstructured":"D. Boneh and M. Franklin. Identity based encryption from the Weil pairing, in Advances in Cryptology-Crypto 2001, Lecture Notes in Computer Science 2139 (2001), Springer, 213\u2013229."},{"key":"34_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology-Crypto 2001","author":"D. Boneh","year":"2001","unstructured":"D. Boneh and M. Franklin. Identity based encryption from the Weil pairing, extended version of Advances in Cryptology-Crypto 2001, [5], http:\/\/www.cs.stanford.edu\/~dabo\/papers\/ibe.pdf ."},{"key":"34_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology-Asiacrypt 2001","author":"D. Boneh","year":"2001","unstructured":"D. Boneh, B. Lynn, and H. Shacham. Short signatures from the Weil pairing, in Advances in Cryptology-Asiacrypt 2001, Lecture Notes in Computer Science 2248 (2001), Springer, 514\u2013532."},{"key":"34_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/3-540-45325-3_32","volume-title":"Cryptography and Coding","author":"C. Cocks","year":"2001","unstructured":"C. Cocks. An identity based encryption scheme based on quadratic residues, in Cryptography and Coding, Lecture Notes in Computer Science 2260 (2001), Springer, 360\u2013363."},{"key":"34_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1007\/3-540-48405-1_34","volume-title":"Advances in Cryptology-Crypto\u2019 99","author":"E. Fujisaki","year":"1999","unstructured":"E. Fujisaki and T. Okamoto. Secure integration of asymmetric and symmetric encryption schemes, in Advances in Cryptology-Crypto\u2019 99, Lecture Notes in Computer Science 1666 (1999), Springer, 537\u2013554."},{"key":"34_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1007\/978-3-540-48000-6_28","volume-title":"Advances in Cryptology-Asiacrypt 1999","author":"G. Hanaoka","year":"1999","unstructured":"G. Hanaoka, T. Nishioka, Y. Zheng, and H. Imai. An efficient hierarchical identity-based key-sharing method resistant against collusion-attacks, in Advances in Cryptology-Asiacrypt 1999, Lecture Notes in Computer Science 1716 (1999), Springer, 348\u2013362."},{"key":"34_CR11","unstructured":"G. Hanaoka, T. Nishioka, Y. Zheng, and H. Imai, A hierarchical non-interactive key-sharing scheme with low memory size and high resistance against collusion attacks, to appear in The Computer Journal."},{"key":"34_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1007\/3-540-46035-7_31","volume-title":"Cryptology-Eurocrypt 2002","author":"J. Horwitz","year":"2002","unstructured":"J. Horwitz and B. Lynn. Toward Hierarchical Identity-Based Encryption, in Advances in Cryptology-Eurocrypt 2002, Lecture Notes in Computer Science 2332 (2002), Springer, 466\u2013481."},{"key":"34_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/10722028_23","volume-title":"Algorithmic Number Theory (ANTS-IV)","author":"A. Joux","year":"2000","unstructured":"A. Joux. A one round protocol for tripartite Diffie-Hellman, in Algorithmic Number Theory (ANTS-IV), Lecture Notes in Computer Science 1838 (2000), Springer, 385\u2013394."},{"key":"34_CR14","unstructured":"V. Miller. Short programs for functions on curves, unpublished manuscript."},{"key":"34_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/3-540-45708-9_22","volume-title":"Advances in Cryptology-Crypto 2002","author":"K. Rubin","year":"2002","unstructured":"K. Rubin and A. Silverberg. Supersingular abelian varieties in cryptology, in Advances in Cryptology-Crypto 2002, Lecture Notes in Computer Science 2442 (2002), Springer, 336\u2013353."},{"key":"34_CR16","unstructured":"R. Sakai, K. Ohgishi, and M. Kasahara. Cryptosystems based on pairing. SCIC 2000-C20, Okinawa, Japan, January 2000."},{"key":"34_CR17","series-title":"Lect Notes Comput Sci","first-page":"47","volume-title":"Advances in Cryptology-Crypto\u2019 84","author":"A. Shamir","year":"1984","unstructured":"A. Shamir. Identity-based cryptosystems and signature schemes, in Advances in Cryptology-Crypto\u2019 84, Lecture Notes in Computer Science 196 (1984), Springer, 47\u201353."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 ASIACRYPT 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36178-2_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T13:41:02Z","timestamp":1556372462000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36178-2_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540001713","9783540361787"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-36178-2_34","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2002]]}}}