{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T13:04:47Z","timestamp":1765112687296},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540438618"},{"type":"electronic","value":"9783540454502"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45450-0_20","type":"book-chapter","created":{"date-parts":[[2007,5,19]],"date-time":"2007-05-19T16:53:10Z","timestamp":1179593590000},"page":"241-256","source":"Crossref","is-referenced-by-count":8,"title":["On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes"],"prefix":"10.1007","author":[{"given":"Ron","family":"Steinfeld","sequence":"first","affiliation":[]},{"given":"Joonsang","family":"Baek","sequence":"additional","affiliation":[]},{"given":"Yuliang","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,6,21]]},"reference":[{"key":"20_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/BFb0055718","volume-title":"Advances in Cryptology-Proceedings of CRYPTO\u2019 98","author":"M. Bellare","year":"1998","unstructured":"M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations Among Notions of Security for Public-Key Encryption Schemes. In Advances in Cryptology-Proceedings of CRYPTO\u2019 98, volume 1462 of LNCS, pages 26\u201345, Berlin, 1998. Springer-Verlag."},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway. Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In Proceedings of First ACM Conference on Computer and Communications Security, pages 62\u201373. ACM, 1993.","DOI":"10.1145\/168588.168596"},{"key":"20_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0028457","volume-title":"Information and Communications Security","author":"M. Bellare","year":"1997","unstructured":"M. Bellare and P. Rogaway. Minimizing the use of random oracles in authenticated encryption schemes. In Information and Communications Security, volume 1334 of LNCS, pages 1\u201316, Berlin, 1997. Springer-Verlag."},{"key":"20_CR4","series-title":"Lect Notes Comput Sci","first-page":"143","volume-title":"Topics in Cryptology-CT-RSA 2001","author":"M. Bellare","year":"2001","unstructured":"M. Bellare M. Abdalla and P. Rogaway. The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES. In Topics in Cryptology-CT-RSA 2001, volume 2020 of LNCS, pages 143\u2013158, Berlin, 2001. Springer-Verlag. See full paper available at \n                    www-cse.ucsd.edu\/users\/mihir\n                    \n                  ."},{"key":"20_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/3-540-45353-9_13","volume-title":"Topics in Cryptology-CT-RSA 2001","author":"T. Okamoto","year":"2001","unstructured":"T. Okamoto and D. Pointcheval. REACT: Rapid Enhanced-security Asymmetric Cryptosystem Transform. In Topics in Cryptology-CT-RSA 2001, volume 2020 of LNCS, pages 159\u2013174, Berlin, 2001. Springer-Verlag."},{"issue":"5","key":"20_CR6","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1109\/49.223871","volume":"11","author":"Y. Zheng","year":"1993","unstructured":"Y. Zheng and J. Seberry. Immunizing public key cryptosystems against chosen ciphertext attacks. In the Special Issue on Secure Communications, IEEE Journal on Selected Areas in Communications, Vol. 11, No. 5, 1993, pages 715\u2013724.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"20_CR7","unstructured":"V. Shoup. A Proposal for an ISO Standard for Public Key Encryption (Cersion 1.1). ISO\/IEC JTC 1\/SC 27, 2001."}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45450-0_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,16]],"date-time":"2019-02-16T15:21:08Z","timestamp":1550330468000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45450-0_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540438618","9783540454502"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/3-540-45450-0_20","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}