{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:43:35Z","timestamp":1725486215534},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540431688"},{"type":"electronic","value":"9783540456643"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45664-3_2","type":"book-chapter","created":{"date-parts":[[2007,6,3]],"date-time":"2007-06-03T17:32:07Z","timestamp":1180891927000},"page":"17-33","source":"Crossref","is-referenced-by-count":11,"title":["Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages"],"prefix":"10.1007","author":[{"given":"Jean-S\u00e9bastien","family":"Coron","sequence":"first","affiliation":[]},{"given":"Helena","family":"Handschuh","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Joye","sequence":"additional","affiliation":[]},{"given":"Pascal","family":"Paillier","sequence":"additional","affiliation":[]},{"given":"David","family":"Pointcheval","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Tymen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,2,5]]},"reference":[{"key":"2_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/3-540-45539-6_18","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201900","author":"M. Bellare","year":"2000","unstructured":"Mihir Bellare, Alexandra Boldyreva, and Silvio Micali. Public-key Encryption in a Multi-User Setting: Security Proofs and Improvements. In Advances in Cryptology \u2014 EUROCRYPT\u201900, LNCS 1807, pages 259\u2013274. Springer-Verlag, Berlin, 2000."},{"key":"2_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/BFb0055718","volume-title":"Advances in Cryptology \u2014 CRYPTO\u201998","author":"M. Bellare","year":"1999","unstructured":"Mihir Bellare, Anand Desai, David Pointcheval, and Phillip Rogaway. Relations Among Notions of Security for Public-Key Encryption Schemes. Full paper (30 pages), February 1999. An extended abstract appears in H. Krawczyk, ed., Advances in Cryptology \u2014 CRYPTO\u201998, volume 1462 of Lecture Notes in Computer Science, pages 26\u201345, Springer-Verlag, 1998."},{"key":"2_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1007\/3-540-45022-X_42","volume-title":"Extended Notions of Security for Multicast Public Key Cryptosystems","author":"O. Baudron","year":"2000","unstructured":"Olivier Baudron, David Pointcheval, and Jacques Stern. Extended Notions of Security for Multicast Public Key Cryptosystems. In Proc. of the 27th ICALP, LNCS 1853, pages 499\u2013511. Springer-Verlag, Berlin, 2000."},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Mihir Bellare and Phillip Rogaway. Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In First ACM Conference on Computer and Communications Security, pages 62\u201373. ACM Press, 1993.","DOI":"10.1145\/168588.168596"},{"key":"2_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/BFb0053428","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201994","author":"M. Bellare","year":"1995","unstructured":"Mihir Bellare and Phillip Rogaway. Optimal Asymmetric Encryption. In A. De Santis, editor, Advances in Cryptology \u2014 EUROCRYPT\u201994, volume 950 of Lecture Notes in Computer Science, pages 92\u2013111. Springer-Verlag, 1995."},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Jean-S\u00e9bastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, and Christophe Tymen. Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages. http:\/\/eprint.iacr.org\/ , 2001.","DOI":"10.1007\/3-540-45760-7_18"},{"issue":"2","key":"2_CR7","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1137\/S0097539795291562","volume":"30","author":"D. Dolev","year":"2000","unstructured":"Danny Dolev, Cynthia Dwork, and Moni Naor. Non-Malleable Cryptography. SIAM Journal on Computing, 30(2):391\u2013437, 2000.","journal-title":"SIAM Journal on Computing"},{"key":"2_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-49162-7_5","volume-title":"Public Key Cryptography","author":"E. Fujisaki","year":"1999","unstructured":"Eiichiro Fujisaki and Tatsuaki Okamoto. How to Enhance the Security of Public-Key Encryption at Minimum Cost. In H. Imai and Y. Zheng, editors, Public Key Cryptography, volume 1560 of Lecture Notes in Computer Science, pages 53\u201368. Springer-Verlag, 1999."},{"key":"2_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1007\/3-540-48405-1_34","volume-title":"Advances in Cryptology \u2014 CRYPTO\u201999","author":"E. Fujisaki","year":"1999","unstructured":"Eiichiro Fujisaki and Tatsuaki Okamoto. Secure Integration of Asymmetric and Symmetric Encryption Schemes. In M. Wiener, editor, Advances in Cryptology \u2014 CRYPTO\u201999, volume 1666 of Lecture Notes in Computer Science, pages 537\u2013554. Springer-Verlag, 1999."},{"key":"2_CR10","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 CRYPTO\u201901","author":"E. Fujisaki","year":"2001","unstructured":"Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, and Jacques Stern. RSA-OAEP is Secure under the RSA Assumption. In Advances in Cryptology \u2014 CRYPTO\u201901, Lecture Notes in Computer Science. Springer-Verlag, 2001."},{"key":"2_CR11","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"Sha. Goldwasser","year":"1984","unstructured":"Sha. Goldwasser and Silvio Micali. Probabilistic Encryption. Journal of Computer and System Sciences, 28:270\u2013299, 1984.","journal-title":"Journal of Computer and System Sciences"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Moni Naor and Moti Yung. Public-Key Cryptosystems Provably Secure against Chosen Ciphertext Attacks. In 22nd ACM Annual Symposium on the Theory of Computing (STOC\u2019 90), pages 427\u2013437. ACM Press, 1990.","DOI":"10.1145\/100216.100273"},{"key":"2_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/3-540-45353-9_13","volume-title":"RSA 2001 Cryptographers\u2019 Track","author":"T. Okamoto","year":"2001","unstructured":"Tatsuaki Okamoto and David Pointcheval. REACT: Rapid Enhancedsecurity Asymmetric Cryptosystem Transform. In D. Naccache, editor, RSA 2001 Cryptographers\u2019 Track, volume 2020 of Lecture Notes in Computer Science, pages 159\u2013175. Springer-Verlag, 2001."},{"key":"2_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-44586-2_8","volume-title":"PKC","author":"T. Okamoto","year":"2001","unstructured":"Tatsuaki Okamoto and David Pointcheval. The Gap-Problems: a New Class of Problems for the Security of Cryptographic Schemes. In PKC, volume 1992 of Lecture Notes in Computer Science, pages 104\u2013118. Springer-Verlag, 2001."},{"key":"2_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/978-3-540-46588-1_10","volume-title":"Public Key Cryptography","author":"D. Pointcheval","year":"2000","unstructured":"David Pointcheval. Chosen-Ciphertext Security for any One-Way Cryptosystem. In H. Imai and Y. Zheng, editors, Public Key Cryptography, volume 1751 of Lecture Notes in Computer Science, pages 129\u2013146. Springer-Verlag, 2000."},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Charles Rackoff and Daniel R. Simon. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. In J. Feigenbaum, editor, Advances in Cryptology \u2014 CRYPTO\u201991, volume 576, pages 433\u2013444. Springer-Verlag, 1992.","DOI":"10.1007\/3-540-46766-1_35"},{"key":"2_CR17","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014CRYPTO\u201901","author":"V. Shoup","year":"2001","unstructured":"Victor Shoup. OAEP Reconsidered. In Advances in Cryptology \u2014CRYPTO\u201901, Lecture Notes in Computer Science. Springer-Verlag, 2001."}],"container-title":["Lecture Notes in Computer Science","Public Key Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45664-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T12:58:24Z","timestamp":1556456304000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45664-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540431688","9783540456643"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-45664-3_2","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}