{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T22:34:23Z","timestamp":1775774063352,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540663478","type":"print"},{"value":"9783540484059","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48405-1_34","type":"book-chapter","created":{"date-parts":[[2007,5,1]],"date-time":"2007-05-01T06:24:36Z","timestamp":1178000676000},"page":"537-554","source":"Crossref","is-referenced-by-count":644,"title":["Secure Integration of Asymmetric and Symmetric Encryption Schemes"],"prefix":"10.1007","author":[{"given":"Eiichiro","family":"Fujisaki","sequence":"first","affiliation":[]},{"given":"Tatsuaki","family":"Okamoto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,12,16]]},"reference":[{"key":"34_CR1","unstructured":"M. Abdalla, M. Bellare and P. Rogaway, \u201cDHAES: An Encryption Scheme Based on the Diffie-Hellman Problem,\u201d Submission to IEEE P1363."},{"key":"34_CR2","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway, \u201cRandom Oracles are Practical: A Paradigm for Designing Effcient Protocols,\u201d Proc. of the First ACM Conference on Computer and Communications Security, pp.62\u201373.","DOI":"10.1145\/168588.168596"},{"key":"34_CR3","unstructured":"M. Bellare and P. Rogaway, \u201cOptimal Asymmetric Encryption\u2014How to encrypt with RSA\u201d Advances in Cryptology-EUROCRYPT\u201994."},{"key":"34_CR4","unstructured":"M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, \u201cRelations Among Notions of Security for Public-Key Encryption Schemes\u201d Advances in Cryptology-CRYPTO\u201998."},{"key":"34_CR5","unstructured":"M. Bellare, A. Desai, E. Jokipii, and P. Rogaway, \u201cA Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation\u201d, Proceedings of FOCS97, IEEE, 1997."},{"key":"34_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/3-540-39568-7_23","volume-title":"Proceeding of CRYPTO\u201984","author":"M. Blum","year":"1985","unstructured":"M. Blum, and S. Goldwasser, \u201cAn effcient probabilistic public-key encryption scheme which hides all partial information\u201d, Proceeding of CRYPTO\u201984, LNCS 196, Springer-Verlag, pp.289\u2013299 (1985)."},{"key":"34_CR7","unstructured":"Canetti, R., Goldreich, O. and Halevi, S.: The Random Oracle Methodology, Revisited, Proc. of STOC, ACM Press, pp.209\u2013218 (1998)."},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"R. Cramer and V. Shoup, \u201cA practical public key cryptosystem provably secure against adaptive chosen message attack\u201d, Advances in Cryptology-CRYPTO\u201998, Springer-Verlag, 1998.","DOI":"10.1007\/BFb0055717"},{"key":"34_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1007\/3-540-46766-1_36","volume-title":"Advances in Cryptology-CRYPTO\u201991","author":"I. Damg\u00e5rd","year":"1992","unstructured":"I. Damg\u00e5rd, \u201cTowards practical public key systems secure against chosen ciphertext attacks\u201d, Advances in Cryptology-CRYPTO\u201991, pp.445\u2013456, Proceedings, Lecture Notes in Computer Science No. 576, Springer-Verlag, 1992."},{"key":"34_CR10","doi-asserted-by":"crossref","unstructured":"D. Dolev and C. Dwork and M. Naor, \u201cNon-malleable cryptography\u201d, Proceeding of STOC91, pp 542\u2013552.","DOI":"10.1145\/103418.103474"},{"key":"34_CR11","doi-asserted-by":"crossref","unstructured":"T. ElGamal, \u201cA Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,\u201d IEEE Transactions on Information Theory, IT-31, 4, pp.469\u2013472, 1985.","DOI":"10.1109\/TIT.1985.1057074"},{"key":"34_CR12","series-title":"Lect Notes Comput Sci","volume-title":"Proc.of PKC\u201999","author":"F. E","year":"1999","unstructured":"Fujisaki, E. and Okamoto, T.: How to Enhance the Security of Public-Key Encryption at Minimum Cost, Proc.of PKC\u201999, LNCS, Springer-Verlag (1999)."},{"key":"34_CR13","first-page":"270","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"S. Goldwasser, and S. Micali, \u201cProbabilistic Encryption\u201d, JCSS, vol.28, pp.270\u2013299, 1984.","journal-title":"Probabilistic Encryption"},{"key":"34_CR14","doi-asserted-by":"crossref","unstructured":"M. Naor, and M. Yung \u201cPublic-key Cryptosystems Provably Secure against Chosen Ciphertext Attacks\u201d, Proceeding of the 22nd Annual Symposium on Theory of Computing, ACM (STOC), pp.427\u2013437, 1990","DOI":"10.1145\/100216.100273"},{"key":"34_CR15","unstructured":"T. Okamoto, E. Fujisaki and H. Morita, \u201cPSEC: Provably Secure Elliptic Curve Encryption Scheme\u201d, Submission to IEEE P1363a, March 1999."},{"key":"34_CR16","unstructured":"T. Okamoto, S. Uchiyama and E. Fujisaki, \u201cEPOC: Effcient Probabilistic Public-Key Encryption\u201d, Submission to IEEE P1363a, November 1998."},{"key":"34_CR17","doi-asserted-by":"crossref","unstructured":"T. Okamoto, and S. Uchiyama, \u201cA New Public-Key Cryptosystem as Secure as Factoring\u201d, Advances in Cryptology-EUROCRYPT\u201998, Springer-Verlag, 1998.","DOI":"10.1007\/BFb0054135"},{"key":"34_CR18","unstructured":"M. Rabin, \u201cDigitalized Signatures and Public-Key Functions as Intractable as Factorization\u201d, MIT Technical Report, MIT\/LCS\/TR-212, 1979."},{"key":"34_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1007\/3-540-46766-1_35","volume-title":"Advances in Cryptology-CRYPTO91","author":"C. Rackoff","year":"1992","unstructured":"C. Rackoff and D.R. Simon, \u201cNon-interactive zero-knowledge proof of knowledge and chosen ciphertext attack\u201d, Advances in Cryptology-CRYPTO91, pp.433\u2013444, Proceedings, Lecture Notes in Computer Science No. 576, Springer-Verlag, 1992."},{"issue":"2","key":"34_CR20","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"R. Rivest, A. Shamir and L. Adleman, \u201cA Method for Obtaining Digital Signatures and Public Key Cryptosystems\u201d, Communications of ACM, 21, 2, pp.120\u2013126, 1978.","journal-title":"Communications of ACM"},{"key":"34_CR21","doi-asserted-by":"crossref","unstructured":"V. Shoup, and R. Gennaro, \u201cSecuring Threshold Cryptosystems against Chosen Ciphertext Attack\u201d, Advances in Cryptology-EUROCRYPT\u201998, Springer-Verlag, 1998.","DOI":"10.1007\/BFb0054113"},{"key":"34_CR22","doi-asserted-by":"crossref","unstructured":"Y. Tsiounis and M. Yung, \u201cOn the Security of ElGamal based Encryption\u201d, PKC\u201998, January, 1998.","DOI":"10.1007\/BFb0054019"},{"key":"34_CR23","series-title":"Lect Notes Comput Sci","first-page":"292","volume-title":"Advances in Cryptology-CRYPTO\u201992","author":"Y. Zheng","year":"1992","unstructured":"Y. Zheng and J. Seberry, \u201cPractical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks\u201d, Advances in Cryptology-CRYPTO\u201992, pp.292\u2013304, Proceedings, Lecture Notes in Computer Science No. 740, Springer-Verlag, 1992."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 99"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48405-1_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T12:35:37Z","timestamp":1556368537000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48405-1_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540663478","9783540484059"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/3-540-48405-1_34","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1999]]}}}