{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T15:32:30Z","timestamp":1770219150616,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540656449","type":"print"},{"value":"9783540491620","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-49162-7_5","type":"book-chapter","created":{"date-parts":[[2007,7,31]],"date-time":"2007-07-31T19:51:55Z","timestamp":1185911515000},"page":"53-68","source":"Crossref","is-referenced-by-count":158,"title":["How to Enhance the Security of Public-Key Encryption at Minimum Cost"],"prefix":"10.1007","author":[{"given":"Eiichiro","family":"Fujisaki","sequence":"first","affiliation":[]},{"given":"Tatsuaki","family":"Okamoto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,10,29]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway,\u201cRandom Oracles are Practical: A Paradigm for Designing Efficient Protocols\u201d, Proc. of the First ACM Conference on Computer and Communications Security, pp. 62\u201373.","DOI":"10.1145\/168588.168596"},{"key":"5_CR2","unstructured":"M. Bellare and P. Rogaway, \u201cOptimal Asymmetric Encryption\u2014How to encrypt with RSA\u201d Advances in Cryptology-EUROCRYPT\u201994."},{"key":"5_CR3","unstructured":"M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, \u201cRelations Among Notions of Security for Public-Key Encryption Schemes\u201d Advances in Cryptology-CRYPTO\u201998."},{"key":"5_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/3-540-39568-7_23","volume-title":"Proceeding of Crypto\u201984","author":"M. Blum","year":"1985","unstructured":"M. Blum, and S. Goldwasser, \u201cAn efficient probabilistic public-key encryption scheme which hides all partial information\u201d, Proceeding of Crypto\u201984, LNCS 196, Springer-Verlag, pp. 289\u2013299 (1985)."},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"R. Cramer and V. Shoup, \u201cA practical public key cryptosystem provably secure against adaptive chosen message attack\u201d, Advances in Cryptology-CRYPTO\u201998, Springer-Verlag, 1998.","DOI":"10.1007\/BFb0055717"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"D. Dolev and C. Dwork and M. Naor, \u201cNon-malleable cryptography\u201d, Proceeding of STOC91, pp 542\u2013552.","DOI":"10.1145\/103418.103474"},{"issue":"4","key":"5_CR7","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-31","author":"T. ElGamal","year":"1985","unstructured":"T. ElGamal, \u201cA Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,\u201d IEEE Transactions on Information Theory, IT-31,4, pp. 469\u2013472, 1985.","journal-title":"IEEE Transactions on Information Theory"},{"key":"5_CR8","first-page":"270","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"S. Goldwasser, and S. Micali, \u201cProbabilistic Encryption\u201d JCSS, vol. 28, pp. 270\u2013299, 1984.","journal-title":"JCSS"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"T. Okamoto, and S. Uchiyama, \u201cA New Public-Key Cryptosystem as Secure as Factoring\u201d, Advances in Cryptology-EUROCRYPT\u201998, Springer-Verlag, 1998.","DOI":"10.1007\/BFb0054135"},{"issue":"2","key":"5_CR10","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"R. Rivest, A. Shamir and L. Adleman, \u201cA Method for Obtaining Digital Signatures and Public Key Cryptosystems\u201d, Communications of ACM, 21,2, pp. 120\u2013126, 1978.","journal-title":"Communications of ACM"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Y. Tsiounis and M. Yung, \u201cOn the Security of ElGamal based Encryption\u201d, PKC\u201998, January, 1998.","DOI":"10.1007\/BFb0054019"}],"container-title":["Lecture Notes in Computer Science","Public Key Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-49162-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T12:22:23Z","timestamp":1556713343000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-49162-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540656449","9783540491620"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-49162-7_5","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1999]]}}}