{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:21:13Z","timestamp":1743092473252,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031067907"},{"type":"electronic","value":"9783031067914"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-06791-4_8","type":"book-chapter","created":{"date-parts":[[2022,7,3]],"date-time":"2022-07-03T23:03:27Z","timestamp":1656889407000},"page":"97-107","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Certificate-Based Encryption Scheme Without Random Oracles"],"prefix":"10.1007","author":[{"given":"Lan","family":"Guo","sequence":"first","affiliation":[]},{"given":"Yang","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Qing","family":"Miao","sequence":"additional","affiliation":[]},{"given":"Guangao","family":"Zu","sequence":"additional","affiliation":[]},{"given":"Zhongqi","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,4]]},"reference":[{"key":"8_CR1","doi-asserted-by":"publisher","unstructured":"Gentry, C.: Certificate-based encryption and the certificate revocation problem. In: Biham, E. (eds) Advances in Cryptology\u2014EUROCRYPT 2003. EUROCRYPT 2003. Lecture Notes in Computer Science, vol. 2656. Springer, Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/3-540-39200-9_17 (2003)","DOI":"10.1007\/3-540-39200-9_17"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: 1st ACM Conference on Communications and Computer Security, pp. 62\u201373. ACM, USA (1993)","DOI":"10.1145\/168588.168596"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology, revisited. In: STOC\u201998, pp. 209\u2013218. ACM, Holland (1998)","DOI":"10.1145\/276698.276741"},{"key":"8_CR4","doi-asserted-by":"publisher","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil Pairing. In: Kilian, J. (eds) Advances in Cryptology\u2014CRYPTO 2001. CRYPTO 2001. Lecture Notes in Computer Science, vol. 2139. Springer, Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/3-540-44647-8_13 (2001)","DOI":"10.1007\/3-540-44647-8_13"},{"key":"8_CR5","doi-asserted-by":"publisher","unstructured":"Yum, D.H., Lee, P.J.: Identity-based cryptography in public key management. In: Katsikas, S.K., Gritzalis, S., L\u00f3pez, J. (eds) Public Key Infrastructure. EuroPKI 2004. Lecture Notes in Computer Science, vol. 3093. Springer, Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/978-3-540-25980-0_6 (2004)","DOI":"10.1007\/978-3-540-25980-0_6"},{"key":"8_CR6","doi-asserted-by":"publisher","unstructured":"Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, CS. (eds) Advances in Cryptology - ASIACRYPT 2003. ASIACRYPT 2003. Lecture Notes in Computer Science, vol. 2894. Springer, Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/978-3-540-40061-5_29 (2003)","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Galindo, D., Morillo, P., R\u00e0fols, C.: Breaking Yum and Lee generic constructions of certificate-Less and certificate-based encryption schemes. In: Atzeni A.S., Lioy A. (eds.) EuroPKI 2006, vol. 4043, pp. 81\u201391. Springer, Heidelberg (2006)","DOI":"10.1007\/11774716_7"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Lu., Y., Li, J., Xiao, J.: Generic construction of certificate-based encryption. In: the 9th International Conference for Young Computer Scientists, pp. 1518\u20131594. IEEE, China (2008)","DOI":"10.1109\/ICYCS.2008.11"},{"key":"8_CR9","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/s00145-011-9114-1","volume":"26","author":"E Fujisaki","year":"2013","unstructured":"Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. J Cryptol 26, 80\u2013101 (2013)","journal-title":"J Cryptol"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Fujisaki, E., Okamoto, T.: How to enhance the security of public-key encryption at minimum cost. In: Public Key Cryptography-PKC\u201999, LNCS, vol. 1560, pp. 53\u201368. Springer, Heidelberg (1999)","DOI":"10.1007\/3-540-49162-7_5"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Katz, J.: Chosen-ciphertext security of multiple encryption. In: Kilian J. (eds.) TCC 2005, LNCS, vol. 3378, pp. 188\u2013209. Springer, Heidelberg (2005)","DOI":"10.1007\/978-3-540-30576-7_11"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Al-Riyami, S.S., Paterson, K.G.: CBE from CL-PKE: a generic construction and efficient schemes. In: Vaudenay S. (eds.) PKC 2005, LNCS, vol. 3386, pp. 398\u2013415. Springer, Heidelberg (2005)","DOI":"10.1007\/978-3-540-30580-4_27"},{"key":"8_CR13","unstructured":"Kang, B.G., Park, J.H.: Is it possible to have CBE from CL-PKE?. Cryptology ePrint Archive (2005)"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Yum, D.H., Lee, P.J.: Separable implicit certificate revocation. In: Park C., Chee S. (eds.) 7th International Conference on Information Security and Cryptology, LNCS, vol. 3506, pp. 121\u2013136. Springer, Heidelberg (2005)","DOI":"10.1007\/11496618_10"},{"issue":"1","key":"8_CR15","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1093\/ietfec\/e90-a.1.303","volume":"E90A","author":"JH Park","year":"2007","unstructured":"Park, J.H., Lee, D.H.: On the security of status certificate-based encryption scheme. IEICE Trans. Fundamentals E90A(1), 303\u2013304 (2007)","journal-title":"IEICE Trans. Fundamentals"},{"key":"8_CR16","unstructured":"Morillo, P., R\u00e0fols, C.: Certificate-based encryption without random oracles. Cryptology ePrint Archive (2006)"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer R. (eds.) Advances in Cryptology-Eurocrypt\u20192005, LNSC, vol. 3494, pp. 114-127. Springer, Heidelberg (2005)","DOI":"10.1007\/11426639_7"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Boneh, D., Boyen, X.: Efficient selective-ID secure identity based encryption without random oracles. In: Advances in Cryptology-Eurocrypt\u201904, LNCS, vol. 3027, pp. 223\u2013238. Springer, Heidelberg (2004)","DOI":"10.1007\/978-3-540-24676-3_14"},{"issue":"7","key":"8_CR19","doi-asserted-by":"publisher","first-page":"1218","DOI":"10.1016\/j.jss.2007.09.009","volume":"81","author":"D Galindo","year":"2008","unstructured":"Galindo, D., Morillo, P., R\u00e0fols, C.: Improved certificate-based encryption in the standard model. J. Syst. Softw. 81(7), 1218\u20131226 (2008)","journal-title":"J. Syst. Softw."},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Liu, J. K., Zhou, J.: Efficient certificate-based encryption in the standard model. In: Visconti I. (eds.) SCN 2008, LNCS, vol. 5229, pp. 144\u2013155. Springer, Heidelberg (2008)","DOI":"10.1007\/978-3-540-85855-3_10"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Practical identity-based encryption without random oracles. In: Advances in Cryptology-EUROCRYPT\u201906, LNCS, vol. 4004, pp. 445\u2013464. Springer, Heidelberg (2006)","DOI":"10.1007\/11761679_27"},{"issue":"1","key":"8_CR22","doi-asserted-by":"publisher","first-page":"19","DOI":"10.4304\/jcp.4.1.19-26","volume":"4","author":"Y Lu","year":"2009","unstructured":"Lu, Y., Li, J., Xiao, J.: Constructing efficient certificate-based encryption with paring. J. Comput. 4(1), 19\u201326 (2009)","journal-title":"J. Comput."},{"key":"8_CR23","unstructured":"Sakai, R., Kasahara, M.: ID based cryptosystems with pairing on elliptic curve. Cryptology ePrint Archive (2003)"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Chen, L.Q., Cheng, Z.H.: Security proof of Sakai-Kasahara\u2019s identity-based encryption scheme. In: Smart N.P. (eds.) Cryptography and Coding 2005, LNCS, vol. 3796, pp. 442\u2013459. Springer, Heidelberg (2005)","DOI":"10.1007\/11586821_29"},{"issue":"2","key":"8_CR25","first-page":"1747","volume":"69","author":"Y Hwang","year":"2021","unstructured":"Hwang, Y., Lee, I.: A lightweight certificate-based aggregate signature scheme providing key insulation. Comp. Mater. Contin. 69(2), 1747\u20131764 (2021)","journal-title":"Comp. Mater. Contin."},{"issue":"1","key":"8_CR26","doi-asserted-by":"publisher","first-page":"9","DOI":"10.32604\/jcs.2020.06313","volume":"2","author":"L Li","year":"2020","unstructured":"Li, L., Xu, C., Yu, X., Dou, B., Zuo, C.: Searchable encryption with access control on keywords in multi-user setting. Journal of Cyber Security 2(1), 9\u201323 (2020)","journal-title":"Journal of Cyber Security"},{"issue":"1","key":"8_CR27","doi-asserted-by":"publisher","first-page":"31","DOI":"10.32604\/jnm.2020.09946","volume":"2","author":"M Ali","year":"2020","unstructured":"Ali, M., Xu, C., Hussain, A.: Authorized attribute-based encryption multi-keywords search with policy updating. Journal of New Media 2(1), 31\u201343 (2020)","journal-title":"Journal of New Media"},{"issue":"1","key":"8_CR28","doi-asserted-by":"publisher","first-page":"55","DOI":"10.32604\/jcs.2021.017217","volume":"3","author":"C Xu","year":"2021","unstructured":"Xu, C., Mei, L., Cheng, J., Zhao, Y., Zuo, C.: IoT services: realizing private real-time detection via authenticated conjunctive searchable encryption. Journal of Cyber Security 3(1), 55\u201367 (2021)","journal-title":"Journal of Cyber Security"},{"issue":"1","key":"8_CR29","doi-asserted-by":"publisher","first-page":"53","DOI":"10.32604\/csse.2022.017597","volume":"40","author":"A Alameen","year":"2022","unstructured":"Alameen, A.: Repeated attribute optimization for big data encryption. Comput. Syst. Sci. Eng. 40(1), 53\u201364 (2022)","journal-title":"Comput. Syst. Sci. Eng."},{"key":"8_CR30","doi-asserted-by":"crossref","unstructured":"Kiltz, E., Vahlis, Y.: CCA2 secure IBE: standard model efficiency through authenticated symmetric encryption. In: Malkin T. (eds.) Cryptographer\u2019s Track at RSA Conference 2008, LNCS, vol. 4964, pp. 221\u2013238. Springer, Heidelberg (2008)","DOI":"10.1007\/978-3-540-79263-5_14"},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"Bellare, M., Namprempre, C.: Authenticated encryption: relations among notions and analysis of the generic composition paradigm. In: Okamoto T. (eds.) Advances in Cryptology-ASIACRYPT 2000, LNCS, vol. 1976, pp. 531\u2013545. Springer, Heidelberg (2000)","DOI":"10.1007\/3-540-44448-3_41"},{"issue":"1","key":"8_CR32","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1137\/S0097539702403773","volume":"33","author":"R Cramer","year":"2003","unstructured":"Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J. Comput. 33(1), 167\u2013226 (2003)","journal-title":"SIAM J. Comput."},{"key":"8_CR33","doi-asserted-by":"crossref","unstructured":"Rogaway, P., Bellare, M., Black, J., Krovetz, T.: OCB: a block-cipher mode of operation for efficient authenticated encryption. In: 8th ACM conference on Computer and Communications Security, pp. 196\u2013205. ACM, USA (2001)","DOI":"10.1145\/501983.502011"},{"key":"8_CR34","doi-asserted-by":"crossref","unstructured":"Barreto, P.S.L.M., Kim, H.Y., Lynn, B., Scott, M.: Efficient algorithms for pairing-based cryptosystems. In: Advances in Cryptology-CRYPTO 2002, LNCS, vol. 2442, pp. 354\u2013368. Springer, Heidelberg (2002)","DOI":"10.1007\/3-540-45708-9_23"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-06791-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T12:32:08Z","timestamp":1657715528000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-06791-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031067907","9783031067914"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-06791-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"4 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Qinghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1124","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"115","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}