{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T01:17:37Z","timestamp":1770340657555,"version":"3.49.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031911309","type":"print"},{"value":"9783031911316","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-91131-6_15","type":"book-chapter","created":{"date-parts":[[2025,4,27]],"date-time":"2025-04-27T14:29:37Z","timestamp":1745764177000},"page":"429-455","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Anamorphism Beyond One-to-One Messaging: Public-Key with\u00a0Anamorphic Broadcast Mode"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-6587-2710","authenticated-orcid":false,"given":"Xuan Thanh","family":"Do","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6579-4807","authenticated-orcid":false,"given":"Giuseppe","family":"Persiano","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1136-4064","authenticated-orcid":false,"given":"Duong Hieu","family":"Phan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0848-0873","authenticated-orcid":false,"given":"Moti","family":"Yung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,28]]},"reference":[{"key":"15_CR1","doi-asserted-by":"publisher","unstructured":"Acharya, K., Dutta, R.: Constructions of Secure Multi-Channel Broadcast Encryption Schemes in Public Key Framework. In: Camenisch, J., Papadimitratos, P. (eds.) CANS 2018. LNCS, vol. 11124, pp. 495\u2013515. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00434-7_25","DOI":"10.1007\/978-3-030-00434-7_25"},{"issue":"3","key":"15_CR2","first-page":"535","volume":"48","author":"J Alwen","year":"2011","unstructured":"Alwen, J., Peikert, C.: Generating shorter bases for hard random lattices. Theor. Comput. Science 48(3), 535\u2013553 (2011)","journal-title":"Theor. Comput. Science"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Banfi, F., Gegier, K., Hirt, M., Maurer, U., Rito, G.: Anamorphic encryption, revisited. In: Joye, M., Leander, G. (eds.) EUROCRYPT 2024. Part II, volume 14652 of LNCS, pp. 3\u201332. Springer, Cham (2024)","DOI":"10.1007\/978-3-031-58723-8_1"},{"key":"15_CR4","doi-asserted-by":"publisher","unstructured":"Barth, A., Boneh, D., Waters, B.: Privacy in Encrypted Content Distribution Using Private Broadcast Encryption. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol. 4107, pp. 52\u201364. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11889663_4","DOI":"10.1007\/11889663_4"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Blazy, O., Mukherjee, S., Nguyen, H.: Duong Hieu Phan, and Damien Stehl\u00e9. An anonymous trace-and-revoke broadcast encryption scheme. In: Baek, J., Ruj, S. (eds.) ACISP 21. LNCS, vol. 13083, pp. 214\u2013233. Springer, Cham (December 2021)","DOI":"10.1007\/978-3-030-90567-5_11"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"S\u00e9bastien Canard, Duong\u00a0Hieu Phan, David Pointcheval, and Viet\u00a0Cuong Trinh. A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption. Theor. Comput. Sci., 723:51\u201372, 2018","DOI":"10.1016\/j.tcs.2018.02.036"},{"key":"15_CR7","doi-asserted-by":"publisher","unstructured":"Cash, D., Hofheinz, D., Kiltz, E., Peikert, C.: Bonsai Trees, or How to Delegate a Lattice Basis. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 523\u2013552. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13190-5_27","DOI":"10.1007\/978-3-642-13190-5_27"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Catalano, D., Giunta, E., Migliaro, F.: Anamorphic encryption: New constructions and homomorphic realizations. In: Joye, M., Leander, G. (eds.) EUROCRYPT 2024. Part II, volume 14652 of LNCS, pp. 33\u201362. Springer, Cham (May2024)","DOI":"10.1007\/978-3-031-58723-8_2"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Catalano, D., Giunta, E., Migliaro, F.: Limits of black-box anamorphic encryption. In: Reyzin, L., Stebila, D. (eds.) CRYPTO 2024. Part II, volume 14921 of LNCS, pp. 352\u2013383. Springer, Cham (August 2024)","DOI":"10.1007\/978-3-031-68379-4_11"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Xuan Thanh Do: Duong Hieu Phan, and Moti Yung. A concise bounded anonymous broadcast yielding combinatorial trace-and-revoke schemes. In: Conti, M., Zhou, J., Casalicchio, E., Spognardi, A. (eds.) ACNS 20International Conference on Applied Cryptography and Network Security. Part II, volume 12147 of LNCS, pp. 145\u2013164. Springer, Cham (October 2020)","DOI":"10.1007\/978-3-030-57878-7_8"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Nelly Fazio and Irippuge Milinda Perera: Outsider-anonymous broadcast encryption with sublinear ciphertexts. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 225\u2013242. Springer, Berlin, Heidelberg (May2012)","DOI":"10.1007\/978-3-642-30057-8_14"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO\u201993. LNCS, vol. 773, pp. 480\u2013491. Springer, Berlin, Heidelberg (August 1994)","DOI":"10.1007\/3-540-48329-2_40"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Craig Gentry, Chris Peikert, and Vinod Vaikuntanathan. Trapdoors for hard lattices and new cryptographic constructions. In Richard\u00a0E. Ladner and Cynthia Dwork, editors, 40th ACM STOC, pages 197\u2013206. ACM Press, May 2008","DOI":"10.1145\/1374376.1374407"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Aggelos Kiayias and Katerina Samari. Lower bounds for private broadcast encryption. In Information Hiding, volume 7692 of Lecture Notes in Computer Science, pages 176\u2013190. Springer, 2012","DOI":"10.1007\/978-3-642-36373-3_12"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Kim, I.: Seong Oun Hwang, Willy Susilo, Joonsang Baek, and Jongkil Kim. Efficient anonymous multi-group broadcast encryption. In: Conti, M., Zhou, J., Casalicchio, E., Spognardi, A. (eds.) ACNS 20International Conference on Applied Cryptography and Network Security. Part I, volume 12146 of LNCS, pp. 251\u2013270. Springer, Cham (October 2020)","DOI":"10.1007\/978-3-030-57808-4_13"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Miroslaw Kutylowski, Giuseppe Persiano, Duong\u00a0Hieu Phan, Moti Yung, and Marcin Zawada. Anamorphic signatures: Secrecy from a dictator who only permits authentication! In Helena Handschuh and Anna Lysyanskaya, editors, CRYPTO\u00a02023, Part\u00a0II, volume 14082 of LNCS, pages 759\u2013790. Springer, Cham, August 2023","DOI":"10.1007\/978-3-031-38545-2_25"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Miroslaw Kutylowski, Giuseppe Persiano, Duong\u00a0Hieu Phan, Moti Yung, and Marcin Zawada. The self-anti-censorship nature of encryption: On the prevalence of anamorphic cryptography. Proc. Priv. Enhancing Technol., 2023(4):170\u2013183, 2023","DOI":"10.56553\/popets-2023-0104"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Minh\u00a0Ha Le, Vinh\u00a0Duc Tran, Van\u00a0Anh Trinh, and Viet\u00a0Cuong Trinh. Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption. Theor. Comput. Sci., 804:219\u2013235, 2020","DOI":"10.1016\/j.tcs.2019.11.034"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Li, J., Gong, J.: Improved anonymous broadcast encryptions - tight security and shorter ciphertext. In: Preneel, B., Vercauteren, F. (eds.) ACNS 18International Conference on Applied Cryptography and Network Security. LNCS, vol. 10892, pp. 497\u2013515. Springer, Cham (July2018)","DOI":"10.1007\/978-3-319-93387-0_26"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Libert, B., Paterson, K.G., Quaglia, E.A.: Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 206\u2013224. Springer, Berlin, Heidelberg (May2012)","DOI":"10.1007\/978-3-642-30057-8_13"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Ling, S.: Duong Hieu Phan, Damien Stehl\u00e9, and Ron Steinfeld. Hardness of k-LWE and applications in traitor tracing. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014. Part I, volume 8616 of LNCS, pp. 315\u2013334. Springer, Berlin, Heidelberg (August 2014)","DOI":"10.1007\/978-3-662-44371-2_18"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Giuseppe Persiano, Duong\u00a0Hieu Phan, and Moti Yung. Anamorphic encryption: Private communication against a dictator. In Orr Dunkelman and Stefan Dziembowski, editors, EUROCRYPT\u00a02022, Part\u00a0II, volume 13276 of LNCS, pages 34\u201363. Springer, Cham, May\u00a0\/\u00a0June 2022","DOI":"10.1007\/978-3-031-07085-3_2"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Persiano, G.: Duong Hieu Phan, and Moti Yung. Public-key anamorphism in (CCA-secure) public-key encryption and beyond. In: Reyzin, L., Stebila, D. (eds.) CRYPTO 2024. Part II, volume 14921 of LNCS, pp. 422\u2013455. Springer, Cham (August 2024)","DOI":"10.1007\/978-3-031-68379-4_13"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Duong\u00a0Hieu Phan, David Pointcheval, and Viet\u00a0Cuong Trinh. Multi-channel broadcast encryption. In Kefei Chen, Qi\u00a0Xie, Weidong Qiu, Ninghui Li, and Wen-Guey Tzeng, editors, ASIACCS 13, pages 277\u2013286. ACM Press, May 2013","DOI":"10.1145\/2484313.2484348"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Wang, Y., Chen, R., Huang, X., Yung, M.: Sender-anamorphic encryption reformulated: Achieving robust and generic constructions. In: Guo, J., Steinfeld, R. (eds.) ASIACRYPT 2023. Part VI, volume 14443 of LNCS, pp. 135\u2013167. Springer, Singapore (December 2023)","DOI":"10.1007\/978-981-99-8736-8_5"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 EUROCRYPT 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-91131-6_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,27]],"date-time":"2025-04-27T14:29:46Z","timestamp":1745764186000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-91131-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031911309","9783031911316"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-91131-6_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"28 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EUROCRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Annual International Conference on the Theory and Applications of Cryptographic Techniques","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Madrid","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 May 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 May 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"44","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eurocrypt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eurocrypt.iacr.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}