{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T20:34:05Z","timestamp":1764621245990,"version":"3.46.0"},"publisher-location":"Cham","reference-count":8,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032122926"},{"type":"electronic","value":"9783032122933"}],"license":[{"start":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T00:00:00Z","timestamp":1764633600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T00:00:00Z","timestamp":1764633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-12293-3_4","type":"book-chapter","created":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T20:28:14Z","timestamp":1764620894000},"page":"97-122","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Relationships Among FuncCPA and\u00a0Its Related Notions"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-2377-3927","authenticated-orcid":false,"given":"Takumi","family":"Shinozaki","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7803-812X","authenticated-orcid":false,"given":"Tatsuaki","family":"Okamoto","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1330-4495","authenticated-orcid":false,"given":"Keisuke","family":"Tanaka","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5260-3372","authenticated-orcid":false,"given":"Masayuki","family":"Tezuka","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0905-5641","authenticated-orcid":false,"given":"Yusuke","family":"Yoshida","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,2]]},"reference":[{"key":"4_CR1","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/978-3-031-22365-5_3","volume-title":"TCC 2022, Part II","author":"A Akavia","year":"2022","unstructured":"Akavia, A., Gentry, C., Halevi, S., Vald, M.: Achievable CCA2 relaxation for homomorphic encryption. In: Kiltz, E., Vaikuntanathan, V. (eds.) TCC 2022, Part II. LNCS, vol. 13748, pp. 70\u201399. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-22365-5_3"},{"key":"4_CR2","doi-asserted-by":"publisher","unstructured":"Akavia, A., Gentry, C., Halevi, S., Vald, M.: Achievable CCA2 relaxation for homomorphic encryption. J. Cryptol. 38(1), 5 (2025). https:\/\/doi.org\/10.1007\/S00145-024-09526-1","DOI":"10.1007\/S00145-024-09526-1"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-642-22670-0_17","volume-title":"Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation","author":"Z Brakerski","year":"2011","unstructured":"Brakerski, Z., Goldreich, O.: From absolute distinguishability to positive distinguishability. In: Goldreich, O. (ed.) Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation. LNCS, vol. 6650, pp. 141\u2013155. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22670-0_17"},{"key":"4_CR4","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/978-3-031-48618-0_10","volume-title":"TCC 2023, Part II","author":"Y Dodis","year":"2023","unstructured":"Dodis, Y., Halevi, S., Wichs, D.: Security with functional re-encryption from CPA. In: Rothblum, G.N., Wee, H. (eds.) TCC 2023, Part II. LNCS, vol. 14370, pp. 279\u2013305. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-48618-0_10"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-36594-2_1","volume-title":"Theory of Cryptography","author":"Y Dodis","year":"2013","unstructured":"Dodis, Y., Yu, Yu.: Overcoming weak expectations. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 1\u201322. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-36594-2_1"},{"key":"4_CR6","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-031-58723-8_3","volume-title":"EUROCRYPT 2024, Part II","author":"M Manulis","year":"2024","unstructured":"Manulis, M., Nguyen, J.: Fully homomorphic encryption beyond IND-CCA1 security: Integrity through verifiability. In: Joye, M., Leander, G. (eds.) EUROCRYPT 2024, Part II. LNCS, vol. 14652, pp. 63\u201393. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-58723-8_3"},{"key":"4_CR7","doi-asserted-by":"publisher","unstructured":"Nakajima, E., Hara, K., Yamashita, K.: On multi-key FuncCPA secure encryption schemes. In: 2024 1st International Conference on Cryptography and Information Security (VCRIS), pp.\u00a01\u20136 (2024). https:\/\/doi.org\/10.1109\/VCRIS63677.2024.10813389","DOI":"10.1109\/VCRIS63677.2024.10813389"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Nuida, K.: How to handle invalid queries for malicious-private protocols based on homomorphic encryption. In: Proceedings of the 9th ACM on ASIA Public-Key Cryptography Workshop, pp. 15\u201325 (2022)","DOI":"10.1145\/3494105.3526238"}],"container-title":["Lecture Notes in Computer Science","Theory of Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-12293-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T20:28:15Z","timestamp":1764620895000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-12293-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,2]]},"ISBN":["9783032122926","9783032122933"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-12293-3_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,12,2]]},"assertion":[{"value":"2 December 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"TCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Theory of Cryptography Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Aarhus","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"tcc2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/tcc.iacr.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}