{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:44:20Z","timestamp":1725799460182},"publisher-location":"Cham","reference-count":6,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319108780"},{"type":"electronic","value":"9783319108797"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-10879-7_34","type":"book-chapter","created":{"date-parts":[[2014,8,21]],"date-time":"2014-08-21T01:19:04Z","timestamp":1408583944000},"page":"598-607","source":"Crossref","is-referenced-by-count":0,"title":["Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption"],"prefix":"10.1007","author":[{"given":"David","family":"Naccache","sequence":"first","affiliation":[]},{"given":"Rainer","family":"Steinwandt","sequence":"additional","affiliation":[]},{"given":"Adriana","family":"Su\u00e1rez Corona","sequence":"additional","affiliation":[]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1007\/978-3-642-11799-2_28","volume-title":"Theory of Cryptography","author":"M. Abdalla","year":"2010","unstructured":"Abdalla, M., Bellare, M., Neven, G.: Robust encryption. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol.\u00a05978, pp. 480\u2013497. Springer, Heidelberg (2010), http:\/\/eprint.iacr.org\/2008\/440"},{"key":"34_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-642-30057-8_14","volume-title":"Public Key Cryptography \u2013 PKC 2012","author":"N. Fazio","year":"2012","unstructured":"Fazio, N., Perera, I.M.: Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol.\u00a07293, pp. 225\u2013242. Springer, Heidelberg (2012), http:\/\/eprint.iacr.org\/2012\/129"},{"key":"34_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/978-3-642-30057-8_13","volume-title":"Public Key Cryptography \u2013 PKC 2012","author":"B. Libert","year":"2012","unstructured":"Libert, B., Paterson, K.G., Quaglia, E.A.: Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol.\u00a07293, pp. 206\u2013224. Springer, Heidelberg (2012), http:\/\/eprint.iacr.org\/2011\/476"},{"key":"34_CR4","unstructured":"Naccache, D., Steinwandt, R., Yung, M.: Reverse Public Key Encryption. In: BIOSIG 2009 Proceedings. Lecture Notes in Informatics, pp. 155\u2013169. GI, Springer (2009)"},{"key":"34_CR5","doi-asserted-by":"crossref","unstructured":"Overbeck, R., Sendrier, N.: Code-based cryptography. In: Post-Quantum Cryptography, pp. 95\u2013145. Springer (2009)","DOI":"10.1007\/978-3-540-88702-7_4"},{"key":"34_CR6","doi-asserted-by":"crossref","unstructured":"Naccache, D.: Reverse Public Key Encryption. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, 2nd edn., p. 1044. Springer (2011)","DOI":"10.1007\/978-1-4419-5906-5_895"}],"container-title":["Lecture Notes in Computer Science","Security and Cryptography for Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10879-7_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T14:45:17Z","timestamp":1598193917000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-10879-7_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319108780","9783319108797"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10879-7_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}