{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:23:41Z","timestamp":1759638221874},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319124742"},{"type":"electronic","value":"9783319124759"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12475-9_17","type":"book-chapter","created":{"date-parts":[[2014,10,1]],"date-time":"2014-10-01T09:25:19Z","timestamp":1412155519000},"page":"243-258","source":"Crossref","is-referenced-by-count":18,"title":["Efficient (Anonymous) Compact HIBE from Standard Assumptions"],"prefix":"10.1007","author":[{"given":"Somindu C.","family":"Ramanna","sequence":"first","affiliation":[]},{"given":"Palash","family":"Sarkar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/11535218_13","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"M. Abdalla","year":"2005","unstructured":"Abdalla, M., et al.: Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 205\u2013222. Springer, Heidelberg (2005)"},{"key":"17_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1007\/978-3-662-44371-2_23","volume-title":"Advances in Cryptology \u2013 CRYPTO 2014","author":"O. Blazy","year":"2014","unstructured":"Blazy, O., Kiltz, E., Pan, J.: (Hierarchical) identity-based encryption from affine message authentication. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014, Part I. LNCS, vol.\u00a08616, pp. 408\u2013425. Springer, Heidelberg (2014)"},{"key":"17_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1007\/11426639_26","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"D. Boneh","year":"2005","unstructured":"Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 440\u2013456. Springer, Heidelberg (2005)"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Boneh, D., Franklin, M.K.: Identity-based encryption from the Weil pairing. SIAM J. Comput.\u00a032(3), 586\u2013615 (2003), Earlier version appeared in the proceedings of CRYPTO 2001","DOI":"10.1137\/S0097539701398521"},{"key":"17_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/11818175_17","volume-title":"Advances in Cryptology - CRYPTO 2006","author":"X. Boyen","year":"2006","unstructured":"Boyen, X., Waters, B.: Anonymous hierarchical identity-based encryption (without random oracles). In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol.\u00a04117, pp. 290\u2013307. Springer, Heidelberg (2006)"},{"issue":"13","key":"17_CR6","doi-asserted-by":"publisher","first-page":"1311","DOI":"10.1016\/j.dam.2011.04.021","volume":"159","author":"S. Chatterjee","year":"2011","unstructured":"Chatterjee, S., Menezes, A.: On cryptographic protocols employing asymmetric pairings \u2013 the role of \u03c8 revisited. Discrete Applied Mathematics\u00a0159(13), 1311\u20131322 (2011)","journal-title":"Discrete Applied Mathematics"},{"key":"17_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/11927587_26","volume-title":"Information Security and Cryptology \u2013 ICISC 2006","author":"S. Chatterjee","year":"2006","unstructured":"Chatterjee, S., Sarkar, P.: New constructions of constant size ciphertext HIBE without random oracle. In: Rhee, M.S., Lee, B. (eds.) ICISC 2006. LNCS, vol.\u00a04296, pp. 310\u2013327. Springer, Heidelberg (2006)"},{"issue":"10","key":"17_CR8","first-page":"1367","volume":"13","author":"S. Chatterjee","year":"2007","unstructured":"Chatterjee, S., Sarkar, P.: Constant size ciphertext HIBE in the augmented selective-id model and its extensions. J. UCS\u00a013(10), 1367\u20131395 (2007)","journal-title":"J. UCS"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Chen, J., Wee, H.: Fully, (almost) tightly secure IBE and dual system groups (2013), https:\/\/sites.google.com\/site\/jchencrypto\/publications","DOI":"10.1007\/978-3-642-40084-1_25"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Chow, S.S.M.: Removing Escrow from Identity-Based Encryption. In: Jarecki, Tsudik (eds.) [18], pp. 256\u2013276","DOI":"10.1007\/978-3-642-00468-1_15"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/3-540-45325-3_32","volume-title":"Cryptography and Coding","author":"C. Cocks","year":"2001","unstructured":"Cocks, C.: An identity based encryption scheme based on quadratic residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol.\u00a02260, pp. 360\u2013363. Springer, Heidelberg (2001)"},{"key":"17_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/978-3-642-17455-1_22","volume-title":"Pairing-Based Cryptography - Pairing 2010","author":"A. Caro De","year":"2010","unstructured":"De Caro, A., Iovino, V., Persiano, G.: Fully secure anonymous HIBE and secret-key anonymous IBE with short ciphertexts. In: Joye, M., Miyaji, A., Otsuka, A. (eds.) Pairing 2010. LNCS, vol.\u00a06487, pp. 347\u2013366. Springer, Heidelberg (2010)"},{"key":"17_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-11925-5_11","volume-title":"Topics in Cryptology - CT-RSA 2010","author":"L. Ducas","year":"2010","unstructured":"Ducas, L.: Anonymity from asymmetry: New constructions for anonymous HIBE. In: Pieprzyk, J. (ed.) CT-RSA 2010. LNCS, vol.\u00a05985, pp. 148\u2013164. Springer, Heidelberg (2010)"},{"key":"17_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-642-40084-1_8","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"A. Escala","year":"2013","unstructured":"Escala, A., Herold, G., Kiltz, E., R\u00e0fols, C., Villar, J.: An algebraic framework for diffie-hellman assumptions. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol.\u00a08043, pp. 129\u2013147. Springer, Heidelberg (2013)"},{"issue":"16","key":"17_CR15","doi-asserted-by":"publisher","first-page":"3113","DOI":"10.1016\/j.dam.2007.12.010","volume":"156","author":"S.D. Galbraith","year":"2008","unstructured":"Galbraith, S.D., Paterson, K.G., Smart, N.P.: Pairings for cryptographers. Discrete Applied Mathematics\u00a0156(16), 3113\u20133121 (2008)","journal-title":"Discrete Applied Mathematics"},{"key":"17_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1007\/3-540-36178-2_34","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"C. Gentry","year":"2002","unstructured":"Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 548\u2013566. Springer, Heidelberg (2002)"},{"key":"17_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1007\/3-540-46035-7_31","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"J. Horwitz","year":"2002","unstructured":"Horwitz, J., Lynn, B.: Toward hierarchical identity-based encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 466\u2013481. Springer, Heidelberg (2002)"},{"key":"17_CR18","series-title":"Lecture Notes in Computer Science","volume-title":"Public Key Cryptography \u2013 PKC 2009","year":"2009","unstructured":"Jarecki, S., Tsudik, G. (eds.): PKC 2009. LNCS, vol.\u00a05443. Springer, Heidelberg (2009)"},{"key":"17_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-42033-7_1","volume-title":"Advances in Cryptology - ASIACRYPT 2013","author":"C.S. Jutla","year":"2013","unstructured":"Jutla, C.S., Roy, A.: Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part I. LNCS, vol.\u00a08269, pp. 1\u201320. Springer, Heidelberg (2013)"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Lee, K., Park, J., Lee, D.: Anonymous HIBE with short ciphertexts: full security in prime order groups. Designs, Codes and Cryptography, 1\u201331 (2013)","DOI":"10.1007\/s10623-013-9868-6"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Lewko, A.B.: Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting. In: Pointcheval, Johansson [26] (eds.), pp. 318\u2013335","DOI":"10.1007\/978-3-642-29011-4_20"},{"key":"17_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/978-3-642-11799-2_27","volume-title":"Theory of Cryptography","author":"A. Lewko","year":"2010","unstructured":"Lewko, A., Waters, B.: New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol.\u00a05978, pp. 455\u2013479. Springer, Heidelberg (2010)"},{"key":"17_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-642-25513-7_11","volume-title":"Cryptology and Network Security","author":"T. Okamoto","year":"2011","unstructured":"Okamoto, T., Takashima, K.: Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption. In: Lin, D., Tsudik, G., Wang, X. (eds.) CANS 2011. LNCS, vol.\u00a07092, pp. 138\u2013159. Springer, Heidelberg (2011)"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Okamoto, T., Takashima, K.: Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption. In: Pointcheval, Johansson (eds.) [26], pp. 591\u2013608","DOI":"10.1007\/978-3-642-29011-4_35"},{"issue":"4","key":"17_CR25","doi-asserted-by":"publisher","first-page":"2531","DOI":"10.1109\/TIT.2012.2236918","volume":"59","author":"J.H. Park","year":"2013","unstructured":"Park, J.H., Lee, D.H.: Anonymous HIBE: Compact construction over prime-order groups. IEEE Transactions on Information Theory\u00a059(4), 2531\u20132541 (2013)","journal-title":"IEEE Transactions on Information Theory"},{"key":"17_CR26","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2012","year":"2012","unstructured":"Pointcheval, D., Johansson, T. (eds.): EUROCRYPT 2012. LNCS, vol.\u00a07237. Springer, Heidelberg (2012)"},{"key":"17_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1007\/978-3-642-30057-8_18","volume-title":"Public Key Cryptography \u2013 PKC 2012","author":"S.C. Ramanna","year":"2012","unstructured":"Ramanna, S.C., Chatterjee, S., Sarkar, P.: Variants of waters\u2019 dual system primitives using asymmetric pairings - (extended abstract). In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol.\u00a07293, pp. 298\u2013315. Springer, Heidelberg (2012)"},{"key":"17_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-642-45239-0_20","volume-title":"Cryptography and Coding","author":"S.C. Ramanna","year":"2013","unstructured":"Ramanna, S.C., Sarkar, P.: Anonymous constant-size ciphertext HIBE from asymmetric pairings. In: Stam, M. (ed.) IMACC 2013. LNCS, vol.\u00a08308, pp. 344\u2013363. Springer, Heidelberg (2013)"},{"key":"17_CR29","doi-asserted-by":"crossref","unstructured":"Ramanna, S.C., Sarkar, P.: Efficient (anonymous) compact hibe from standard assumptions. Cryptology ePrint Archive, Report 2013\/806 (2013), http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-319-12475-9_17"},{"key":"17_CR30","doi-asserted-by":"crossref","unstructured":"Seo, J.H., Kobayashi, T., Ohkubo, M., Suzuki, K.: Anonymous hierarchical identity-based encryption with constant size ciphertexts. In: Jarecki, Tsudik (eds.) [18], pp. 215\u2013234","DOI":"10.1007\/978-3-642-00468-1_13"},{"key":"17_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"17_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1007\/978-3-540-70583-3_46","volume-title":"Automata, Languages and Programming","author":"E. Shi","year":"2008","unstructured":"Shi, E., Waters, B.: Delegating capabilities in predicate encryption systems. In: Aceto, L., Damg\u00e5rd, I., Goldberg, L.A., Halld\u00f3rsson, M.M., Ing\u00f3lfsd\u00f3ttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol.\u00a05126, pp. 560\u2013578. Springer, Heidelberg (2008)"},{"issue":"4","key":"17_CR33","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1016\/j.dam.2006.07.004","volume":"155","author":"N.P. Smart","year":"2007","unstructured":"Smart, N.P., Vercauteren, F.: On computable isomorphisms in efficient asymmetric pairing-based systems. Discrete Applied Mathematics\u00a0155(4), 538\u2013547 (2007)","journal-title":"Discrete Applied Mathematics"},{"key":"17_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1007\/978-3-642-03356-8_36","volume-title":"Advances in Cryptology - CRYPTO 2009","author":"B. Waters","year":"2009","unstructured":"Waters, B.: Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol.\u00a05677, pp. 619\u2013636. Springer, Heidelberg (2009)"}],"container-title":["Lecture Notes in Computer Science","Provable Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12475-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,18]],"date-time":"2022-04-18T14:22:24Z","timestamp":1650291744000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-12475-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319124742","9783319124759"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12475-9_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}