{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:27:31Z","timestamp":1725888451081},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319594620"},{"type":"electronic","value":"9783319594637"}],"license":[{"start":{"date-parts":[[2017,5,28]],"date-time":"2017-05-28T00:00:00Z","timestamp":1495929600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-59463-7_35","type":"book-chapter","created":{"date-parts":[[2017,5,26]],"date-time":"2017-05-26T22:26:44Z","timestamp":1495837604000},"page":"349-357","source":"Crossref","is-referenced-by-count":0,"title":["Key Encapsulation Mechanism from Multilinear Maps"],"prefix":"10.1007","author":[{"given":"Liqun","family":"Lv","sequence":"first","affiliation":[]},{"given":"Wenjun","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Xiaoyuan","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xuan","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,28]]},"reference":[{"key":"35_CR1","volume-title":"Advances in Cryptology","author":"A Shamir","year":"1984","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) Advances in Cryptology. Springer, Heidelberg (1984). Lecture Notes in Computer Science, 21(2)"},{"issue":"1","key":"35_CR2","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1137\/S0097539702403773","volume":"33","author":"R Cramer","year":"2004","unstructured":"Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J. Comput. 33(1), 167\u2013226 (2004)","journal-title":"SIAM J. Comput."},{"issue":"2","key":"35_CR3","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1007\/s00145-007-9000-z","volume":"21","author":"K Bentahar","year":"2008","unstructured":"Bentahar, K., Farshim, P., Malone-Lee, J., Smart, N.P.: Generic constructions of identity-based and certificateless kems. J. Cryptology 21(2), 178\u2013199 (2008)","journal-title":"J. Cryptology"},{"issue":"5","key":"35_CR4","doi-asserted-by":"crossref","first-page":"1301","DOI":"10.1137\/S009753970544713X","volume":"36","author":"C Ran","year":"2007","unstructured":"Ran, C., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. SIAM J. Comput. 36(5), 1301\u20131328 (2007)","journal-title":"SIAM J. Comput."},{"key":"35_CR5","volume-title":"Topics in Cryptology","author":"D Boneh","year":"2005","unstructured":"Boneh, D., Katz, J.: Improved efficiency for CCA-secure cryptosystems built using identity-based encryption. In: Menezes, A. (ed.) Topics in Cryptology, vol. 261. Springer, Heidelberg (2005)"},{"key":"35_CR6","doi-asserted-by":"crossref","unstructured":"Boyen, X., Mei, Q., Waters, B.: Direct chosen ciphertext security from identity-based techniques. In: ACM Conference on Computer and Communications Security, pp. 320\u2013329 (2005)","DOI":"10.1145\/1102120.1102162"},{"issue":"1","key":"35_CR7","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1049\/ip-ifs:20055070","volume":"153","author":"Z Cheng","year":"2006","unstructured":"Cheng, Z., Malonelee, J., Chen, L., Smart, N.P.: Efficient id-kem based on the sakai\u2013kasahara key construction. Inf. Secur. IEE Proc. 153(1), 19\u201326 (2006)","journal-title":"Inf. Secur. IEE Proc."},{"key":"35_CR8","doi-asserted-by":"crossref","unstructured":"Kiltz, E., Galindo, D.: Direct chosen-ciphertext secure identity-based key encapsulation without random oracles. In: Australasian Conference on Information Security and Privacy, pp. 336\u2013347 (2006)","DOI":"10.1007\/11780656_28"},{"issue":"7","key":"35_CR9","doi-asserted-by":"crossref","first-page":"1167","DOI":"10.1016\/j.ins.2009.12.008","volume":"180","author":"Y Long","year":"2010","unstructured":"Long, Y., Chen, K.: Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism. Inf. Sci. 180(7), 1167\u20131181 (2010)","journal-title":"Inf. Sci."},{"key":"35_CR10","doi-asserted-by":"crossref","unstructured":"Lippold, G., Boyd, C., Nieto, J.M.G.: Efficient certificateless KEM in the standard model. In: International Conference on Information Security and Cryptology, 34\u201346 (2009)","DOI":"10.1007\/978-3-642-14423-3_3"},{"issue":"3","key":"35_CR11","doi-asserted-by":"crossref","first-page":"421","DOI":"10.3233\/JCS-2009-0366","volume":"18","author":"J Li","year":"2010","unstructured":"Li, J., Huang, X., Mu, Y., Susilo, W., Wu, Q.: Constructions of certificate-based signature secure against key replacement attacks. J. Comput. Secur. 18(3), 421\u2013449 (2010)","journal-title":"J. Comput. Secur."},{"key":"35_CR12","doi-asserted-by":"crossref","unstructured":"Li, J., Huang, X., Mu, Y., Susilo, W., Wu, Q.: Certificate-based signature: security model and efficient construction. In: Public Key Infrastructure, European Pki Workshop: Theory and Practice, Europki 2007, pp. 110\u2013125 (2007)","DOI":"10.1007\/978-3-540-73408-6_8"},{"issue":"2","key":"35_CR13","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1016\/j.jss.2011.08.014","volume":"85","author":"J Li","year":"2012","unstructured":"Li, J., Huang, X., Zhang, Y., Xu, L.: An efficient short certificate-based signature scheme. J. Syst. Softw. 85(2), 314\u2013322 (2012)","journal-title":"J. Syst. Softw."},{"issue":"6","key":"35_CR14","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1007\/s11595-014-0949-9","volume":"2014","author":"M Zhang","year":"2014","unstructured":"Zhang, M., Zhang, T., Wang, X.: Publicly Verifiable Encryption in Multilinear Maps[J]. J. Wuhan Univ. Nat. Sci. Ed. 2014(6), 507\u2013512 (2014)","journal-title":"J. Wuhan Univ. Nat. Sci. Ed."},{"key":"35_CR15","doi-asserted-by":"crossref","unstructured":"Wang, H., Wu, L., Zheng, Z., Wang, Y.: Identity-based key-encapsulation mechanism from multilinear maps. IACR Cryptology ePrint Archive 2013\/836","DOI":"10.1109\/CIS.2014.112"},{"issue":"2","key":"35_CR16","doi-asserted-by":"crossref","first-page":"72","DOI":"10.4018\/IJTHI.2016040106","volume":"12","author":"Z Wei","year":"2016","unstructured":"Wei, Z.: A Pairing-based homomorphic encryption scheme for multi-user settings. Int. J. Technol. Hum. Interact. (IJTHI) 12(2), 72\u201382 (2016)","journal-title":"Int. J. Technol. Hum. Interact. (IJTHI)"},{"issue":"1","key":"35_CR17","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1504\/IJGUC.2014.058246","volume":"5","author":"Y Chen","year":"2014","unstructured":"Chen, Y., Chen, X., Li, H.: More dcca-secure public-key encryptions from KEM\u00a0+\u00a0DEM style hybrid paradigms and some observations on the \u2018inner-outer\u2019 structure. Int. J. Grid Util. Comput. 5(1), 60\u201370 (2014)","journal-title":"Int. J. Grid Util. Comput."},{"issue":"2\/3","key":"35_CR18","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1504\/IJGUC.2013.056255","volume":"4","author":"S Li","year":"2013","unstructured":"Li, S., Zhang, F.: Leakage-resilient identity-based encryption scheme. Int. J. Grid Util. Comput. 4(2\/3), 187\u2013196 (2013)","journal-title":"Int. J. Grid Util. Comput."},{"issue":"3","key":"35_CR19","doi-asserted-by":"crossref","first-page":"82","DOI":"10.4018\/IJITWE.2015070106","volume":"10","author":"H Chen","year":"2015","unstructured":"Chen, H., Hu, Y., Lian, Z., Jia, H., Wang, X.A.: An additively homomorphic encryption over large message space. Int. J. Inf. Technol. Web. Eng. 10(3), 82\u2013102 (2015)","journal-title":"Int. J. Inf. Technol. Web. Eng."},{"issue":"2","key":"35_CR20","doi-asserted-by":"crossref","first-page":"83","DOI":"10.4018\/IJTHI.2016040107","volume":"12","author":"J Ma","year":"2016","unstructured":"Ma, J., Zhang, Y., Wang, Z., Yu, K.: A message topic model for multi-grain SMS spam filtering. Int. J. Technol. Hum. Interact. (IJTHI) 12(2), 83\u201395 (2016)","journal-title":"Int. J. Technol. Hum. Interact. (IJTHI)"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Internetworking, Data &amp; Web Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59463-7_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T01:20:18Z","timestamp":1569374418000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59463-7_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,28]]},"ISBN":["9783319594620","9783319594637"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59463-7_35","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2017,5,28]]}}}