{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:37:09Z","timestamp":1725889029343},"publisher-location":"Cham","reference-count":7,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319600796"},{"type":"electronic","value":"9783319600802"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-60080-2_6","type":"book-chapter","created":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T14:40:06Z","timestamp":1496328006000},"page":"86-95","source":"Crossref","is-referenced-by-count":1,"title":["On Pairing Inversion of the Self-bilinear Map on Unknown Order Groups"],"prefix":"10.1007","author":[{"given":"Hyang-Sook","family":"Lee","sequence":"first","affiliation":[]},{"given":"Seongan","family":"Lim","sequence":"additional","affiliation":[]},{"given":"Ikkwon","family":"Yie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,2]]},"reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-319-04873-4_5","volume-title":"Pairing-Based Cryptography \u2013 Pairing 2013","author":"S Chang","year":"2014","unstructured":"Chang, S., Hong, H., Lee, E., Lee, H.-S.: Pairing inversion via non-degenerate auxiliary pairings. In: Cao, Z., Zhang, F. (eds.) Pairing 2013. LNCS, vol. 8365, pp. 77\u201396. Springer, Cham (2014). doi:\n10.1007\/978-3-319-04873-4_5"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Cheon, J.-H., Lee, D.-H.: A note on self-bilinear maps. Bull. KMS 46(2), 303\u2013309 (2009)","DOI":"10.4134\/BKMS.2009.46.2.303"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Galbraith, S., Hess, F., Vercauteren, F.: Aspects of pairing inversion. IEEE Trans. Inf. Theor. 54(12), 5719\u20135728 (2008)","DOI":"10.1109\/TIT.2008.2006431"},{"key":"6_CR4","unstructured":"Hess, F.: Pairings, 3rd Bar-Ilan Winter School on Cryptography (2013). \nhttp:crypto.biu.ac.il"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Kanayama, N., Okamoto, E.: Approach to pairing inversions without solving Miller inversion. IEEE Trans. Inf. Theor. 58(2), 1248\u20131253 (2012)","DOI":"10.1109\/TIT.2011.2173714"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-540-73489-5_18","volume-title":"Pairing-Based Cryptography \u2013 Pairing 2007","author":"T Satoh","year":"2007","unstructured":"Satoh, T.: On pairing inversion problems. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 317\u2013328. Springer, Heidelberg (2007). doi:\n10.1007\/978-3-540-73489-5_18"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-662-44381-1_6","volume-title":"Advances in Cryptology \u2013 CRYPTO 2014","author":"T Yamakawa","year":"2014","unstructured":"Yamakawa, T., Yamada, S., Hanaoka, G., Kunihiro, N.: Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014. LNCS, vol. 8617, pp. 90\u2013107. Springer, Heidelberg (2014). doi:\n10.1007\/978-3-662-44381-1_6"}],"container-title":["Lecture Notes in Computer Science","Cyber Security Cryptography and Machine Learning"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-60080-2_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T14:41:58Z","timestamp":1496328118000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-60080-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319600796","9783319600802"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-60080-2_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}