{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T18:01:42Z","timestamp":1725904902509},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319612720"},{"type":"electronic","value":"9783319612737"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-61273-7_19","type":"book-chapter","created":{"date-parts":[[2017,7,13]],"date-time":"2017-07-13T11:22:58Z","timestamp":1499944978000},"page":"389-408","source":"Crossref","is-referenced-by-count":0,"title":["CARIBE: Cascaded IBE for Maximum Flexibility and User-Side Control"],"prefix":"10.1007","author":[{"given":"Britta","family":"Hale","sequence":"first","affiliation":[]},{"given":"Christopher","family":"Carr","sequence":"additional","affiliation":[]},{"given":"Danilo","family":"Gligoroski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,14]]},"reference":[{"key":"19_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1007\/978-3-540-40061-5_29","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"SS Al-Riyami","year":"2003","unstructured":"Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452\u2013473. Springer, Heidelberg (2003). doi: 10.1007\/978-3-540-40061-5_29"},{"key":"19_CR2","unstructured":"Aranha, D.F., Gouv\u00eaa, C.P.L.: RELIC is an Efficient LIbrary for Cryptography. http:\/\/code.google.com\/p\/relic-toolkit\/"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/BFb0055718","volume-title":"Advances in Cryptology \u2014 CRYPTO 1998","author":"M Bellare","year":"1998","unstructured":"Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations among notions of security for public-key encryption schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 26\u201345. Springer, Heidelberg (1998). doi: 10.1007\/BFb0055718"},{"key":"19_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/11761679_25","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"M Bellare","year":"2006","unstructured":"Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 409\u2013426. Springer, Heidelberg (2006). doi: 10.1007\/11761679_25"},{"issue":"3","key":"19_CR5","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D Boneh","year":"2003","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. SIAM J. Comput. 32(3), 586\u2013615 (2003)","journal-title":"SIAM J. Comput."},{"issue":"1","key":"19_CR6","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1504\/IJACT.2008.017047","volume":"1","author":"X Boyen","year":"2008","unstructured":"Boyen, X.: A tapestry of identity-based encryption: practical frameworks compared. Int. J. Appl. Cryptogr. 1(1), 3\u201321 (2008)","journal-title":"Int. J. Appl. Cryptogr."},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/11818175_17","volume-title":"Advances in Cryptology - CRYPTO 2006","author":"X Boyen","year":"2006","unstructured":"Boyen, X., Waters, B.: Anonymous hierarchical identity-based encryption (without random oracles). In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 290\u2013307. Springer, Heidelberg (2006). doi: 10.1007\/11818175_17"},{"key":"19_CR8","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4419-9383-0","volume-title":"Identity-Based Encryption","author":"S Chatterjee","year":"2011","unstructured":"Chatterjee, S., Sarkar, P.: Identity-Based Encryption. Springer Science & Business Media, Berlin (2011)"},{"key":"19_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1007\/978-3-642-00468-1_15","volume-title":"Public Key Cryptography \u2013 PKC 2009","author":"SSM Chow","year":"2009","unstructured":"Chow, S.S.M.: Removing escrow from identity-based encryption. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 256\u2013276. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-00468-1_15"},{"key":"19_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"508","DOI":"10.1007\/11745853_33","volume-title":"Public Key Cryptography - PKC 2006","author":"SSM Chow","year":"2006","unstructured":"Chow, S.S.M., Boyd, C., Nieto, J.M.G.: Security-mediated certificateless cryptography. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 508\u2013524. Springer, Heidelberg (2006). doi: 10.1007\/11745853_33"},{"key":"19_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/3-540-45325-3_32","volume-title":"Cryptography and Coding","author":"C Cocks","year":"2001","unstructured":"Cocks, C.: An identity based encryption scheme based on quadratic residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, pp. 360\u2013363. Springer, Heidelberg (2001). doi: 10.1007\/3-540-45325-3_32"},{"issue":"3","key":"19_CR12","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D Boneh","year":"2003","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. SIAM J. Comput. 32(3), 586\u2013615 (2003). Society for Industrial and Applied Mathematics","journal-title":"SIAM J. Comput."},{"key":"19_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/978-3-540-30576-7_11","volume-title":"Theory of Cryptography","author":"Y Dodis","year":"2005","unstructured":"Dodis, Y., Katz, J.: Chosen-ciphertext security of multiple encryption. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 188\u2013209. Springer, Heidelberg (2005). doi: 10.1007\/978-3-540-30576-7_11"},{"key":"19_CR14","unstructured":"Even, S., Goldreich, O.: On the power of cascade ciphers. Technical report no. 275, Computer Science Department, Technion, Haifa, Israel, May 1983"},{"key":"19_CR15","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/978-1-4684-4730-9_4","volume-title":"Advances in Cryptology: Proceedings of CRYPTO 1983","author":"S Even","year":"1984","unstructured":"Even, S., Goldreich, O.: On the power of cascade ciphers. In: Chaum, D. (ed.) Advances in Cryptology: Proceedings of CRYPTO 1983, pp. 43\u201350. Springer US, New York (1984)"},{"key":"19_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-642-10366-7_3","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2009","author":"P Ga\u017ei","year":"2009","unstructured":"Ga\u017ei, P., Maurer, U.: Cascade encryption revisited. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 37\u201351. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-10366-7_3"},{"key":"19_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1007\/3-540-36178-2_34","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 2002","author":"C Gentry","year":"2002","unstructured":"Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548\u2013566. Springer, Heidelberg (2002). doi: 10.1007\/3-540-36178-2_34"},{"key":"19_CR18","unstructured":"Greenwald, G.: XKeyscore: NSA tool collects nearly everything a user does on the internet, 31 July 2013. http:\/\/www.theguardian.com\/world\/2013\/jul\/31\/nsa-top-secret-program-online-data . Accessed 2 June 2015"},{"key":"19_CR19","unstructured":"Greenwald, G., MacAskill, E.: NSA Prism program taps in to user data of Apple, Google and others, 7 June 2013. http:\/\/www.theguardian.com\/world\/2013\/jun\/06\/us-tech-giants-nsa-data . Accessed 2 June 2015"},{"key":"19_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1007\/3-540-46035-7_31","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2002","author":"J Horwitz","year":"2002","unstructured":"Horwitz, J., Lynn, B.: Toward hierarchical identity-based encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 466\u2013481. Springer, Heidelberg (2002). doi: 10.1007\/3-540-46035-7_31"},{"key":"19_CR21","unstructured":"Hurd, W., Lieu, T.W.: Congressman Lieu Letter to FBI Director Comey on Encryption \u201cBackdoor\u201d Proposal, 1 June 2015. https:\/\/lieu.house.gov\/media-center\/ . Accessed 2 June 2015"},{"key":"19_CR22","unstructured":"IACR: IACR Statement on Mass Surveillance: Copenhagen Resolution, 14 May 2014. http:\/\/www.iacr.org\/misc\/statement-May2014.html . Accessed 2 June 2015"},{"key":"19_CR23","unstructured":"Joux, A.: Introduction to Identity-Based Cryptography. Identity- Based Cryptography (2009)"},{"key":"19_CR24","volume-title":"Identity-Based Cryptography","author":"M Joye","year":"2009","unstructured":"Joye, M., Neven, G.: Identity-Based Cryptography, vol. 2. IOS Press, Amsterdam (2009)"},{"key":"19_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/978-3-642-15317-4_27","volume-title":"Security and Cryptography for Networks","author":"A Kate","year":"2010","unstructured":"Kate, A., Goldberg, I.: Distributed private-key generators for identity-based cryptography. In: Garay, J.A., Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 436\u2013453. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-15317-4_27"},{"key":"19_CR26","doi-asserted-by":"crossref","DOI":"10.1201\/b17668","volume-title":"Introduction to Modern Cryptography","author":"J Katz","year":"2014","unstructured":"Katz, J., Lindell, Y.: Introduction to Modern Cryptography. CRC Press, Boca Raton (2014)"},{"issue":"12","key":"19_CR27","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/MC.2011.367","volume":"44","author":"N Leavitt","year":"2011","unstructured":"Leavitt, N.: Internet security under attack: the undermining of digital certificates. Computer 44(12), 17\u201320 (2011)","journal-title":"Computer"},{"key":"19_CR28","doi-asserted-by":"crossref","unstructured":"Lynn, B.: PBC library manual 0.5.11 (2006)","DOI":"10.1016\/j.math.2005.08.001"},{"key":"19_CR29","volume-title":"Modern Cryptography: Theory and Practice","author":"W Mao","year":"2004","unstructured":"Mao, W.: Modern Cryptography: Theory and Practice. Prentice Hall PTR, Upper Saddle River (2004)"},{"issue":"1","key":"19_CR30","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/BF02620231","volume":"6","author":"M Maurer","year":"1993","unstructured":"Maurer, M., Massey, J.: Cascade ciphers: the importance of being first. J. Cryptol. 6(1), 55\u201361 (1993). Springer","journal-title":"J. Cryptol."},{"issue":"2012","key":"19_CR31","first-page":"28","volume":"1","author":"S Nakamoto","year":"2008","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Consulted 1(2012), 28 (2008)","journal-title":"Consulted"},{"key":"19_CR32","unstructured":"National Institute of Standards and Technology. http:\/\/www.nist.gov\/ . Accessed 2 June 2015"},{"key":"19_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/978-3-540-85538-5_23","volume-title":"Pairing-Based Cryptography \u2013 Pairing 2008","author":"KG Paterson","year":"2008","unstructured":"Paterson, K.G., Srinivasan, S.: Security and anonymity of identity-based encryption with multiple trusted authorities. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 354\u2013375. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-85538-5_23"},{"key":"19_CR34","doi-asserted-by":"crossref","unstructured":"Popov, V., Kurepkin, I., Leontiev, S.: RFC 4357: Additional Cryptographic Algorithms for Use with GOST 28147\u201389, GOST R 34.10-94, GOST R 34.10-2001, and GOST R 34.11-94 Algorithms, January 2006","DOI":"10.17487\/rfc4357"},{"key":"19_CR35","unstructured":"Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing. In: The 2000 Symposium on Cryptography and Information Security, Okinawa, Japan, pp. 135\u2013148 (2000)"},{"key":"19_CR36","unstructured":"Scott, M.; MIRACL - Multiprecision Integer and Rational Arithmetic C\/C++ Library (2007)"},{"key":"19_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47\u201353. Springer, Heidelberg (1985). doi: 10.1007\/3-540-39568-7_5"},{"key":"19_CR38","unstructured":"Stein, W., Joyner, D.; Sage: system for algebra and geometry experimentation. Commun. Comput. Algebra (SIGSAM Bull.) (2005). http:\/\/sage.sourceforge.net"},{"key":"19_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-642-19571-6_3","volume-title":"Theory of Cryptography","author":"S Tessaro","year":"2011","unstructured":"Tessaro, S.: Security amplification for the cascade of arbitrarily weak PRPs: tight bounds via the interactive hardcore lemma. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 37\u201354. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-19571-6_3"},{"key":"19_CR40","unstructured":"The PARI Group: Bordeaux. PARI\/GP version 2.7.0 (2014). http:\/\/pari.math.u-bordeaux.fr\/"},{"key":"19_CR41","unstructured":"Whitten, A., Tygar, J.D.: Why Johnny can\u2019t encrypt: a usability evaluation of PGP 5.0. In: Usenix Security, vol. 1999 (1999)"},{"key":"19_CR42","doi-asserted-by":"crossref","unstructured":"Yao, D., Fazio, N., Dodis, Y., Lysyanskaya, A.: ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. In: Proceedings of the 11th ACM conference on Computer and communications security, pp. 354\u2013363. ACM (2004)","DOI":"10.1145\/1030083.1030130"},{"issue":"4","key":"19_CR43","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/s10207-010-0110-5","volume":"9","author":"TH Yuen","year":"2010","unstructured":"Yuen, T.H., Susilo, W., Mu, Y.: How to construct identity-based signatures without the key escrow problem. Int. J. Inf. Secur. 9(4), 297\u2013311 (2010)","journal-title":"Int. J. Inf. Secur."}],"container-title":["Lecture Notes in Computer Science","Paradigms in Cryptology \u2013 Mycrypt 2016. Malicious and Exploratory Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61273-7_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,12]],"date-time":"2020-10-12T05:59:00Z","timestamp":1602482340000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61273-7_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319612720","9783319612737"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61273-7_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}