{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:48:57Z","timestamp":1740098937536,"version":"3.37.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319686363"},{"type":"electronic","value":"9783319686370"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68637-0_20","type":"book-chapter","created":{"date-parts":[[2017,10,16]],"date-time":"2017-10-16T10:07:56Z","timestamp":1508148476000},"page":"329-348","source":"Crossref","is-referenced-by-count":8,"title":["Provable Secure Constructions for Broadcast Encryption with Personalized Messages"],"prefix":"10.1007","author":[{"given":"Kamalesh","family":"Acharya","sequence":"first","affiliation":[]},{"given":"Ratna","family":"Dutta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,17]]},"reference":[{"key":"20_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-319-47422-9_16","volume-title":"Provable Security","author":"K Acharya","year":"2016","unstructured":"Acharya, K., Dutta, R.: Secure and efficient construction of broadcast encryption with dealership. In: Chen, L., Han, J. (eds.) ProvSec 2016. LNCS, vol. 10005, pp. 277\u2013295. Springer, Cham (2016). doi: 10.1007\/978-3-319-47422-9_16"},{"key":"20_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-319-53177-9_8","volume-title":"Information Security and Cryptology \u2013 ICISC 2016","author":"K Acharya","year":"2017","unstructured":"Acharya, K., Dutta, R.: Adaptively secure broadcast encryption with dealership. In: Hong, S., Park, J.H. (eds.) ICISC 2016. LNCS, vol. 10157, pp. 161\u2013177. Springer, Cham (2017). doi: 10.1007\/978-3-319-53177-9_8"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Acharya, K., Dutta, R.: Adaptively secure recipient revocable broadcast encryption with constant size ciphertext. IACR Cryptology ePrint Archive, 2017:59 (2017)","DOI":"10.1007\/978-3-319-78556-1_11"},{"key":"20_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/11535218_16","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"D Boneh","year":"2005","unstructured":"Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258\u2013275. Springer, Heidelberg (2005). doi: 10.1007\/11535218_16"},{"key":"20_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/978-3-662-44371-2_12","volume-title":"Advances in Cryptology \u2013 CRYPTO 2014","author":"D Boneh","year":"2014","unstructured":"Boneh, D., Waters, B., Zhandry, M.: Low overhead broadcast encryption from multilinear maps. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014. LNCS, vol. 8616, pp. 206\u2013223. Springer, Heidelberg (2014). doi: 10.1007\/978-3-662-44371-2_12"},{"key":"20_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1007\/3-540-48329-2_40","volume-title":"Advances in Cryptology \u2014 CRYPTO 1993","author":"A Fiat","year":"1994","unstructured":"Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480\u2013491. Springer, Heidelberg (1994). doi: 10.1007\/3-540-48329-2_40"},{"key":"20_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-642-01001-9_10","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"C Gentry","year":"2009","unstructured":"Gentry, C., Waters, B.: Adaptive security in broadcast encryption systems (with short ciphertexts). In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 171\u2013188. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-01001-9_10"},{"key":"20_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-642-02620-1_21","volume-title":"Information Security and Privacy","author":"H Hiwatari","year":"2009","unstructured":"Hiwatari, H., Tanaka, K., Asano, T., Sakumoto, K.: Multi-recipient public-key encryption from simulators in security proofs. In: Boyd, C., Gonz\u00e1lez Nieto, J. (eds.) ACISP 2009. LNCS, vol. 5594, pp. 293\u2013308. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-02620-1_21"},{"key":"20_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/3-540-45664-3_4","volume-title":"Public Key Cryptography","author":"K Kurosawa","year":"2002","unstructured":"Kurosawa, K.: Multi-recipient public-key encryption with shortened ciphertext. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 48\u201363. Springer, Heidelberg (2002). doi: 10.1007\/3-540-45664-3_4"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Lewko, A., Sahai, A., Waters, B.: Revocation systems with very small private keys. In: IEEE Symposium on Security and Privacy (SP), pp. 273\u2013285 (2010)","DOI":"10.1109\/SP.2010.23"},{"key":"20_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-642-16280-0_15","volume-title":"Provable Security","author":"G Ohtake","year":"2010","unstructured":"Ohtake, G., Hanaoka, G., Ogawa, K.: Efficient broadcast encryption with personalized messages. In: Heng, S.-H., Kurosawa, K. (eds.) ProvSec 2010. LNCS, vol. 6402, pp. 214\u2013228. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-16280-0_15"},{"issue":"4","key":"20_CR12","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/s10207-013-0190-0","volume":"12","author":"DH Phan","year":"2013","unstructured":"Phan, D.H., Pointcheval, D., Shahandashti, S., Strefler, M.: Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts. Int. J. Inf. Secur. 12(4), 251\u2013265 (2013)","journal-title":"Int. J. Inf. Secur."},{"issue":"12","key":"20_CR13","doi-asserted-by":"crossref","first-page":"e0143975","DOI":"10.1371\/journal.pone.0143975","volume":"10","author":"K Xu","year":"2015","unstructured":"Xu, K., Liao, Y., Qiao, L., Liu, Z., Yang, X.: An identity-based (IDB) broadcast encryption scheme with personalized messages (BEPM). PloS One 10(12), e0143975 (2015)","journal-title":"PloS One"},{"issue":"18","key":"20_CR14","doi-asserted-by":"crossref","first-page":"4191","DOI":"10.1002\/sec.1334","volume":"8","author":"Z Yang","year":"2015","unstructured":"Yang, Z.: On constructing practical multi-recipient keyencapsulation with short ciphertext and public key. Secur. Commun. Netw. 8(18), 4191\u20134202 (2015)","journal-title":"Secur. Commun. Netw."}],"container-title":["Lecture Notes in Computer Science","Provable Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68637-0_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T23:24:27Z","timestamp":1603149867000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68637-0_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319686363","9783319686370"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68637-0_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}