{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T23:47:10Z","timestamp":1725925630487},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319723587"},{"type":"electronic","value":"9783319723594"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-72359-4_53","type":"book-chapter","created":{"date-parts":[[2017,12,7]],"date-time":"2017-12-07T11:19:11Z","timestamp":1512645551000},"page":"847-859","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["The ECCA Security of Hybrid Encryptions"],"prefix":"10.1007","author":[{"given":"Honglong","family":"Dai","sequence":"first","affiliation":[]},{"given":"Jinyong","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Zhenduo","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Maozhi","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,8]]},"reference":[{"key":"53_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/11426639_8","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"M Abe","year":"2005","unstructured":"Abe, M., Gennaro, R., Kurosawa, K., Shoup, V.: Tag-KEM\/DEM: a new framework for hybrid encryption and a new analysis of kurosawa-desmedt KEM. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 128\u2013146. Springer, Heidelberg (2005). \nhttps:\/\/doi.org\/10.1007\/11426639_8"},{"issue":"1","key":"53_CR2","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/s00145-007-9010-x","volume":"21","author":"M Abe","year":"2008","unstructured":"Abe, M., Gennaro, R., Kurosawa, K., Shoup, V.: Tag-KEM\/DEM: a new frame-work for hybrid encryption. J. Cryptol. 21(1), 97\u2013130 (2008)","journal-title":"J. Cryptol."},{"key":"53_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1007\/978-3-540-45146-4_33","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"R Canetti","year":"2003","unstructured":"Canetti, R., Krawczyk, H., Nielsen, J.B.: Relaxing chosen-ciphertext security. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 565\u2013582. Springer, Heidelberg (2003). \nhttps:\/\/doi.org\/10.1007\/978-3-540-45146-4_33"},{"key":"53_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/978-3-642-54631-0_19","volume-title":"Public-Key Cryptography \u2013 PKC 2014","author":"D Dachman-Soled","year":"2014","unstructured":"Dachman-Soled, D., Fuchsbauer, G., Mohassel, P., O\u2019Neill, A.: Enhanced chosen-ciphertext security and applications. In: Krawczyk, H. (ed.) PKC 2014. LNCS, vol. 8383, pp. 329\u2013344. Springer, Heidelberg (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-642-54631-0_19"},{"key":"53_CR5","unstructured":"Dachman-Soled, D., Fuchsbauer, G., Mohassel, P., O\u2019Neill, A.: Enhanced chosen-ciphertext security and applications. Cryptology ePrint Archive, Report 2012\/543 (2012)"},{"key":"53_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1007\/978-3-540-72540-4_24","volume-title":"Advances in Cryptology - EUROCRYPT 2007","author":"I Damg\u00e5rd","year":"2007","unstructured":"Damg\u00e5rd, I., Thorbek, R.: Non-interactive proofs for integer multiplication. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 412\u2013429. Springer, Heidelberg (2007). \nhttps:\/\/doi.org\/10.1007\/978-3-540-72540-4_24"},{"key":"53_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-540-79263-5_15","volume-title":"Topics in Cryptology \u2013 CT-RSA 2008","author":"I Damg\u00e5rd","year":"2008","unstructured":"Damg\u00e5rd, I., Hofheinz, D., Kiltz, E., Thorbek, R.: Public-key\u00a0encryption\u00a0with non-interactive\u00a0opening. In: Malkin, T. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 239\u2013255. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-79263-5_15"},{"key":"53_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1007\/978-3-642-13190-5_34","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2010","author":"E Kiltz","year":"2010","unstructured":"Kiltz, E., Mohassel, P., O\u2019Neill, A.: Adaptive trapdoor functions and chosen-ciphertext security. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 673\u2013692. Springer, Heidelberg (2010). \nhttps:\/\/doi.org\/10.1007\/978-3-642-13190-5_34"},{"key":"53_CR9","doi-asserted-by":"crossref","unstructured":"Naor, M., Yung, M.: Public-key cryptosystems provably secure against chosen ciphertext attacks. In: STOC 1990, pp. 427\u2013437. ACM, New York (1990)","DOI":"10.1145\/100216.100273"},{"key":"53_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-642-38519-3_8","volume-title":"Information Security and Cryptology","author":"Y Chen","year":"2013","unstructured":"Chen, Y., Dong, Q.: RCCA security for KEM+DEM style hybrid encryptions. In: Kuty\u0142owski, M., Yung, M. (eds.) Inscrypt 2012. LNCS, vol. 7763, pp. 102\u2013121. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-38519-3_8"},{"key":"53_CR11","doi-asserted-by":"crossref","unstructured":"Peikert, C., Waters, B.: Lossy trapdoor functions and their applications. In: STOC 2008, pp. 187\u2013196. ACM, New York (2008)","DOI":"10.1145\/1374376.1374406"},{"key":"53_CR12","unstructured":"Peikert, C., Waters, B.: Lossy trapdoor functions and their applications. Full version of [11]. \nhttp:\/\/www.cc.gatech.edu\/~cpeikert\/pubs\/lossy_tdf.pdf"},{"issue":"1","key":"53_CR13","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1137\/S0097539702403773","volume":"33","author":"R Cramer","year":"2003","unstructured":"Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J. Comput. 33(1), 167\u2013226 (2003)","journal-title":"SIAM J. Comput."},{"key":"53_CR14","unstructured":"Canetti, R., Krawczyk, H., Nielsen, J.: Relaxing chosen ciphertext security (2003). \nhttp:\/\/eprint.iacr.org"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72359-4_53","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,7]],"date-time":"2017-12-07T11:41:04Z","timestamp":1512646864000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72359-4_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319723587","9783319723594"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72359-4_53","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}