{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T21:22:55Z","timestamp":1751923375983},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540245735"},{"type":"electronic","value":"9783540305767"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-30576-7_10","type":"book-chapter","created":{"date-parts":[[2010,7,4]],"date-time":"2010-07-04T19:03:26Z","timestamp":1278270206000},"page":"169-187","source":"Crossref","is-referenced-by-count":28,"title":["Adaptive Security of Symbolic Encryption"],"prefix":"10.1007","author":[{"given":"Daniele","family":"Micciancio","sequence":"first","affiliation":[]},{"given":"Saurabh","family":"Panjwani","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/3-540-45500-0_4","volume-title":"Theoretical Aspects of Computer Software","author":"M. Abadi","year":"2001","unstructured":"Abadi, M., J\u00fcrjens, J.: Formal eavesdropping and its computational interpretation. In: Kobayashi, N., Pierce, B.C. (eds.) TACS 2001. LNCS, vol.\u00a02215, pp. 82\u201394. Springer, Heidelberg (2001)"},{"issue":"2","key":"10_CR2","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/s00145-001-0014-7","volume":"15","author":"M. Abadi","year":"2002","unstructured":"Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology\u00a015(2), 103\u2013127 (2002)","journal-title":"Journal of Cryptology"},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1109\/CSFW.2004.1310742","volume-title":"Proceedings of the 17th IEEE computer security foundations Workshop","author":"M. Backes","year":"2004","unstructured":"Backes, M., Pfitzmann, B.: Symmetric encryption in a simulatable Dolev-Yao style cryptographic library. In: Proceedings of the 17th IEEE computer security foundations Workshop, Pacific Grove, CA, USA, June 2004, pp. 204\u2013218. IEEE Computer Society, Los Alamitos (2004)"},{"key":"10_CR4","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1145\/948109.948140","volume-title":"Proceedings of the 10th ACM conference on computer and communications security - CCS 2003","author":"M. Backes","year":"2003","unstructured":"Backes, M., Pfitzmann, B., Waidner, M.: A Composable Cryptographic Library with Nested Operations. In: Proceedings of the 10th ACM conference on computer and communications security - CCS 2003, Washington, DC, USA, October 2003, pp. 220\u2013230. ACM, New York (2003)"},{"key":"10_CR5","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1145\/237814.238015","volume-title":"Proceedings of the twenty-eighth annual ACM symposium on the theory of computing - STOC 1996","author":"R. Canetti","year":"1996","unstructured":"Canetti, R., Feige, U., Goldreich, O., Naor, M.: Adaptively Secure Multiparty Computation. In: Proceedings of the twenty-eighth annual ACM symposium on the theory of computing - STOC 1996, Philadelphia, Pennsylvania, USA, May 1996, pp. 639\u2013648. ACM, New York (1996)"},{"key":"10_CR6","first-page":"708","volume-title":"INFOCOM 1999. Proceedings of the Eighteenth Annual Joint conference of the IEEE computer and communications societies","author":"R. Canetti","year":"1999","unstructured":"Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: A taxonomy and some efficient constructions. In: INFOCOM 1999. Proceedings of the Eighteenth Annual Joint conference of the IEEE computer and communications societies, New York, NY, March 1999, vol.\u00a02, pp. 708\u2013716. IEEE, Los Alamitos (1999)"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1007\/3-540-48910-X_32","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"R. Canetti","year":"1999","unstructured":"Canetti, R., Malkin, T., Nissim, K.: Efficient communication-storage tradeoffs for multicast encryption. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, p. 459. Springer, Heidelberg (1999)"},{"issue":"2","key":"10_CR8","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1137\/S0097539795291562","volume":"30","author":"D. Dolev","year":"2000","unstructured":"Dolev, D., Dwork, C., Naor, M.: Nonmalleable Cyptography. SIAM Journal on Computing\u00a030(2), 391\u2013437 (2000); Preliminary version in STOC 1991","journal-title":"SIAM Journal on Computing"},{"issue":"6","key":"10_CR9","doi-asserted-by":"publisher","first-page":"852","DOI":"10.1145\/950620.950623","volume":"50","author":"C. Dwork","year":"2003","unstructured":"Dwork, C., Naor, M., Reingold, O., Stockmeyer, L.: Magic Functions. Journal of the ACM\u00a050(6), 852\u2013921 (2003)","journal-title":"Journal of the ACM"},{"key":"10_CR10","series-title":"Lecture Notes in Computer Science","first-page":"530","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"V. Gligor","year":"2003","unstructured":"Gligor, V., Horvitz, D.O.: Weak Key Authenticity and the Computational Completeness of Formal Encryption. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 530\u2013547. Springer, Heidelberg (2003)"},{"issue":"2","key":"10_CR11","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"Goldwasser, S., Micali, S.: Probabilistic encryption. Journal of Computer and System Sience\u00a028(2), 270\u2013299 (1984); Preliminary version in Proc. of STOC 1982","journal-title":"Journal of Computer and System Sience"},{"key":"10_CR12","unstructured":"Herzog, J.C.: Computational Soundness for Standard Assumptions of Formal Cryptography. PhD thesis, Massachusetts Institute of Technology, Boston, USA (2004)"},{"key":"10_CR13","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1109\/SFCS.2003.1238211","volume-title":"Proceedings of the 44rd annual symposium on foundations of computer science - FOCS 2003","author":"R. Impagliazzo","year":"2003","unstructured":"Impagliazzo, R., Kapron, B.: Logics for Reasoning about Cryptographic Constructions. In: Proceedings of the 44rd annual symposium on foundations of computer science - FOCS 2003, Cambridge, MA, USA, November 2003, pp. 372\u2013383. IEEE, Los Alamitos (2003)"},{"key":"10_CR14","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1109\/SECPRI.2004.1301316","volume-title":"IEEE symposium on security and Privacy","author":"P. Laud","year":"2004","unstructured":"Laud, P.: Symmetric Encryption in Automatic Analyses for Confidentiality against Active Adversaries. In: IEEE symposium on security and Privacy, Berkeley, CA, USA, May 2004, pp. 71\u201385. IEEE Computer Society, Los Alamitos (2004)"},{"key":"10_CR15","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1145\/288090.288117","volume-title":"Proceedings of the fifth ACM conference on computer and communications security - CCS 1998","author":"P.D. Lincoln","year":"1998","unstructured":"Lincoln, P.D., Mitchell, J.C., Mitchell, M., Scedrov, A.: A probabilistic poly-time framework for protocol analysis. In: Proceedings of the fifth ACM conference on computer and communications security - CCS 1998, San Francisco, California, USA, November 1998, pp. 112\u2013121. ACM, New York (1998)"},{"key":"10_CR16","unstructured":"Micciancio, D.: Towards Computationally Sound Symbolic Security Analysis (June 2004), Tutorial. Slides available at http:\/\/dimacs.rutgers.edu\/Workshops\/Protocols\/slides\/micciancio.pdf"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Micciancio, D., Panjwani, S.: Adaptive Security of Symbolic Encryption (November 2004), Full version of this paper. Available from http:\/\/www-cse.ucsd.edu\/users\/spanjwan\/papers.html","DOI":"10.1007\/978-3-540-30576-7_10"},{"key":"10_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-540-24676-3_10","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D. Micciancio","year":"2004","unstructured":"Micciancio, D., Panjwani, S.: Optimal communication complexity of generic multicast key distributio. In: Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 153\u2013170. Springer, Heidelberg (2004)"},{"issue":"1","key":"10_CR19","doi-asserted-by":"crossref","first-page":"99","DOI":"10.3233\/JCS-2004-12105","volume":"12","author":"D. Micciancio","year":"2004","unstructured":"Micciancio, D., Warinschi, B.: Completeness theorems for the abadi-rogaway logic of encrypted expressions. Journal of Computer Security\u00a012(1), 99\u2013129 (2004); Preliminary version in WITS 2002","journal-title":"Journal of Computer Security"},{"key":"10_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-540-24638-1_8","volume-title":"Theory of Cryptography","author":"D. Micciancio","year":"2004","unstructured":"Micciancio, D., Warinschi, B.: Soundness of Formal Encryption in the presence of Active Adversaries. In: Naor, M. (ed.) TCC 2004. LNCS, vol.\u00a02951, pp. 133\u2013151. Springer, Heidelberg (2004)"},{"key":"10_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1007\/3-540-46766-1_35","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"C. Rackoff","year":"1992","unstructured":"Rackoff, C., Simon, D.R.: Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 433\u2013444. Springer, Heidelberg (1992)"},{"issue":"3","key":"10_CR22","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1145\/937503.937506","volume":"35","author":"S. Rafaeli","year":"2003","unstructured":"Rafaeli, S., Hutchinson, D.: A survey of key management for secure group communication. ACM Computing Surveys\u00a035(3), 309\u2013329 (2003)","journal-title":"ACM Computing Surveys"},{"issue":"1","key":"10_CR23","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/90.836475","volume":"8","author":"C.K. Wong","year":"2000","unstructured":"Wong, C.K., Gouda, M., Lam, S.S.: Secure group communications using key graphs. IEEE\/ACM Transactions on Networking\u00a08(1), 16\u201330 (2000); Preliminary version in SIGCOMM 1998","journal-title":"IEEE\/ACM Transactions on Networking"}],"container-title":["Lecture Notes in Computer Science","Theory of Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30576-7_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:23:47Z","timestamp":1605759827000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30576-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540245735","9783540305767"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30576-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}