{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T07:53:04Z","timestamp":1769932384125,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642174544","type":"print"},{"value":"9783642174551","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17455-1_15","type":"book-chapter","created":{"date-parts":[[2010,11,17]],"date-time":"2010-11-17T10:31:49Z","timestamp":1289989909000},"page":"225-245","source":"Crossref","is-referenced-by-count":13,"title":["Efficient Generic Constructions of Timed-Release Encryption with Pre-open Capability"],"prefix":"10.1007","author":[{"given":"Takahiro","family":"Matsuda","sequence":"first","affiliation":[]},{"given":"Yasumasa","family":"Nakai","sequence":"additional","affiliation":[]},{"given":"Kanta","family":"Matsuura","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/3-540-45353-9_12","volume-title":"Topics in Cryptology - CT-RSA 2001","author":"M. Abdalla","year":"2001","unstructured":"Abdalla, M., Bellare, M., Rogaway, P.: The oracle Diffie-Hellman assumptions and an analysis of DHIES. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol.\u00a02020, pp. 143\u2013158. Springer, Heidelberg (2001)"},{"issue":"3","key":"15_CR2","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/s10623-009-9320-0","volume":"54","author":"M. Abe","year":"2010","unstructured":"Abe, M., Cui, Y., Imai, H., Kiltz, E.: Efficient hybrid encryption from ID-based encryption. Designs, Codes and Cryptography\u00a054(3), 205\u2013240 (2010)","journal-title":"Designs, Codes and Cryptography"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/11780656_30","volume-title":"Information Security and Privacy","author":"M. Abe","year":"2006","unstructured":"Abe, M., Cui, Y., Imai, H., Kurosawa, K.: Tag-KEM from set partial domain one-way permutations. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol.\u00a04058, pp. 360\u2013370. Springer, Heidelberg (2006)"},{"issue":"1","key":"15_CR4","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/s00145-007-9010-x","volume":"21","author":"M. Abe","year":"2008","unstructured":"Abe, M., Gennaro, R., Kurosawa, K.: Tag-KEM\/DEM: A new framework for hybrid encryption. J. of Cryptology\u00a021(1), 97\u2013130 (2008)","journal-title":"J. of Cryptology"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Abe, M., Kiltz, E., Okamoto, T.: Compact CCA-secure encryption for messages of arbitrary length. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol.\u00a05443, pp. 377\u2013392. Springer, Heidelberg (2009)","DOI":"10.1007\/978-3-642-00468-1_21"},{"key":"15_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1007\/978-3-540-40061-5_29","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"S. Al-Riyami","year":"2003","unstructured":"Al-Riyami, S., Paterson, K.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol.\u00a02894, pp. 452\u2013473. Springer, Heidelberg (2003)"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/3-540-46035-7_6","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"J.H. An","year":"2002","unstructured":"An, J.H., Dodis, Y., Rabin, T.: On the security of joint signature and encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 83\u2013107. Springer, Heidelberg (2002)"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Boldyreva, A., Gentry, C., O\u2019Neill, A., Yum, D.H.: Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing. In: CCS 2007, pp. 276\u2013285 (2007)","DOI":"10.1145\/1315245.1315280"},{"issue":"3","key":"15_CR9","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D. Boneh","year":"2003","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. SIAM J. Computing\u00a032(3), 585\u2013615 (2003)","journal-title":"SIAM J. Computing"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Boyen, X., Mei, Q., Waters, B.: Direct chosen ciphertext security from identity-based techniques. Updated version of [11]. Cryptology ePrint Archive: Report 2005\/288 (2005), http:\/\/eprint.iacr.org\/2005\/288\/","DOI":"10.1145\/1102120.1102162"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Boyen, X., Mei, Q., Waters, B.: Direct chosen ciphertext security from identity-based techniques. In: CCS 2005, pp. 320\u2013329 (2005)","DOI":"10.1145\/1102120.1102162"},{"key":"15_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/11602897_25","volume-title":"Information and Communications Security","author":"J. Cathalo","year":"2005","unstructured":"Cathalo, J., Libert, B., Quisquater, J.-J.: Efficient and non-interactive timed-release encryption. In: Qing, S., Mao, W., L\u00f3pez, J., Wang, G. (eds.) ICICS 2005. LNCS, vol.\u00a03783, pp. 291\u2013303. Springer, Heidelberg (2005)"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Chan, A.C.-F., Blake, I.F.: Scalable, server-passive, user-anonymous timed release cryptography. In: ICDCS 2005, pp. 504\u2013513 (2005)","DOI":"10.1109\/ICDCS.2005.72"},{"issue":"1","key":"15_CR14","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1049\/ip-ifs:20055070","volume":"153","author":"L. Chen","year":"2006","unstructured":"Chen, L., Cheng, Z., Malone-Lee, J., Smart, N.P.: Efficient ID-KEM based on the Sakai-Kasahara key construction. IEE Proceedings - Information Security\u00a0153(1), 19\u201326 (2006)","journal-title":"IEE Proceedings - Information Security"},{"key":"15_CR15","unstructured":"Cheon, J.H., Hopper, N., Kim, Y., Osipkov, I.: Timed-release and key-insulated public key encryption. Cryptology ePrint Archive: Report 2004\/231 (2004), http:\/\/eprint.iacr.org\/2004\/231\/"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Cheon, J.H., Hopper, N., Kim, Y., Osipkov, I.: Provably secure timed-release public key encryption. ACM Trans. Inf. Syst. Secur.\u00a011(2) (2008)","DOI":"10.1145\/1330332.1330336"},{"key":"15_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-540-85855-3_9","volume-title":"Security and Cryptography for Networks","author":"S.S.M. Chow","year":"2008","unstructured":"Chow, S.S.M., Roth, V., Rieffel, E.G.: General certificateless encryption and timed-release encryption. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol.\u00a05229, pp. 126\u2013143. Springer, Heidelberg (2008)"},{"key":"15_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/978-3-540-88733-1_3","volume-title":"Provable Security","author":"S.S.M. Chow","year":"2008","unstructured":"Chow, S.S.M., Yiu, S.M.: Timed-release encryption revisited. In: Baek, J., Bao, F., Chen, K., Lai, X. (eds.) ProvSec 2008. LNCS, vol.\u00a05324, pp. 38\u201351. Springer, Heidelberg (2008)"},{"issue":"1","key":"15_CR19","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1137\/S0097539702403773","volume":"33","author":"R. Cramer","year":"2003","unstructured":"Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J. Computing\u00a033(1), 167\u2013226 (2003)","journal-title":"SIAM J. Computing"},{"key":"15_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-540-75496-1_11","volume-title":"Information Security","author":"A.W. Dent","year":"2007","unstructured":"Dent, A.W., Tang, Q.: Revisiting the security model for timed-release encryption with pre-open capability. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol.\u00a04779, pp. 158\u2013174. Springer, Heidelberg (2007)"},{"key":"15_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/11761679_27","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"C. Gentry","year":"2006","unstructured":"Gentry, C.: Practical identity-based encryption without random oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.\u00a04004, pp. 445\u2013464. Springer, Heidelberg (2006)"},{"key":"15_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/11556992_25","volume-title":"Information Security","author":"Y.H. Hwang","year":"2005","unstructured":"Hwang, Y.H., Yum, D.H., Lee, P.J.: Timed-release encryption with pre-open capability and its application to certified e-mail system. In: Zhou, J., L\u00f3pez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol.\u00a03650, pp. 344\u2013358. Springer, Heidelberg (2005)"},{"key":"15_CR23","unstructured":"May, T.: Timed-release crypto (1993) (manuscript)"},{"key":"15_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/978-3-642-04846-3_5","volume-title":"IWSEC 2009","author":"Y. Nakai","year":"2009","unstructured":"Nakai, Y., Matsuda, T., Kitada, W., Matsuura, K.: A generic construction of timed-release encryption with pre-open capability. In: Takagi, T., Echizen, I. (eds.) IWSEC 2009. LNCS, vol.\u00a05824, pp. 53\u201370. Springer, Heidelberg (2009)"},{"key":"15_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-15317-4_1","volume-title":"Security and Cryptography for Networks","author":"K.G. Paterson","year":"2010","unstructured":"Paterson, K.G., Quaglia, E.A.: Time-specific encryption. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol.\u00a06280, pp. 1\u201316. Springer, Heidelberg (2010)"},{"key":"15_CR26","unstructured":"Rivest, R.L., Shamir, A., Wagner, D.A.: Time-lock puzzles and timed-release crypto. Technical Report MIT\/LCS\/TR-684, Massachusetts Institute of Technology (1996)"},{"key":"15_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/11426639_7","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"B. Waters","year":"2005","unstructured":"Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 114\u2013127. Springer, Heidelberg (2005)"},{"key":"15_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"619","DOI":"10.1007\/978-3-642-03356-8_36","volume-title":"EUROCRYPT 2009","author":"B. Waters","year":"2009","unstructured":"Waters, B.: Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions. In: Halevi, S. (ed.) EUROCRYPT 2009. LNCS, vol.\u00a05677, pp. 619\u2013636. Springer, Heidelberg (2009)"}],"container-title":["Lecture Notes in Computer Science","Pairing-Based Cryptography - Pairing 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17455-1_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:28:19Z","timestamp":1636806499000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17455-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642174544","9783642174551"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17455-1_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}