{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T00:41:21Z","timestamp":1768524081361,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642174544","type":"print"},{"value":"9783642174551","type":"electronic"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17455-1_17","type":"book-chapter","created":{"date-parts":[[2010,11,17]],"date-time":"2010-11-17T15:31:49Z","timestamp":1290007909000},"page":"265-277","source":"Crossref","is-referenced-by-count":19,"title":["Deterministic Encoding and Hashing to Odd Hyperelliptic Curves"],"prefix":"10.1007","author":[{"given":"Pierre-Alain","family":"Fouque","sequence":"first","affiliation":[]},{"given":"Mehdi","family":"Tibouchi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Baek, J., Zheng, Y.: Identity-based threshold decryption. In: Bao, et al. (eds.) [2], pp. 262\u2013276","DOI":"10.1007\/978-3-540-24632-9_19"},{"key":"17_CR2","series-title":"Lecture Notes in Computer Science","volume-title":"Public Key Cryptography \u2013 PKC 2004","year":"2004","unstructured":"Bao, F., Deng, R., Zhou, J. (eds.): PKC 2004. LNCS, vol.\u00a02947. Springer, Heidelberg (2004)"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Boldyreva, A.: Threshold signatures, multisignatures and blind signatures based on the gap-diffie-hellman-group signature scheme. In: Desmedt (ed.) [11], pp. 31\u201346","DOI":"10.1007\/3-540-36288-6_3"},{"key":"17_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: EUROCRYPT, pp. 416\u2013432 (2003)","DOI":"10.1007\/3-540-39200-9_26"},{"key":"17_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 514\u2013532. Springer, Heidelberg (2001)"},{"key":"17_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/3-540-47719-5_38","volume-title":"Information Security and Privacy","author":"C. Boyd","year":"2001","unstructured":"Boyd, C., Montague, P., Nguyen, K.Q.: Elliptic curve based password authenticated key exchange protocols. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol.\u00a02119, pp. 487\u2013501. Springer, Heidelberg (2001)"},{"key":"17_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/978-3-540-45146-4_23","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"X. Boyen","year":"2003","unstructured":"Boyen, X.: Multipurpose identity-based signcryption (a swiss army knife for identity-based cryptography). In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 383\u2013399. Springer, Heidelberg (2003)"},{"key":"17_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/978-3-642-14623-7_13","volume-title":"CRYPTO 2010","author":"E. Brier","year":"2010","unstructured":"Brier, E., Coron, J.-S., Icart, T., Madore, D., Randriam, H., Tibouchi, M.: Efficient indifferentiable hashing into ordinary elliptic curves. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol.\u00a06223, pp. 237\u2013254. Springer, Heidelberg (2010)"},{"key":"17_CR10","unstructured":"Cha, J.C., Cheon, J.H.: An identity-based signature from gap diffie-hellman groups. In: Desmedt (ed.) [11], pp. 18\u201330"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","volume-title":"Public Key Cryptography - PKC 2003","year":"2002","unstructured":"Desmedt, Y. (ed.): PKC 2003. LNCS, vol.\u00a02567. Springer, Heidelberg (2002)"},{"key":"17_CR12","unstructured":"Farashahi, R.R., Fouque, P.-A., Shparlinski, I., Tibouchi, M., Voloch, F.: Indifferentiable deterministic hashing to elliptic and hyperelliptic curves. Preprint (2010), \n                    \n                      http:\/\/www.di.ens.fr\/~tibouchi\/research.html"},{"key":"17_CR13","unstructured":"Freeman, D.M., Satoh, T.: Constructing pairing-friendly hyperelliptic curves using weil restriction. Cryptology ePrint Archive, Report 2009\/103 (2009), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"17_CR14","series-title":"Lecture Notes in Computer Science","first-page":"26","volume-title":"Selected Areas in Cryptography","author":"E. Furukawa","year":"2003","unstructured":"Furukawa, E., Kawazoe, M., Takahashi, T.: Counting points for hyperelliptic curves of type y\n                  2\u2009=\u2009x\n                  5\u2009+\u2009ax over finite prime fields. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol.\u00a03006, pp. 26\u201341. Springer, Heidelberg (2003)"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Gentry, C., Silverberg, A.: Hierarchical id-based cryptography. In: Zheng (ed.) [29], pp. 548\u2013566","DOI":"10.1007\/3-540-36178-2_34"},{"key":"17_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/11523468_44","volume-title":"Automata, Languages and Programming","author":"M. Haneda","year":"2005","unstructured":"Haneda, M., Kawazoe, M., Takahashi, T.: Suitable curves for genus-4 HCC over prime fields. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol.\u00a03580, pp. 539\u2013550. Springer, Heidelberg (2005)"},{"key":"17_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1007\/3-540-46035-7_31","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"J. Horwitz","year":"2002","unstructured":"Horwitz, J., Lynn, B.: Toward hierarchical identity-based encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 466\u2013481. Springer, Heidelberg (2002)"},{"key":"17_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/978-3-642-03356-8_18","volume-title":"CRYPTO 2009","author":"T. Icart","year":"2009","unstructured":"Icart, T.: How to hash into elliptic curves. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol.\u00a05677, pp. 303\u2013316. Springer, Heidelberg (2009)"},{"key":"17_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/3-540-45455-1_3","volume-title":"Algorithmic Number Theory","author":"A. Joux","year":"2002","unstructured":"Joux, A.: The weil and tate pairings as building blocks for public key cryptosystems. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol.\u00a02369, pp. 20\u201332. Springer, Heidelberg (2002)"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Kammerer, J.-G., Lercier, R., Renault, G.: Encoding points on hyperelliptic curves over finite fields in deterministic polynomial time. CoRR, abs\/1005.1454 (2010)","DOI":"10.1007\/978-3-642-17455-1_18"},{"key":"17_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/978-3-540-85538-5_12","volume-title":"Pairing-Based Cryptography \u2013 Pairing 2008","author":"M. Kawazoe","year":"2008","unstructured":"Kawazoe, M., Takahashi, T.: Pairing-friendly hyperelliptic curves with ordinary jacobians of type y\n                  2\u2009=\u2009x\n                  5\u2009+\u2009ax. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol.\u00a05209, pp. 164\u2013177. Springer, Heidelberg (2008)"},{"key":"17_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/10722028_24","volume-title":"Algorithmic Number Theory","author":"D.R. Kohel","year":"2000","unstructured":"Kohel, D.R., Shparlinski, I.: On exponential sums and group generators for elliptic curves over finite fields. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol.\u00a01838, pp. 395\u2013404. Springer, Heidelberg (2000)"},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"Libert, B., Quisquater, J.-J.: Efficient signcryption with key privacy from gap diffie-hellman groups. In: Bao, et al. (eds.) [2], pp. 187\u2013200","DOI":"10.1007\/978-3-540-24632-9_14"},{"key":"17_CR24","series-title":"Algorithms and Computation in Mathematics","first-page":"155","volume-title":"Algebraic Aspects of Cryptography","author":"A.J. Menezes","year":"1998","unstructured":"Menezes, A.J., Wu, Y.-H., Zuccherato, R.J.: An elementary introduction to hyperelliptic curves. In: Koblitz, N. (ed.) Algebraic Aspects of Cryptography. Algorithms and Computation in Mathematics, vol.\u00a03, pp. 155\u2013178. Springer, Heidelberg (1998)"},{"key":"17_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"536","DOI":"10.1007\/978-3-642-13217-9","volume-title":"EUROCRYPT","author":"T. Satoh","year":"2010","unstructured":"Satoh, T.: Generating genus two hyperelliptic curves over large characteristic finite fields. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.\u00a05479, pp. 536\u2013553. Springer, Heidelberg (2010)"},{"key":"17_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1007\/11792086_36","volume-title":"Algorithmic Number Theory","author":"A. Shallue","year":"2006","unstructured":"Shallue, A., van de Woestijne, C.: Construction of rational points on elliptic curves over finite fields. In: Hess, F., Pauli, S., Pohst, M.E. (eds.) ANTS 2006. LNCS, vol.\u00a04076, pp. 510\u2013524. Springer, Heidelberg (2006)"},{"issue":"2","key":"17_CR27","doi-asserted-by":"publisher","first-page":"97","DOI":"10.4064\/ba55-2-1","volume":"55","author":"M. Ulas","year":"2007","unstructured":"Ulas, M.: Rational points on certain hyperelliptic curves over finite fields. Bull. Polish Acad. Sci. Math.\u00a055(2), 97\u2013104 (2007)","journal-title":"Bull. Polish Acad. Sci. Math."},{"key":"17_CR28","doi-asserted-by":"crossref","unstructured":"Zhang, F., Kim, K.: Id-based blind signature and ring signature from pairings. In: Zheng (ed.) [29], pp. 533\u2013547","DOI":"10.1007\/3-540-36178-2_33"},{"key":"17_CR29","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - ASIACRYPT 2002","year":"2002","unstructured":"Zheng, Y. (ed.): ASIACRYPT 2002. LNCS, vol.\u00a02501. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Pairing-Based Cryptography - Pairing 2010"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17455-1_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T23:15:59Z","timestamp":1558307759000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17455-1_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642174544","9783642174551"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17455-1_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}