{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:02:33Z","timestamp":1742961753124,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642226328"},{"type":"electronic","value":"9783642226335"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22633-5_6","type":"book-chapter","created":{"date-parts":[[2011,8,23]],"date-time":"2011-08-23T21:20:32Z","timestamp":1314134432000},"page":"77-92","source":"Crossref","is-referenced-by-count":5,"title":["An Identity-Based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-List System"],"prefix":"10.1007","author":[{"given":"Keita","family":"Emura","sequence":"first","affiliation":[]},{"given":"Atsuko","family":"Miyaji","sequence":"additional","affiliation":[]},{"given":"Kazumasa","family":"Omote","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/978-3-642-00862-7_19","volume-title":"Topics in Cryptology \u2013 CT-RSA 2009","author":"G. Ateniese","year":"2009","unstructured":"Ateniese, G., Benson, K., Hohenberger, S.: Key-private proxy re-encryption. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol.\u00a05473, pp. 279\u2013294. Springer, Heidelberg (2009)"},{"issue":"1","key":"6_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1127345.1127346","volume":"9","author":"G. Ateniese","year":"2006","unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur.\u00a09(1), 1\u201330 (2006)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"6_CR3","unstructured":"Barr, D.: Majordomo, http:\/\/www.greatcircle.com\/majordomo\/"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/BFb0054122","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"M. Blaze","year":"1998","unstructured":"Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 127\u2013144. Springer, Heidelberg (1998)"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Bobba, R., Muggli, J., Pant, M., Basney, J., Khurana, H.: Usable secure mailing lists with untrusted servers. In: IDtrust, pp. 103\u2013116 (2009)","DOI":"10.1145\/1527017.1527032"},{"issue":"3","key":"6_CR6","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D. Boneh","year":"2003","unstructured":"Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. SIAM J. Comput.\u00a032(3), 586\u2013615 (2003)","journal-title":"SIAM J. Comput."},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/11818175_17","volume-title":"Advances in Cryptology - CRYPTO 2006","author":"X. Boyen","year":"2006","unstructured":"Boyen, X., Waters, B.: Anonymous hierarchical identity-based encryption (Without random oracles). In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol.\u00a04117, pp. 290\u2013307. Springer, Heidelberg (2006)"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-540-75496-1_13","volume-title":"Information Security","author":"C.-K. Chu","year":"2007","unstructured":"Chu, C.-K., Tzeng, W.-G.: Identity-based proxy re-encryption without random oracles. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol.\u00a04779, pp. 189\u2013202. Springer, Heidelberg (2007)"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-642-04642-1_6","volume-title":"Provable Security","author":"L. Fang","year":"2009","unstructured":"Fang, L., Susilo, W., Wang, J.: Anonymous conditional proxy re-encryption without random oracle. In: Pieprzyk, J., Zhang, F. (eds.) ProvSec 2009. LNCS, vol.\u00a05848, pp. 47\u201360. Springer, Heidelberg (2009)"},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1007\/3-540-48405-1_34","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"E. Fujisaki","year":"1999","unstructured":"Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 537\u2013554. Springer, Heidelberg (1999)"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-540-72738-5_19","volume-title":"Applied Cryptography and Network Security","author":"M. Green","year":"2007","unstructured":"Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol.\u00a04521, pp. 288\u2013306. Springer, Heidelberg (2007)"},{"key":"6_CR12","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/ICCSIT.2008.34","volume-title":"ICCSIT 2008: Proceedings of the 2008 International Conference on Computer Science and Information Technology","author":"X. Hu","year":"2008","unstructured":"Hu, X., Chen, X., Huang, S.: Fully secure identity based proxy re-encryption schemes in the standard model. In: ICCSIT 2008: Proceedings of the 2008 International Conference on Computer Science and Information Technology, pp. 53\u201357. IEEE Computer Society, Washington, DC, USA (2008)"},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-3-540-85259-9_12","volume-title":"Secure Data Management","author":"L. Ibraimi","year":"2008","unstructured":"Ibraimi, L., Tang, Q., Hartel, P.H., Jonker, W.: A type-and-identity-based proxy re-encryption scheme and its application in healthcare. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2008. LNCS, vol.\u00a05159, pp. 185\u2013198. Springer, Heidelberg (2008)"},{"key":"6_CR14","unstructured":"Free Software\u00a0Foundation Inc. Mailman, the GNU Mailing List Manager, http:\/\/www.list.org\/"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Khurana, H., Hahm, H.-S.: Certified mailing lists. In: ASIACCS, pp. 46\u201358 (2006)","DOI":"10.1145\/1128817.1128828"},{"key":"6_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/11935308_19","volume-title":"Information and Communications Security","author":"H. Khurana","year":"2006","unstructured":"Khurana, H., Heo, J., Pant, M.: From proxy encryption primitives to a deployable secure-mailing-list solution. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol.\u00a04307, pp. 260\u2013281. Springer, Heidelberg (2006)"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Khurana, H., Slagell, A.J., Bonilla, R.: SELS: a secure e-mail list service. In: SAC, pp. 306\u2013313 (2005)","DOI":"10.1145\/1066677.1066752"},{"key":"6_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/978-3-540-78440-1_21","volume-title":"Public Key Cryptography \u2013 PKC 2008","author":"B. Libert","year":"2008","unstructured":"Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy re-encryption. In: Cramer, R. (ed.) PKC 2008. LNCS, vol.\u00a04939, pp. 360\u2013379. Springer, Heidelberg (2008)"},{"key":"6_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/978-3-540-73489-5_13","volume-title":"Pairing-Based Cryptography \u2013 Pairing 2007","author":"T. Matsuo","year":"2007","unstructured":"Matsuo, T.: Proxy re-encryption systems for identity-based encryption. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol.\u00a04575, pp. 247\u2013267. Springer, Heidelberg (2007)"},{"key":"6_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-642-00468-1_20","volume-title":"Public Key Cryptography \u2013 PKC 2009","author":"J. Shao","year":"2009","unstructured":"Shao, J., Cao, Z.: CCA-secure proxy re-encryption without pairings. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol.\u00a05443, pp. 357\u2013376. Springer, Heidelberg (2009)"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Shao, J., Cao, Z., Liu, P.: SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption. Security and Communication Networks (2), 1\u201316 (2009)","DOI":"10.1002\/sec.109"},{"key":"6_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/978-3-642-01440-6_26","volume-title":"Information Security and Cryptology","author":"Q. Tang","year":"2009","unstructured":"Tang, Q., Hartel, P.H., Jonker, W.: Inter-domain identity-based proxy re-encryption. In: Yung, M., Liu, P., Lin, D. (eds.) Inscrypt 2008. LNCS, vol.\u00a05487, pp. 332\u2013347. Springer, Heidelberg (2009)"},{"key":"6_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-642-17455-1_21","volume-title":"Pairing-Based Cryptography - Pairing 2010","author":"L. Wang","year":"2010","unstructured":"Wang, L., Wang, L., Mambo, M., Okamoto, E.: New identity-based proxy re-encryption schemes to prevent collusion attacks. In: Joye, M., Miyaji, A., Otsuka, A. (eds.) Pairing 2010. LNCS, vol.\u00a06487, pp. 327\u2013346. Springer, Heidelberg (2010)"}],"container-title":["Lecture Notes in Computer Science","Public Key Infrastructures, Services and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22633-5_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T05:29:40Z","timestamp":1560490180000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22633-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642226328","9783642226335"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22633-5_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}