{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T15:49:22Z","timestamp":1744904962770},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642332593"},{"type":"electronic","value":"9783642332609"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33260-9_3","type":"book-chapter","created":{"date-parts":[[2012,9,20]],"date-time":"2012-09-20T04:27:01Z","timestamp":1348115221000},"page":"41-55","source":"Crossref","is-referenced-by-count":8,"title":["Certificate-Based Encryption Scheme with General Access Structure"],"prefix":"10.1007","author":[{"given":"Tomasz","family":"Hyla","sequence":"first","affiliation":[]},{"given":"Jerzy","family":"Peja\u015b","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1007\/3-540-48184-2_8","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"Y. Desmedt","year":"1988","unstructured":"Desmedt, Y.: Society and Group Oriented Cryptography: A New Concept. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.\u00a0293, pp. 120\u2013127. Springer, Heidelberg (1988)"},{"key":"3_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/3-540-39200-9_17","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"C. Gentry","year":"2003","unstructured":"Gentry, C.: Certificate-based Encryption and the Certificate Revocation Problem. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 272\u2013293. Springer, Heidelberg (2003)"},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-540-24660-2_8","volume-title":"Topics in Cryptology \u2013 CT-RSA 2004","author":"B.G. Kang","year":"2004","unstructured":"Kang, B.G., Park, J.H., Hahn, S.G.: A Certificate-Based Signature Scheme. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol.\u00a02964, pp. 99\u2013111. Springer, Heidelberg (2004)"},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1007\/978-3-540-24632-9_19","volume-title":"Public Key Cryptography \u2013 PKC 2004","author":"J. Baek","year":"2004","unstructured":"Baek, J., Zheng, Y.: Identity-Based Threshold Decryption. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol.\u00a02947, pp. 262\u2013276. Springer, Heidelberg (2004)"},{"issue":"3","key":"3_CR5","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1016\/j.compeleceng.2006.11.003","volume":"33","author":"Y. Long","year":"2007","unstructured":"Long, Y., Chen, K., Liu, S.: ID-based threshold decryption secure against adaptive chosen-ciphertext attaca. Computers and Electrical Engineering\u00a033(3), 166\u2013176 (2007)","journal-title":"Computers and Electrical Engineering"},{"issue":"17","key":"3_CR6","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1016\/j.comcom.2009.07.005","volume":"32","author":"T.-Y. Chang","year":"2009","unstructured":"Chang, T.-Y.: An ID-based group-oriented decryption scheme secure against adaptive chosen-ciphertext attacks. Computer Communications\u00a032(17), 1829\u20131836 (2009)","journal-title":"Computer Communications"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Liu, H., Xie, W., Yu, J., Zhang, P., Liu, S.: A general threshold encryption scheme based on new secret sharing measure. In: 6th IEEE Conference on Industrial Electronics and Applications (ICIEA), June 21-23, pp. 2235\u20132239 (2011)","DOI":"10.1109\/ICIEA.2011.5975962"},{"issue":"1","key":"3_CR8","first-page":"1","volume":"6","author":"C. Xu","year":"2008","unstructured":"Xu, C., Zhou, J., Xiao, G.: General Group Oriented ID-Based Cryptosystems with Chosen Plaintext Security. International Journal of Network Security\u00a06(1), 1\u20135 (2008)","journal-title":"International Journal of Network Security"},{"issue":"4","key":"3_CR9","doi-asserted-by":"publisher","first-page":"121","DOI":"10.4156\/ijact.vol3.issue4.13","volume":"3","author":"Y. Sang","year":"2011","unstructured":"Sang, Y., Zeng, J., Li, Z., You, L.: A Secret Sharing Scheme with General Access Structures and its Applications. International Journal of Advancements in Computing Technology\u00a03(4), 121\u2013128 (2011)","journal-title":"International Journal of Advancements in Computing Technology"},{"issue":"2","key":"3_CR10","first-page":"111","volume":"2","author":"Y. Long","year":"2006","unstructured":"Long, Y., Chen, K.-F.: Construction of Dynamic Threshold Decryption Scheme from Pairing. International Journal of Network Security\u00a02(2), 111\u2013113 (2006)","journal-title":"International Journal of Network Security"},{"key":"3_CR11","unstructured":"Sakai, R., Kasahara, M.: ID based cryptosystems with pairing on elliptic curve. Cryptology ePrint Archive, Report 2003\/054"},{"key":"3_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1007\/3-540-48405-1_34","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"E. Fujisaki","year":"1999","unstructured":"Fujisaki, E., Okamoto, T.: Secure Integration of Asymmetric and Symmetric Encryption Schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 537\u2013554. Springer, Heidelberg (1999)"},{"key":"3_CR13","unstructured":"Lynn, B.: PBC Library Specification, \n                    \n                      http:\/\/crypto.stanford.edu\/pbc\/\n                    \n                    \n                   (retrieved 2012 )"},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1007\/978-3-540-40061-5_29","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"S.S. Al-Riyami","year":"2003","unstructured":"Al-Riyami, S.S., Paterson, K.G.: Certificateless Public Key Cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol.\u00a02894, pp. 452\u2013473. Springer, Heidelberg (2003)"},{"key":"3_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-540-24676-3_14","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D. Boneh","year":"2004","unstructured":"Boneh, D., Boyen, X.: Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 223\u2013238. Springer, Heidelberg (2004)"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/11586821_29","volume-title":"Cryptography and Coding","author":"L. Chen","year":"2005","unstructured":"Chen, L., Cheng, Z.: Security Proof of Sakai-Kasahara\u2019s Identity-Based Encryption Scheme. In: Smart, N.P. (ed.) Cryptography and Coding 2005. LNCS, vol.\u00a03796, pp. 442\u2013459. Springer, Heidelberg (2005)"},{"issue":"4","key":"3_CR17","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s00200-010-0125-1","volume":"21","author":"V. Daza","year":"2010","unstructured":"Daza, V., Herranz, J., Morillo, P., R\u00e0fols, C.: Extensions of access structures and their cryptographic applications. Applicable Algebra in Engineering, Communication and Computing\u00a021(4), 257\u2013284 (2010)","journal-title":"Applicable Algebra in Engineering, Communication and Computing"},{"key":"3_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1007\/0-387-34799-2_30","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"G.J. Simmons","year":"1990","unstructured":"Simmons, G.J.: How to (Really) Share a Secret. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 390\u2013448. Springer, Heidelberg (1990)"},{"key":"3_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/0-387-34799-2_3","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"J. Benaloh","year":"1990","unstructured":"Benaloh, J., Leichter, J.: Generalized Secret Sharing and Monotone Functions. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 27\u201335. Springer, Heidelberg (1990)"},{"issue":"3","key":"3_CR20","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1093\/comjnl\/37.3.199","volume":"37","author":"Y. Zheng","year":"1994","unstructured":"Zheng, Y., Hardjono, T., Seberry, J.: Reusing shares in secret sharing schemes. Computer Journal\u00a037(3), 199\u2013205 (1994)","journal-title":"Computer Journal"},{"issue":"1","key":"3_CR21","doi-asserted-by":"publisher","first-page":"153","DOI":"10.4134\/CKMS.2009.24.1.153","volume":"24","author":"K. Kitae","year":"2009","unstructured":"Kitae, K., Lim, S., Yie, I., Kim, K.: Cryptanalysis of a Dynamic Threshold Decryption Scheme. Communications of the Korean Mathematical Society\u00a024(1), 153\u2013159 (2009)","journal-title":"Communications of the Korean Mathematical Society"}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33260-9_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T08:00:35Z","timestamp":1620115235000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33260-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642332593","9783642332609"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33260-9_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}