{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T11:38:02Z","timestamp":1777030682201,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642385520","type":"print"},{"value":"9783642385537","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38553-7_23","type":"book-chapter","created":{"date-parts":[[2013,5,8]],"date-time":"2013-05-08T20:47:12Z","timestamp":1368046032000},"page":"392-405","source":"Crossref","is-referenced-by-count":1,"title":["An Identity-Based Key-Encapsulation Mechanism Built on Identity-Based Factors Selection"],"prefix":"10.1007","author":[{"given":"Sebastian","family":"Staamann","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"Abdalla, M., Bellare, M., Rogaway, P.: DHIES: An encryption scheme based on the Diffie-Hellman Problem. In: Extended Version of [2], September 18 (2001), \n                  \n                    http:\/\/www.cs.ucdavis.edu\/~rogaway\/papers\/dhies.pdf"},{"key":"23_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/3-540-45353-9_12","volume-title":"Topics in Cryptology - CT-RSA 2001","author":"M. Abdalla","year":"2001","unstructured":"Abdalla, M., Bellare, M., Rogaway, P.: The oracle Diffie-Hellman assumptions and an analysis of DHIES. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol.\u00a02020, pp. 143\u2013158. Springer, Heidelberg (2001)"},{"key":"23_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1007\/978-3-642-13190-5_28","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2010","author":"S. Agrawal","year":"2010","unstructured":"Agrawal, S., Boneh, D., Boyen, X.: Efficient lattice (H)IBE in the standard model. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol.\u00a06110, pp. 553\u2013572. Springer, Heidelberg (2010)"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Proc. of 1st ACM Conference on Computer and Communications Security, pp. 62\u201373. ACM (1993)","DOI":"10.1145\/168588.168596"},{"issue":"2","key":"23_CR5","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/s00145-007-9000-z","volume":"21","author":"K. Bentahar","year":"2008","unstructured":"Bentahar, K., Farshim, P., Malone-Lee, J., Smart, N.: Generic constructions of identity-based and certificateless KEMs. Journal of Cryptology\u00a021(2), 178\u2013199 (2008)","journal-title":"Journal of Cryptology"},{"key":"23_CR6","unstructured":"Bertoni, G., Daemen, J., Peeters, M., van Assche, G.: The Keccak reference, version 3.0, January 14 (2011), \n                  \n                    http:\/\/keccak.noekeon.org\/Keccak-reference-3.0.pdf"},{"issue":"4","key":"23_CR7","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1007\/s00145-010-9078-6","volume":"24","author":"D. Boneh","year":"2011","unstructured":"Boneh, D., Boyen, X.: Efficient selective identity-based encryption without random oracles. Journal of Cryptology\u00a024(4), 659\u2013693 (2011)","journal-title":"Journal of Cryptology"},{"issue":"3","key":"23_CR8","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D. Boneh","year":"2003","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. SIAM Journal on Computing\u00a032(3), 586\u2013615 (2003)","journal-title":"SIAM Journal on Computing"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Boneh, D., Gentry, C., Hamburg, M.: Space-efficient identity based encryption without pairings. In: Proc. of 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007), pp. 647\u2013657 (2007) ISBN 0-7695-3010-9","DOI":"10.1109\/FOCS.2007.50"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Boyen, X.: A tapestry of identity-based encryption: practical frameworks compared. Int. Journal of Applied Cryptography (1), 3\u201321 (2008)","DOI":"10.1504\/IJACT.2008.017047"},{"key":"23_CR11","unstructured":"Certicom Research: Standards for efficient cryptography, SEC 1: Elliptic Curve Cryptography, Version 2.0, May 21 (2009), \n                  \n                    http:\/\/www.secg.org\/download\/aid-780\/sec1-v2.pdf"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Chatterjee, S., Sarkar, P.: Identity-Based Encryption. Springer (2011) ISBN 978-1-44199-382-3","DOI":"10.1007\/978-1-4419-9383-0_1"},{"key":"23_CR13","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1049\/ip-ifs:20055070","volume":"153","author":"L. Chen","year":"2006","unstructured":"Chen, L., Cheng, Z., Malone-Lee, J., Smart, N.P.: An efficient ID-KEM based on the Sakai\u2013Kasahara key construction. IEE Proc. Information Security\u00a0153, 19\u201326 (2006)","journal-title":"IEE Proc. Information Security"},{"key":"23_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/3-540-45325-3_32","volume-title":"Cryptography and Coding","author":"C. Cocks","year":"2001","unstructured":"Cocks, C.: An identity based encryption scheme based on quadratic residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol.\u00a02260, pp. 360\u2013363. Springer, Heidelberg (2001)"},{"key":"23_CR15","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. on Information Theory\u00a022, 644\u2013654 (1976)","journal-title":"IEEE Trans. on Information Theory"},{"issue":"4","key":"23_CR16","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. on Inform. Theory\u00a031(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. on Inform. Theory"},{"issue":"16","key":"23_CR17","doi-asserted-by":"publisher","first-page":"3113","DOI":"10.1016\/j.dam.2007.12.010","volume":"156","author":"S.D. Galbraith","year":"2008","unstructured":"Galbraith, S.D., Paterson, K.G., Smart, N.P.: Pairings for cryptographers. Discrete Applied Mathematics\u00a0156(16), 3113\u20133121 (2008)","journal-title":"Discrete Applied Mathematics"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Proc. of the 40th ACM Symposium on Theory of Computing (STOC 2008), pp. 197\u2013206. ACM (2008)","DOI":"10.1145\/1374376.1374407"},{"key":"23_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1007\/3-540-36178-2_34","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"C. Gentry","year":"2002","unstructured":"Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 548\u2013566. Springer, Heidelberg (2002)"},{"key":"23_CR20","unstructured":"Hankerson, D., Menezes, A., Vanstone, S.: Guide to elliptic curve cryptography. Springer (2004) ISBN 0-387-95273-X"},{"issue":"4","key":"23_CR21","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/s00145-004-0312-y","volume":"17","author":"A. Joux","year":"2004","unstructured":"Joux, A.: A one round protocol for tripartite Diffie-Hellman. Journal of Cryptology\u00a017(4), 263\u2013276 (2004)","journal-title":"Journal of Cryptology"},{"issue":"3","key":"23_CR22","first-page":"305","volume":"9","author":"U. Maurer","year":"1996","unstructured":"Maurer, U., Yacobi, Y.: A non-interactive public-key distribution system. Designs, Codes and Cryptography\u00a09(3), 305\u2013316 (1996)","journal-title":"Designs, Codes and Cryptography"},{"key":"23_CR23","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of applied cryptography, 5th edn. CRC Press (2001) ISBN 0-8493-8523-7"},{"issue":"2","key":"23_CR24","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s10623-009-9278-y","volume":"52","author":"K.G. Paterson","year":"2009","unstructured":"Paterson, K.G., Srinivasan, S.: On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups. Designs, Codes and Cryptography\u00a052(2), 219\u2013241 (2009)","journal-title":"Designs, Codes and Cryptography"},{"key":"23_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"23_CR26","unstructured":"Yacobi, Y.: A note on the bilinear Diffie-Hellman assumption, IACR Cryptology ePrint Archive, Report 2002\/113 (2002), \n                  \n                    http:\/\/eprint.iacr.org\/2002\/113"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2013"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38553-7_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T19:34:39Z","timestamp":1557689679000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38553-7_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642385520","9783642385537"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38553-7_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}