{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T22:52:23Z","timestamp":1725749543809},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642409240"},{"type":"electronic","value":"9783642409257"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40925-7_19","type":"book-chapter","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T15:54:58Z","timestamp":1379606098000},"page":"190-205","source":"Crossref","is-referenced-by-count":6,"title":["A Practical Certificate and Identity Based Encryption Scheme and Related Security Architecture"],"prefix":"10.1007","author":[{"given":"Tomasz","family":"Hyla","sequence":"first","affiliation":[]},{"given":"Jerzy","family":"Peja\u015b","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-642-33260-9_3","volume-title":"Computer Information Systems and Industrial Management","author":"T. Hyla","year":"2012","unstructured":"Hyla, T., Peja\u015b, J.: Certificate-Based Encryption Scheme with General Access Structure. In: Cortesi, A., Chaki, N., Saeed, K., Wierzcho\u0144, S. (eds.) CISIM 2012. LNCS, vol.\u00a07564, pp. 41\u201355. Springer, Heidelberg (2012)"},{"issue":"4","key":"19_CR2","doi-asserted-by":"publisher","first-page":"121","DOI":"10.4156\/ijact.vol3.issue4.13","volume":"3","author":"Y. Sang","year":"2011","unstructured":"Sang, Y., Zeng, J., Li, Z., You, L.: A Secret Sharing Scheme with General Access Structures and its Applications. International Journal of Advancements in Computing Technology\u00a03(4), 121\u2013128 (2011)","journal-title":"International Journal of Advancements in Computing Technology"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"19_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"19_CR5","unstructured":"IEEE-P1363.3. IEEE P1636.3TM\/D1 draft standard for identity-based public-key cryptography using pairings (2008)"},{"key":"19_CR6","unstructured":"RFC 6508 Sakai-Kasahara Key Encryption, SAKKE (2012)"},{"key":"19_CR7","unstructured":"RFC 5091 Identity-Based Cryptography Standard (IBCS) #1: Supersingular Curve Implementations of the BF and BB1 Cryptosystems (2007)"},{"key":"19_CR8","unstructured":"RFC 5408 Identity-Based Encryption Architecture and Supporting Data Structures (January 2009)"},{"key":"19_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-9383-0","volume-title":"Identity-Based Encryption","author":"S. Chatterjee","year":"2011","unstructured":"Chatterjee, S., Sarkar, P.: Identity-Based Encryption. Springer, New York (2011)"},{"issue":"16","key":"19_CR10","doi-asserted-by":"publisher","first-page":"3113","DOI":"10.1016\/j.dam.2007.12.010","volume":"156","author":"S.D. Galbraith","year":"2008","unstructured":"Galbraith, S.D., Paterson, K.G., Smart, N.P.: Pairings for cryptographers. Discrete Applied Mathematics\u00a0156(16), 3113\u20133121 (2008)","journal-title":"Discrete Applied Mathematics"},{"key":"19_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1007\/978-3-540-40061-5_29","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"S.S. Al-Riyami","year":"2003","unstructured":"Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol.\u00a02894, pp. 452\u2013473. Springer, Heidelberg (2003)"},{"issue":"1","key":"19_CR12","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1049\/ip-ifs:20055070","volume":"153","author":"L. Chen","year":"2006","unstructured":"Chen, L., Cheng, Z., Malone\u2013Lee, J., Smart, N.P.: Efficient ID-KEM based on the Sakai\u2013Kasahara key construction. IEE Proceedings, Information Security\u00a0153(1), 19\u201326 (2006)","journal-title":"IEE Proceedings, Information Security"},{"key":"19_CR13","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/s00145-007-9000-z","volume":"21","author":"K. Bentahar","year":"2008","unstructured":"Bentahar, K., Farshim, P., Malone-Lee, J., Smart, N.P.: Generic constructions of identity-based and certificateless KEMs. Journal of Cryptology\u00a021, 178\u2013199 (2008)","journal-title":"Journal of Cryptology"},{"key":"19_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/978-3-642-31500-8_33","volume-title":"Parallel Processing and Applied Mathematics","author":"D. Burak","year":"2012","unstructured":"Burak, D., Chudzik, M.: Parallelization of the Discrete Chaotic Block Encryption Algorithm. In: Wyrzykowski, R., Dongarra, J., Karczewski, K., Wa\u015bniewski, J. (eds.) PPAM 2011, Part II. LNCS, vol.\u00a07204, pp. 323\u2013332. Springer, Heidelberg (2012)"},{"key":"19_CR15","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1137\/S0097539702403773","volume":"33","author":"R. Cramer","year":"2004","unstructured":"Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing\u00a033, 167\u2013226 (2004)","journal-title":"SIAM Journal on Computing"},{"key":"19_CR16","unstructured":"Bell, M.: Service-Oriented Modeling (SOA): Service Analysis, Design, and Architecture. Wiley & Sons (2008) ISBN 978-0-470-14111-3"},{"key":"19_CR17","unstructured":"Lynn, B.: PBC Library Specification, \n                    \n                      http:\/\/crypto.stanford.edu\/pbc\/\n                    \n                    \n                   (retrieved 2013)"},{"key":"19_CR18","unstructured":"FIPS PUB 140-2: Security Requirements for Cryptographic Modules, National Institute of Standards and Technology (2001)"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Souppaya, M., Wack, J., Kent, K.: Security Configuration Checklist Program for IT Products - Guidance for Checklist Users and Developers, NIST Special Publication SP 800-70 (May 2005)","DOI":"10.6028\/NIST.SP.800-70"},{"key":"19_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 514\u2013532. Springer, Heidelberg (2001)"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Appenzeller, G., et al.: Identity-Based Encryption Architecture and Supporting Data Structures, RFC5408, IETF (2009)","DOI":"10.17487\/rfc5408"},{"key":"19_CR22","unstructured":"Imamura, T., et al.: XML Encryption Syntax and Processing. W3C Recommendation (2002)"},{"key":"19_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1007\/3-540-39200-9_38","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"D. Boneh","year":"2003","unstructured":"Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 614\u2013629. Springer, Heidelberg (2003)"},{"key":"19_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1007\/3-540-36178-2_34","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"C. Gentry","year":"2002","unstructured":"Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 548\u2013566. Springer, Heidelberg (2002)"},{"issue":"1","key":"19_CR25","first-page":"241","volume":"41","author":"I. Fray El","year":"2012","unstructured":"El Fray, I., Kurkowski, M., Peja\u015b, J., Ma\u0107k\u00f3w, W.: A New Mathematical Model for Analytical Risk Assessment and Prediction in IT Systems. Control and Cybernetics\u00a041(1), 241\u2013268 (2012)","journal-title":"Control and Cybernetics"},{"key":"19_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1007\/978-3-642-33260-9_37","volume-title":"Computer Information Systems and Industrial Management","author":"I. Fray El","year":"2012","unstructured":"El Fray, I.: A Comparative Study of Risk Assessment Methods, MEHARI & CRAMM with a New Formal Model of Risk Assessment (FoMRA) in Information Systems. In: Cortesi, A., Chaki, N., Saeed, K., Wierzcho\u0144, S. (eds.) CISIM 2012. LNCS, vol.\u00a07564, pp. 428\u2013442. Springer, Heidelberg (2012)"},{"issue":"3","key":"19_CR27","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1049\/iet-ifs.2011.0344","volume":"6","author":"T. Hyla","year":"2012","unstructured":"Hyla, T., El Fray, I., Peja\u015b, J., Ma\u0107k\u00f3w, W.: Long-term Preservation of Digital Signatures for Multiple Groups of Related Documents. IET Information Security\u00a06(3), 219\u2013227 (2012)","journal-title":"IET Information Security"}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40925-7_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T11:34:40Z","timestamp":1558092880000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40925-7_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642409240","9783642409257"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40925-7_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}