{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:43:13Z","timestamp":1761324193780,"version":"3.37.3"},"publisher-location":"Singapore","reference-count":48,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811314827"},{"type":"electronic","value":"9789811314834"}],"license":[{"start":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T00:00:00Z","timestamp":1544140800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-1483-4_1","type":"book-chapter","created":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T15:20:58Z","timestamp":1544109658000},"page":"1-22","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Stateful Public-Key Encryption: A Security Solution for Resource-Constrained Environment"],"prefix":"10.1007","author":[{"given":"Joonsang","family":"Baek","sequence":"first","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]},{"given":"Khaled","family":"Salah","sequence":"additional","affiliation":[]},{"given":"Jun Su","family":"Ha","sequence":"additional","affiliation":[]},{"given":"Ernesto","family":"Damiani","sequence":"additional","affiliation":[]},{"given":"Ilsun","family":"You","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"key":"1_CR1","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/3-540-45353-9_12","volume-title":"Topics in Cryptology \u2014 CT-RSA 2001","author":"Michel Abdalla","year":"2001","unstructured":"Abdalla, M., Bellare, M., & Rogaway, P. (2001). The oracle Diffie\u2013Hellman assumptions and an analysis of DHIES. In Proceedings of CT-RSA \u201901 (Vol. 2020, pp. 143\u2013158). LNCS. Berlin: Springer."},{"issue":"1","key":"1_CR2","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1093\/comjnl\/47.1.58","volume":"47","author":"M Abe","year":"2004","unstructured":"Abe, M. (2004). Combining encryption and proof of knowledge in the random oracle model. The Computer Journal, 47(1), 58\u201370.","journal-title":"The Computer Journal"},{"issue":"4","key":"1_CR3","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/j.adhoc.2004.04.003","volume":"2","author":"I Akyildiz","year":"2004","unstructured":"Akyildiz, I., & Kasimoglu, I. (2004). Wireless sensor and actor networks: Research challenges. Ad Hoc Networks, 2(4), 351\u2013367.","journal-title":"Ad Hoc Networks"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Al Salami, S., Baek, J., Salah, K., & Damiani, E. (2016). Lightweight encryption for smart home. In ARES \u201916 (pp. 382\u2013388).","DOI":"10.1109\/ARES.2016.40"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks 2787\u20132805. Elsevier.","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"1_CR6","unstructured":"Ayuso, J., Marin, L., Jara, A., & Skarmeta, A. (2010). Optimization of public key cryptography (RSA and ECC) for 16-bits devices based on 6LoWPAN. In 1st International Workshop on the Security of the Internet of Things."},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Baek, J., Tan, H., Zhou, J., & Wong, J. (2008). Realizing stateful public key encryption in wireless sensor network. In Proceedings of the IFIP TC 11 23rd International Information Security Conference (pp. 95\u2013107). Berlin: Springer.","DOI":"10.1007\/978-0-387-09699-5_7"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Baek, J., Zhou, J., & Bao, F. (2008). Generic constructions of stateful public key encryption and their applications. In Proceedings of ACNS 2008 (Vol. 5037, pp. 75\u201393). LNCS. Berlin: Springer.","DOI":"10.1007\/978-3-540-68914-0_5"},{"key":"1_CR9","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/978-3-642-19074-2_20","volume-title":"Topics in Cryptology \u2013 CT-RSA 2011","author":"Joonsang Baek","year":"2011","unstructured":"Baek, J., Chu, C., & Zhou, J. (2011). On shortening ciphertexts: New constructions for compact public key and stateful encryption schemes. In Proceedings of CT-RSA (Vol. 6558, pp. 302\u2013318). LNCS. Berlin: Springer."},{"issue":"4","key":"1_CR10","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1093\/comjnl\/bxs151","volume":"56","author":"J Baek","year":"2013","unstructured":"Baek, J., Vu, Q., Shoufan, A., Jones, A., & Wong, D. S. (2013). Stateful public-key encryption schemes forward-secure against state exposure. The Computer Journal, 56(4), 497\u2013507.","journal-title":"The Computer Journal"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Bellare, M., & Rogaway, P. (1993). Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of ACM-CCS \u201993 (pp. 62\u201373). ACM.","DOI":"10.1145\/168588.168596"},{"key":"1_CR12","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/3-540-44448-3_41","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 2000","author":"Mihir Bellare","year":"2000","unstructured":"Bellare, M., & Namprepre, C. (2000). Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In Asiacrypt \u201900 (Vol. 1976, pp. 531\u2013545). LNCS. Berlin: Springer."},{"key":"1_CR13","first-page":"1","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201996","author":"Mihir Bellare","year":"1996","unstructured":"Bellare, M., Canetti, R., & Krawczyk, H. (1996). Keying hash functions for message authentication. In Crypto \u201996 (Vol. 1109, pp. 1\u201315). LNCS. Berlin: Springer."},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Bellare, M., Desai, A., Jokipii, E., & Rogaway, P. (1997). A concrete security treatment of symmetric encryption. In Proceedings of FOCS \u201997 (pp. 394\u2013403).","DOI":"10.1109\/SFCS.1997.646128"},{"key":"1_CR15","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/BFb0055718","volume-title":"Advances in Cryptology \u2014 CRYPTO '98","author":"Mihir Bellare","year":"1998","unstructured":"Bellare, M., Desai, A., Pointcheval, D., & Rogaway, P. (1998). Relations among notions of security for public-key encryption schemes. In Crypto \u201998 (Vol. 1462, pp. 26\u201345). LNCS. Berlin: Springer."},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Bellare, M., Kohno, T., & Shoup, V. (2006). Stateful public-key cryptosystems: How to encrypt with one 160-bit exponentiation. In Proceedings of ACM-CCS \u201906 (pp. 380\u2013389). ACM Press.","DOI":"10.1145\/1180405.1180452"},{"key":"1_CR17","unstructured":"Boneh, D., & Franklin, M. (2003). Identity based encryption from the Weil pairing. SIAM Journal of Computing32(3), 586\u2013615. (Extended abstract in Crypto \u201901 (Vol. 2139, pp. 213\u2013229). LNCS. Berlin: Springer (2001))."},{"key":"1_CR18","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-540-24676-3_14","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"Dan Boneh","year":"2004","unstructured":"Boneh, D., & Boyen, X. (2004). Efficient selective-ID secure identity-based encryption without random oracles. In Proceedings of Eurocrypt \u201904 (Vol. 3027, pp. 223\u2013238). LNCS. Berlin: Springer."},{"key":"1_CR19","first-page":"87","volume-title":"Lecture Notes in Computer Science","author":"Dan Boneh","year":"2005","unstructured":"Boneh, D., & Katz, J. (2005). Improved efficiency for CCA-secure cryptosystems built using identity-based encryption. In CT-RSA \u201905 (Vol. 3376, pp. 87\u2013103). LNCS. Berlin: Springer."},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Boyen, X. (2008). A tapestry of identity-based encryption: Practical frameworks compared. International Journal of Applied Cryptography, 3\u201321. Inderscience.","DOI":"10.1504\/IJACT.2008.017047"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Boyen, X., Mei, Q., & Waters, B. (2005). Direct chosen ciphertext security from identity- based techniques. In ACM-CCS 2005 (pp. 320\u2013329). New York: ACM Press.","DOI":"10.1145\/1102120.1102162"},{"key":"1_CR22","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/3-540-46035-7_4","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2002","author":"Ronald Cramer","year":"2002","unstructured":"Cramer, R., & Shoup, V. (2002). Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In Eurocrypt \u201902 (Vol. 2332, pp. 45\u201364). LNCS. Berlin: Springer."},{"key":"1_CR23","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1137\/S0097539702403773","volume":"33","author":"R Cramer","year":"2003","unstructured":"Cramer, R., & Shoup, V. (2003). Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal of Computing, 33, 167\u2013226.","journal-title":"SIAM Journal of Computing"},{"issue":"5","key":"1_CR24","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1049\/ecej:20020501","volume":"14","author":"J. Dankers","year":"2002","unstructured":"Dankers, J., Garefalakis, T., Schaffelhofer, R., & Wright, T. (2002). Public key infrastructure in mobile systems. Electronics & Communication Engineering Journal, 14(5), 180\u2013190. IEE.","journal-title":"Electronics & Communication Engineering Journal"},{"issue":"6","key":"1_CR25","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644\u2013654.","journal-title":"IEEE Transactions on Information Theory"},{"key":"1_CR26","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31, 469\u2013472.","journal-title":"IEEE Transactions on Information Theory"},{"key":"1_CR27","doi-asserted-by":"publisher","first-page":"3113","DOI":"10.1016\/j.dam.2007.12.010","volume":"156","author":"S Galbraith","year":"2008","unstructured":"Galbraith, S., Paterson, K., & Smart, N. (2008). Pairings for cryptographers. Discrete Applied Mathematics, 156, 3113\u20133121.","journal-title":"Discrete Applied Mathematics"},{"key":"1_CR28","unstructured":"Gaubatz, G., Kaps, J.-P., & Sunar, B. (2004). Public key cryptography in sensor networks revisited. In 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 04)."},{"issue":"3","key":"1_CR29","doi-asserted-by":"publisher","first-page":"1294","DOI":"10.1109\/COMST.2015.2388550","volume":"17","author":"J Granjal","year":"2015","unstructured":"Granjal, J., Monteiro, E., & Silva, J. S. (2015). Security for the internet of things: A survey of existing protocols and open research issues. IEEE Communication Surveys & Tutorials, 17(3), 1294\u20131312.","journal-title":"IEEE Communication Surveys & Tutorials"},{"key":"1_CR30","volume-title":"Sensor Performance and Reliability","author":"HM Hashemian","year":"2005","unstructured":"Hashemian, H. M. (2005). Sensor Performance and Reliability. Research Triangle Park, North Carolina: ISA (Instrumentation Systems, and Automation Society)."},{"key":"1_CR31","unstructured":"Katagi, M., & Moriai, S. (2011). Lightweight cryptography for the internet of things. Technical report, Sony Corporation."},{"key":"1_CR32","doi-asserted-by":"crossref","unstructured":"Kiltz, E. (2007). Chosen-ciphertext secure key-encapsulation based on gap hashed Diffie\u2013Hellman. In PKC \u201907 (Vol. 4450, pp. 282\u2013297). LNCS. Berlin: Springer.","DOI":"10.1007\/978-3-540-71677-8_19"},{"key":"1_CR33","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/978-3-540-28628-8_26","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"Kaoru Kurosawa","year":"2004","unstructured":"Kurosawa, K., & Desmedt, Y. (2004). A new paradigm of hybrid encryption scheme. In Crypto \u201904 (Vol. 3152, pp. 426\u2013442). LNCS. Berlin: Springer."},{"key":"1_CR34","first-page":"242","volume-title":"Lecture Notes in Computer Science","author":"Friedemann Mattern","year":"2010","unstructured":"Mattern, F., & Floerkemeier, C. (2010). From the internet of computers to the internet of things. From Active Data Management to Event-Based Systems and More (pp. 242\u2013259). Berlin: Springer."},{"issue":"4","key":"1_CR35","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1145\/359460.359473","volume":"21","author":"M Merkle","year":"1978","unstructured":"Merkle, M. (1978). Secure communications over insecure channels. Communications of the ACM, 21(4), 294\u2013299.","journal-title":"Communications of the ACM"},{"key":"1_CR36","doi-asserted-by":"crossref","unstructured":"Naor, M., & Yung, M. (1989). Universal one-way hash functions and their cryptographic applications. In STOC \u201989 (pp. 33\u201343). ACM.","DOI":"10.1145\/73007.73011"},{"key":"1_CR37","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-642-03356-8_2","volume-title":"Advances in Cryptology - CRYPTO 2009","author":"Moni Naor","year":"2009","unstructured":"Naor, M., & Segev, G. (2009). Public-key cryptosystems resilient to key leakage. In Crypto \u201909 (Vol. 5677, pp. 18\u201335). LNCS. Berlin: Springer."},{"issue":"6","key":"1_CR38","doi-asserted-by":"publisher","first-page":"1100","DOI":"10.1587\/transfun.E96.A.1100","volume":"E96.A","author":"Manh Ha NGUYEN","year":"2013","unstructured":"Nguyen, M., Yasunaga, K., & Tanaka, K. (2013). Leakage-resilience of stateless\/stateful public-key encryption from hash proofs. IEICE Transactions, 96-A(6), 1100\u20131111.","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"},{"key":"1_CR39","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/3-540-45353-9_13","volume-title":"Topics in Cryptology \u2014 CT-RSA 2001","author":"Tatsuaki Okamoto","year":"2000","unstructured":"Okamoto, T., & Pointcheval, P. (2001). REACT: Rapid enhanced-security asymmetric cryptosystem transform. In Proceedings of CT-RSA \u201901 (Vol. 2020, pp. 159\u2013175). LNCS. Berlin: Springer."},{"key":"1_CR40","doi-asserted-by":"crossref","unstructured":"Paillier, P. (1999). Public-key cryptosystems based on composite degree residuosity classes. In Eurocrypt \u201999 (Vol. 1592, pp. 223\u2013238). LNCS. Berlin: Springer.","DOI":"10.1007\/3-540-48910-X_16"},{"key":"1_CR41","doi-asserted-by":"crossref","unstructured":"Phong, L., Matsuoka, H., & Ogata, W. (2008). Stateful identity-based encryption scheme: Faster encryption and decryption. In Proceedings of ASIACCS \u201908 (pp. 381\u2013388). ACM.","DOI":"10.1145\/1368310.1368367"},{"issue":"2","key":"1_CR42","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21(2), 120\u2013126.","journal-title":"Communications of the ACM"},{"key":"1_CR43","unstructured":"Shafagh, H. (2013). Leveraging public-key-based authentication for the internet of things. Master thesis, RWTH Aachen University, Germany."},{"key":"1_CR44","unstructured":"Shoup, V. (2001). A proposal for an ISO standard for public key encryption (version 2.1). In ISO\/IEC JTC 1\/SC 27."},{"key":"1_CR45","unstructured":"US Nuclear Regulatory Commission. (1998). Advanced instrumentation and maintenance technologies for nuclear power plants. In NUREG\/CR-5501, Washington DC."},{"key":"1_CR46","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.jnca.2014.01.014","volume":"42","author":"Z Yan","year":"2014","unstructured":"Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for internet of things. Journal of Network and Computer Applications, 42, 120\u2013134.","journal-title":"Journal of Network and Computer Applications"},{"key":"1_CR47","first-page":"338","volume-title":"Lecture Notes in Computer Science","author":"Peng Yang","year":"2009","unstructured":"Yang, P., Zhang, R., Matsuura, K., & Imai, H. (2009). Generic construction of stateful identity based encryption. In Proceedings of ISC \u201909 (Vol. 5735, pp. 338\u2013346). LNCS. Berlin: Springer."},{"key":"1_CR48","unstructured":"ZigBee Alliance. (2016). MICAz, Wireless measurement system. Retrieved June 2016, from \nhttp:\/\/www.memsic.com\/userfiles\/files\/Datasheets\/WSN\/micaz_datasheet-t.pdf\n\n."}],"container-title":["Advances in Cyber Security: Principles, Techniques, and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-1483-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T15:21:53Z","timestamp":1544109713000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-1483-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,7]]},"ISBN":["9789811314827","9789811314834"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-1483-4_1","relation":{},"subject":[],"published":{"date-parts":[[2018,12,7]]}}}