{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T19:53:13Z","timestamp":1742932393884,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":13,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811668890"},{"type":"electronic","value":"9789811668906"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-6890-6_12","type":"book-chapter","created":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T14:02:28Z","timestamp":1646488948000},"page":"153-170","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["OpenPGP Email Forwarding via Diverted Elliptic Curve Diffie-Hellman Key Exchanges"],"prefix":"10.1007","author":[{"given":"Francisco","family":"Vial-Prado","sequence":"first","affiliation":[]},{"given":"Aron","family":"Wussler","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,6]]},"reference":[{"key":"12_CR1","unstructured":"Gopenpgp. https:\/\/gopenpgp.org\/"},{"key":"12_CR2","unstructured":"Openpgp.js. https:\/\/openpgpjs.org\/"},{"key":"12_CR3","doi-asserted-by":"publisher","unstructured":"Aono Y, Boyen X, Phong LT, Wang L (2013) Key-private proxy re-encryption under LWE. In: Proceedings of the 14th international conference on progress in cryptology INDOCRYPT 2013\u2014vol 8250. Springer-Verlag, Berlin, Heidelberg, pp 1\u201318. https:\/\/doi.org\/10.1007\/978-3-319-03515-4_1","DOI":"10.1007\/978-3-319-03515-4_1"},{"key":"12_CR4","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/978-3-642-00862-7_19","volume-title":"Topics in cryptology\u2014CT-RSA 2009","author":"G Ateniese","year":"2009","unstructured":"Ateniese G, Benson K, Hohenberger S (2009) Key-private proxy re-encryption. In: Fischlin M (ed) Topics in cryptology\u2014CT-RSA 2009. Springer, Berlin Heidelberg, Berlin, Heidelberg, pp 279\u2013294"},{"key":"12_CR5","unstructured":"Ateniese G, Fu K, Green M, Hohenberger S (2005) Improved proxy re-encryption schemes with applications to secure distributed storage. vol\u00a02005, issue 01"},{"key":"12_CR6","doi-asserted-by":"publisher","unstructured":"Ateniese G, Fu K, Green M, Hohenberger S (2006) Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans Inf Syst Secur 9(1):1\u201330. https:\/\/doi.org\/10.1145\/1127345.1127346","DOI":"10.1145\/1127345.1127346"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Bernstein DJ (2006) Curve25519: new diffie-hellman speed records. In: In public key cryptography (PKC), Springer LNCS 3958, p\u00a02006","DOI":"10.1007\/11745853_14"},{"key":"12_CR8","doi-asserted-by":"publisher","unstructured":"Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In: Advances in cryptology\u2014EUROCRYPT \u201998, international conference on the theory and application of cryptographic techniques, Espoo, Finland, May 31\u2013June 4, Proceeding. Lecture notes in computer science, vol\u00a01403. Springer, pp 1\u201318. https:\/\/doi.org\/10.1007\/BFb0054122","DOI":"10.1007\/BFb0054122"},{"key":"12_CR9","doi-asserted-by":"publisher","unstructured":"Canetti R (2006) Security and composition of cryptographic protocols: a tutorial (part i). SIGACT News 37(3):67\u201392. https:\/\/doi.org\/10.1145\/1165555.1165570","DOI":"10.1145\/1165555.1165570"},{"key":"12_CR10","first-page":"260","volume-title":"Inf. Commun. Secur.","author":"H Khurana","year":"2006","unstructured":"Khurana H, Heo J, Pant M (2006) From proxy encryption primitives to a deployable secure-mailing-list solution. In: Ning P, Qing S, Li N (eds) Inf. Commun. Secur. Springer, Berlin Heidelberg, Berlin, Heidelberg, pp 260\u2013281"},{"key":"12_CR11","unstructured":"Koch W, Carlson B, Tse R, Atkins D, Gillmor D (2020) Openpgp message format draft-ietf-openpgp-rfc4880bis-09. RFC 4880bis, RFC Editor. https:\/\/tools.ietf.org\/html\/draft-ietf-openpgp-rfc4880bis-09"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Langley A, Hamburg M, Turner S (2016) Elliptic curves for security. RFC\u00a07748, RFC Editor","DOI":"10.17487\/RFC7748"},{"key":"12_CR13","doi-asserted-by":"publisher","unstructured":"Lindell Y (2017) How to simulate it\u2014a tutorial on the simulation proof technique. Springer International Publishing, Cham, pp 277\u2013346. https:\/\/doi.org\/10.1007\/978-3-319-57048-8_6","DOI":"10.1007\/978-3-319-57048-8_6"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Seventh International Conference on Mathematics and Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-6890-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T14:04:12Z","timestamp":1646489052000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-6890-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811668890","9789811668906"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-6890-6_12","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"6 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}