{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T23:51:27Z","timestamp":1776210687880,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540648925","type":"print"},{"value":"9783540684626","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0055718","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T21:12:36Z","timestamp":1154034756000},"page":"26-45","source":"Crossref","is-referenced-by-count":498,"title":["Relations among notions of security for public-key encryption schemes"],"prefix":"10.1007","author":[{"given":"Mihir","family":"Bellare","sequence":"first","affiliation":[]},{"given":"Anand","family":"Desai","sequence":"additional","affiliation":[]},{"given":"David","family":"Pointcheval","sequence":"additional","affiliation":[]},{"given":"Phillip","family":"Rogaway","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,28]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"M. Bellare, R. Canetti and H. Krawczyk, A modular approach to the design and analysis of authentication and key exchange protocols. Proceedings of the 30th Annual Symposium on Theory of Computing, ACM, 1998.","DOI":"10.1145\/276698.276854"},{"key":"3_CR2","unstructured":"M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, Relations among notions of security for public-key encryption schemes. Pull version of this paper, available via http:\/\/www-cse.ucsd.edu\/users\/mihir\/"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway, Random oracles are practical: a paradigm for designing efficient protocols. First ACM Conference on Computer and Communications Security, ACM, 1993.","DOI":"10.1145\/168588.168596"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway, Optimal asymmetric encryption \u2014 How to encrypt with RSA. Advances in Cryptology \u2014 Eurocrypt 94 Proceedings, Lecture Notes in Computer Science Vol. 950, A. De Santis ed., Springer-Verlag, 1994.","DOI":"10.1007\/BFb0053428"},{"key":"3_CR5","unstructured":"M. Bellare and A. Sahai, private communication, May 1998."},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"D. Bleichenbacher, A chosen ciphertext attack against protocols based on the RSA encryption standard PKCS #1, Advances in Cryptology \u2014 CRYPTO '98 Proceedings, Lecture Notes in Computer Science, H. Krawczyk, ed., Springer-Verlag 1998.","DOI":"10.1007\/BFb0055716"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"M. Blum, P. Feldman and S. Micali, Non-interactive zero-knowledge and its applications. Proceedings of the 20th Annual Symposium on Theory of Computing, ACM, 1988.","DOI":"10.1145\/62212.62222"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"R. Cramer and V. Shoup, A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. Advances in Cryptology \u2014 CRYPTO '98 Proceedings, Lecture Notes in Computer Science, H. Krawczyk, ed., Springer-Verlag 1998.","DOI":"10.1007\/BFb0055717"},{"key":"3_CR9","unstructured":"I. Damg\u00e5rd, Towards practical public key cryptosystems secure against chosen ciphertext attacks. Advances in Cryptology \u2014 Crypto 91 Proceedings, Lecture Notes in Computer Science Vol. 576, J. Feigenbaum ed., Springer-Verlag, 1991."},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"A. De Santis and G. Persiano, Zero-knowledge proofs of knowledge without interaction. Proceedings of the 33rd Symposium on Foundations of Computer Science, IEEE, 1992.","DOI":"10.1109\/SFCS.1992.267809"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"D. Dolev, C. Dwork, and M. Naor, Non-malleable cryptography. Proceedings of the 23rd Annual Symposium on Theory of Computing, ACM, 1991.","DOI":"10.1145\/103418.103474"},{"key":"3_CR12","unstructured":"D. Dolev, C. Dwork, and M. Naor, Non-malleable cryptography. Technical Report CS95-27, Weizmann Institute of Science, 1995."},{"key":"3_CR13","unstructured":"D. Dolev, C. Dwork, and M. Naor, Non-malleable cryptography. Manuscript, 1998."},{"key":"3_CR14","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/BF02620230","volume":"6","author":"O. Goldreich","year":"1993","unstructured":"O. Goldreich, A uniform complexity treatment of encryption and zero-knowledge. Journal of Cryptology, Vol. 6, 1993, pp. 21\u201353.","journal-title":"Journal of Cryptology"},{"key":"3_CR15","unstructured":"Z. Galil, S. Haber and M. Yung, Symmetric public key encryption. Advances in Cryptology \u2014 Crypto 85 Proceedings, Lecture Notes in Computer Science Vol. 218, H. Williams ed., Springer-Verlag, 1985."},{"key":"3_CR16","unstructured":"Z. Galil, S. Haber and M. Yung, Security against replay chosen ciphertext attack. Distributed Computing and Cryptography, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, Vol. 2, ACM, 1991."},{"key":"3_CR17","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"S. Goldwasser and S. Micali, Probabilistic encryption. Journal of Computer and System Sciences, 28:270\u2013299, 1984.","journal-title":"Journal of Computer and System Sciences"},{"issue":"No.4","key":"3_CR18","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1145\/6490.6503","volume":"33","author":"O. Goldreich","year":"1986","unstructured":"O. Goldreich, S. Goldwasser and S. Micali, How to construct random functions. Journal of the ACM, Vol. 33, No. 4, 1986, pp. 210\u2013217.","journal-title":"Journal of the ACM"},{"key":"3_CR19","unstructured":"J. H\u00e5stad, R. Impagliazzo, L. Levin and M. Luby, Construction of a pseudo-random generator from any one-way function. Manuscript. Earlier versions in STOC 89 and STOC 90."},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"R. Impagliazzo and M. Luby, One-way functions are essential for complexity based cryptography. Proceedings of the 30th Symposium on Foundations of Computer Science, IEEE, 1989.","DOI":"10.1109\/SFCS.1989.63483"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"S. Micali, C. Rackoff and R. Sloan, The notion of security for probabilistic cryptosystems. SIAM J. of Computing, April 1988.","DOI":"10.1137\/0217025"},{"key":"3_CR22","unstructured":"M. Naor, private communication, March 1998."},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"M. Naor and M. Yung, Public-key cryptosystems provably secure against chosen ciphertext attacks. Proceedings of the 22nd Annual Symposium on Theory of Computing, ACM, 1990.","DOI":"10.1145\/100216.100273"},{"key":"3_CR24","unstructured":"C. Rackoff and D. Simon, Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. Advances in Cryptology \u2014 Crypto 91 Proceedings, Lecture Notes in Computer Science Vol. 576, J. Feigenbaum ed., Springer-Verlag, 1991."},{"key":"3_CR25","unstructured":"SETCo (Secure Electronic Transaction LLC), The SET standard book 3 formal protocol definitions (version 1.0). May 31, 1997. Available from http:\/\/www.setco.org\/"},{"issue":"no.5","key":"3_CR26","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1109\/49.223871","volume":"11","author":"Y. Zheng","year":"1993","unstructured":"Y. Zheng and J. Seberry, Immunizing public key cryptosystems against chosen ciphertext attack. IEEE Journal on Selected Areas in Communications, vol. 11, no. 5, 715\u2013724 (1993).","journal-title":"IEEE Journal on Selected Areas in Communications"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO '98"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0055718","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,20]],"date-time":"2019-04-20T09:09:09Z","timestamp":1555751349000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0055718"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540648925","9783540684626"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/bfb0055718","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1998]]}}}