{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T22:56:57Z","timestamp":1768777017313,"version":"3.49.0"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2010,2,12]],"date-time":"2010-02-12T00:00:00Z","timestamp":1265932800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1007\/s00145-010-9060-3","type":"journal-article","created":{"date-parts":[[2010,2,11]],"date-time":"2010-02-11T17:06:16Z","timestamp":1265907976000},"page":"42-82","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Wildcarded Identity-Based Encryption"],"prefix":"10.1007","volume":"24","author":[{"given":"Michel","family":"Abdalla","sequence":"first","affiliation":[]},{"given":"James","family":"Birkett","sequence":"additional","affiliation":[]},{"given":"Dario","family":"Catalano","sequence":"additional","affiliation":[]},{"given":"Alexander W.","family":"Dent","sequence":"additional","affiliation":[]},{"given":"John","family":"Malone-Lee","sequence":"additional","affiliation":[]},{"given":"Gregory","family":"Neven","sequence":"additional","affiliation":[]},{"given":"Jacob C. N.","family":"Schuldt","sequence":"additional","affiliation":[]},{"given":"Nigel P.","family":"Smart","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,2,12]]},"reference":[{"key":"9060_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/11787006_26","volume-title":"ICALP 2006: 33rd International Colloquium on Automata, Languages and Programming, Part\u00a0II","author":"M. Abdalla","year":"2006","unstructured":"M. Abdalla, D. Catalano, A. Dent, J. Malone-Lee, G. Neven, N. Smart, Identity-based encryption gone wild, in ICALP 2006: 33rd International Colloquium on Automata, Languages and Programming, Part\u00a0II, Venice, Italy, July 10\u201314, 2006, ed. by M. Bugliesi, B. Preneel, V. Sassone, I. Wegener. Lecture Notes in Computer Science, vol. 4052 (Springer, Berlin, 2006), pp. 300\u2013311"},{"key":"9060_CR2","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/168588.168596","volume-title":"ACM CCS 93: 1st Conference on Computer and Communications Security","author":"M. Bellare","year":"1993","unstructured":"M. Bellare, P. Rogaway, Random oracles are practical: A paradigm for designing efficient protocols, in ACM CCS 93: 1st Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 3\u20135, 1993, ed. by V. Ashby (ACM Press, New York, 1993), pp. 62\u201373"},{"issue":"2","key":"9060_CR3","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/s00145-007-9000-z","volume":"21","author":"K. Bentahar","year":"2008","unstructured":"K. Bentahar, P. Farshim, J. Malone-Lee, N.P. Smart, Generic constructions of identity-based and certificateless KEMs. J. Cryptol.\n                           21(2), 178\u2013199 (2008)","journal-title":"J. Cryptol."},{"key":"9060_CR4","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1109\/SP.2007.11","volume-title":"2007 IEEE Symposium on Security and Privacy","author":"J. Bethencourt","year":"2007","unstructured":"J. Bethencourt, A. Sahai, B. Waters, Ciphertext-policy attribute-based encryption, in 2007 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 20\u201323, 2007 (IEEE Computer Society Press, Los Alamitos, 2007), pp. 321\u2013334"},{"key":"9060_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1007\/978-3-540-73458-1_21","volume-title":"ACISP 07: 12th Australasian Conference on Information Security and Privacy","author":"J. Birkett","year":"2007","unstructured":"J. Birkett, A.W. Dent, G. Neven, J.C.N. Schuldt, Efficient chosen-ciphertext secure identity-based encryption with wildcards, in ACISP 07: 12th Australasian Conference on Information Security and Privacy, Townsville, Australia, July 2\u20134, 2007, ed. by J. Pieprzyk, H. Ghodosi, E. Dawson. Lecture Notes in Computer Science, vol. 4586 (Springer, Berlin, 2007), pp. 274\u2013292"},{"key":"9060_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-39568-7_23","volume-title":"Advances in Cryptology\u2014CRYPTO\u201984","author":"M. Blum","year":"1985","unstructured":"M. Blum, S. Goldwasser, An efficient probabilistic public-key encryption scheme which hides all partial information, in Advances in Cryptology\u2014CRYPTO\u201984, Santa Barbara, CA, USA, August 19\u201323, 1985, ed. by G.R. Blakley, D. Chaum. Lecture Notes in Computer Science, vol. 196 (Springer, Berlin, 1985), pp. 289\u2013302"},{"key":"9060_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-540-24676-3_14","volume-title":"Advances in Cryptology\u2014EUROCRYPT 2004","author":"D. Boneh","year":"2004","unstructured":"D. Boneh, X. Boyen, Efficient selective-ID secure identity based encryption without random oracles, in Advances in Cryptology\u2014EUROCRYPT 2004, Interlaken, Switzerland, May 2\u20136, 2004, ed. by C. Cachin, J. Camenisch. Lecture Notes in Computer Science, vol. 3027 (Springer, Berlin, 2004), pp. 223\u2013238"},{"issue":"3","key":"9060_CR8","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D. Boneh","year":"2003","unstructured":"D. Boneh, M.K. Franklin, Identity based encryption from the Weil pairing. SIAM J. Comput.\n                           32(3), 586\u2013615 (2003)","journal-title":"SIAM J. Comput."},{"key":"9060_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/978-3-540-89255-7_28","volume-title":"Advances in Cryptology\u2014ASIACRYPT 2008","author":"D. Boneh","year":"2008","unstructured":"D. Boneh, M. Hamburg, Generalized identity based and broadcast encryption schemes, in Advances in Cryptology\u2014ASIACRYPT 2008, Melbourne, Australia, December 7\u201311, 2008, ed. by J. Pieprzyk. Lecture Notes in Computer Science, vol. 5350 (Springer, Berlin, 2008), pp. 455\u2013470"},{"key":"9060_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1007\/11426639_26","volume-title":"Advances in Cryptology\u2014EUROCRYPT 2005","author":"D. Boneh","year":"2005","unstructured":"D. Boneh, X. Boyen, E.-J. Goh, Hierarchical identity based encryption with constant size ciphertext, in Advances in Cryptology\u2014EUROCRYPT 2005, Aarhus, Denmark, May 22\u201326, 2005, ed. by R. Cramer. Lecture Notes in Computer Science, vol. 3494 (Springer, Berlin, 2005), pp. 440\u2013456"},{"key":"9060_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-540-24676-3_13","volume-title":"Advances in Cryptology\u2014EUROCRYPT 2004","author":"R. Canetti","year":"2004","unstructured":"R. Canetti, S. Halevi, J. Katz, Chosen-ciphertext security from identity-based encryption, in Advances in Cryptology\u2014EUROCRYPT 2004, Interlaken, Switzerland, May 2\u20136, 2004, ed. by C. Cachin, J. Camenisch. Lecture Notes in Computer Science, vol. 3027 (Springer, Berlin, 2004), pp. 207\u2013222"},{"key":"9060_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1007\/11734727_33","volume-title":"ICISC: 8th International Conference on Information Security and Cryptology","author":"S. Chatterjee","year":"2005","unstructured":"S. Chatterjee, P. Sarkar, Trading time for space: Towards an efficient IBE scheme with short(er) public parameters in the standard model, in ICISC: 8th International Conference on Information Security and Cryptology, Seoul, Korea, December 1\u20132, 2005, ed. by D. Won, S. Kim. Lecture Notes in Computer Science, vol. 3935 (Springer, Berlin, 2005), pp. 424\u2013440"},{"key":"9060_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"360","DOI":"10.1007\/3-540-45325-3_32","volume-title":"Cryptography and Coding, 8th IMA International Conference","author":"C. Cocks","year":"2001","unstructured":"C. Cocks, An identity based encryption scheme based on quadratic residues, in Cryptography and Coding, 8th IMA International Conference, Cirencester, UK, December 17\u201319, 2001, ed. by B. Honary. Lecture Notes in Computer Science, vol. 2260 (Springer, Berlin, 2001), pp. 360\u2013363"},{"issue":"1","key":"9060_CR14","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1137\/S0097539702403773","volume":"33","author":"R. Cramer","year":"2003","unstructured":"R. Cramer, V. Shoup, Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J. Comput.\n                           33(1), 167\u2013226 (2003)","journal-title":"SIAM J. Comput."},{"key":"9060_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/978-3-540-40974-8_12","volume-title":"Cryptography and Coding, 9th IMA International Conference","author":"A.W. Dent","year":"2003","unstructured":"A.W. Dent, A designer\u2019s guide to KEMs, in Cryptography and Coding, 9th IMA International Conference, Cirencester, UK, 2003, ed. by K.G. Paterson. Lecture Notes in Computer Science, vol. 2898 (Springer, Berlin, 2003), pp. 133\u2013151"},{"key":"9060_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1007\/3-540-36178-2_34","volume-title":"Advances in Cryptology\u2014ASIACRYPT 2002","author":"C. Gentry","year":"2002","unstructured":"C. Gentry, A. Silverberg, Hierarchical ID-based cryptography, in Advances in Cryptology\u2014ASIACRYPT 2002, Queenstown, New Zealand, December 1\u20135, 2002, ed. by Y. Zheng. Lecture Notes in Computer Science, vol. 2501 (Springer, Berlin, 2002), pp. 548\u2013566"},{"key":"9060_CR17","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1145\/1180405.1180418","volume-title":"ACM CCS 06: 13th Conference on Computer and Communications Security","author":"V. Goyal","year":"2006","unstructured":"V. Goyal, O. Pandey, A. Sahai, B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, in ACM CCS 06: 13th Conference on Computer and Communications Security, Alexandria, Virginia, USA, October 30\u2013November 3, 2006, ed. by A. Juels, R.N. Wright, S. De Capitani\u00a0di\u00a0Vimercati (ACM Press, New York, 2006), pp. 89\u201398. Available as Cryptology ePrint Archive Report 2006\/309"},{"key":"9060_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1007\/3-540-46035-7_31","volume-title":"Advances in Cryptology\u2014EUROCRYPT 2002","author":"J. Horwitz","year":"2002","unstructured":"J. Horwitz, B. Lynn, Toward hierarchical identity-based encryption, in Advances in Cryptology\u2014EUROCRYPT 2002, Amsterdam, The Netherlands, April 28 \u2013 May 2, 2002, ed. by L.R. Knudsen. Lecture Notes in Computer Science, vol. 2332 (Springer, Berlin, 2002), pp. 466\u2013481"},{"issue":"4","key":"9060_CR19","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/s00145-004-0312-y","volume":"17","author":"A. Joux","year":"2004","unstructured":"A. Joux, A one round protocol for tripartite Diffie-Hellman. J. Cryptol.\n                           17(4), 263\u2013276 (2004).","journal-title":"J. Cryptol."},{"issue":"47\u201349","key":"9060_CR20","doi-asserted-by":"publisher","first-page":"5093","DOI":"10.1016\/j.tcs.2009.08.007","volume":"410","author":"E. Kiltz","year":"2009","unstructured":"E. Kiltz, D. Galindom, Direct chosen-ciphertext secure identity-based key encapsulation without random oracles. Theor. Comput. Sci.\n                           410(47\u201349), 5093\u20135111 (2009)","journal-title":"Theor. Comput. Sci."},{"issue":"2","key":"9060_CR21","first-page":"481","volume":"E85-A","author":"S. Mitsunari","year":"2002","unstructured":"S. Mitsunari, R. Saka, M. Kasahara, A new traitor tracing. IEICE Trans.\n                           E85-A(2), 481\u2013484 (2002)","journal-title":"IEICE Trans."},{"issue":"2","key":"9060_CR22","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1049\/iet-ifs:20055097","volume":"1","author":"D. Naccache","year":"2007","unstructured":"D. Naccache, Secure and practical identity-based encryption. IET Inf. Secur.\n                           1(2), 59\u201364 (2007)","journal-title":"IET Inf. Secur."},{"key":"9060_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology\u2014EUROCRYPT 2005","author":"A. Sahai","year":"2005","unstructured":"A. Sahai, B.R. Waters, Fuzzy identity-based encryption, in Advances in Cryptology\u2014EUROCRYPT 2005, Aarhus, Denmark, May 22\u201326, 2005, ed. by R. Cramer. Lecture Notes in Computer Science, vol. 3494 (Springer, Berlin, 2005), pp. 457\u2013473"},{"key":"9060_CR24","unstructured":"R. Sakai, K. Ohgishi, M. Kasahara, Cryptosystems based on pairing, in SCIS 2000, Okinawa, Japan, January 2000"},{"key":"9060_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology\u2014CRYPTO\u201984","author":"A. Shamir","year":"1985","unstructured":"A. Shamir, Identity-based cryptosystems and signature schemes, in Advances in Cryptology\u2014CRYPTO\u201984, Santa Barbara, CA, USA, August 19\u201323, 1985, ed. by G.R. Blakley, D. Chaum. Lecture Notes in Computer Science, vol. 196 (Springer, Berlin, 1985), pp. 47\u201353"},{"key":"9060_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/3-540-36563-X_8","volume-title":"Topics in Cryptology\u2014CT-RSA 2003","author":"N.P. Smart","year":"2003","unstructured":"N.P. Smart, Access control using pairing based cryptography, in Topics in Cryptology\u2014CT-RSA 2003, San Francisco, CA, USA, April 13\u201317, 2003, ed. by M. Joye. Lecture Notes in Computer Science, vol. 2612 (Springer, Berlin, 2003), pp. 111\u2013121"},{"key":"9060_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/11426639_7","volume-title":"Advances in Cryptology\u2014EUROCRYPT 2005","author":"B.R. Waters","year":"2005","unstructured":"B.R. Waters, Efficient identity-based encryption without random oracles, in Advances in Cryptology\u2014EUROCRYPT 2005, Aarhus, Denmark, May 22\u201326, 2005, ed. by R. Cramer. Lecture Notes in Computer Science, vol. 3494 (Springer, Berlin, 2005), pp. 114\u2013127"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-010-9060-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00145-010-9060-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-010-9060-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-010-9060-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T08:45:24Z","timestamp":1586335524000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00145-010-9060-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,2,12]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,1]]}},"alternative-id":["9060"],"URL":"https:\/\/doi.org\/10.1007\/s00145-010-9060-3","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,2,12]]},"assertion":[{"value":"21 January 2009","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 January 2010","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 February 2010","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}