{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:02:02Z","timestamp":1772283722291,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2005,12,23]],"date-time":"2005-12-23T00:00:00Z","timestamp":1135296000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2005,12,23]],"date-time":"2005-12-23T00:00:00Z","timestamp":1135296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["AAECC"],"published-print":{"date-parts":[[2006,1]]},"DOI":"10.1007\/s00200-005-0183-y","type":"journal-article","created":{"date-parts":[[2005,12,22]],"date-time":"2005-12-22T12:36:38Z","timestamp":1135254998000},"page":"379-396","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Protecting against key-exposure: strongly key-insulated encryption with optimal threshold"],"prefix":"10.1007","volume":"16","author":[{"given":"Mihir","family":"Bellare","sequence":"first","affiliation":[]},{"given":"Adriana","family":"Palacio","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,12,23]]},"reference":[{"key":"183_CR1","doi-asserted-by":"crossref","unstructured":"Abdalla, M., Reyzin L.: A new forward-secure digital signature scheme. Advances in Cryptology \u2013 ASIACRYPT '00, Lecture Notes in Computer Science Vol. 1976, T. Okamoto ed., Springer-Verlag, 2000","DOI":"10.1007\/3-540-44448-3_10"},{"key":"183_CR2","unstructured":"Anderson, R.: Two Remarks on Public-Key Cryptology. Manuscript, 2000, and Invited Lecture at the Fourth Annual Conference on Computer and Communications Security, Zurich, Switzerland, April 1997"},{"key":"183_CR3","unstructured":"Bellare, M., Desai, A., Jokipii, E., Rogaway E.: A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation. Proceedings of the 38 th Symposium on Foundations of Computer Science, IEEE, 1997"},{"key":"183_CR4","unstructured":"Bellare, M., Palacio, A.: Protecting against key exposure: Strongly key-insulated encryption with optimal threshold. Cryptology ePrint Archive: Report 2002\/064. http:\/\/eprint.iacr.org\/2002\/064"},{"key":"183_CR5","doi-asserted-by":"crossref","unstructured":"Bellare, M., Miner, S.: A forward-secure digital signature scheme. Advances in Cryptology \u2013 CRYPTO '99, Lecture Notes in Computer Science Vol. 1666 , M. Wiener ed., Springer-Verlag, 1999","DOI":"10.1007\/3-540-48405-1_28"},{"key":"183_CR6","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the 1st Annual Conference on Computer and Communications Security, ACM, 1993","DOI":"10.1145\/168588.168596"},{"key":"183_CR7","doi-asserted-by":"crossref","unstructured":"Bleichenbacher, D.: A chosen ciphertext attack against protocols based on the RSA encryption standard PKCS #1. Advances in Cryptology \u2013 CRYPTO '98, Lecture Notes in Computer Science Vol. 1462 , H. Krawczyk ed., Springer-Verlag, 1998","DOI":"10.1007\/BFb0055716"},{"key":"183_CR8","doi-asserted-by":"crossref","unstructured":"Boneh, D., Boyen, X.: Secure identity-based encryption without random oracles. Advances in Cryptology \u2013 CRYPTO '04, Lecture Notes in Computer Science Vol. 3152 , M. Franklin ed., Springer-Verlag, 2004","DOI":"10.1007\/978-3-540-28628-8_27"},{"key":"183_CR9","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"Boneh","year":"3","unstructured":"Boneh, D., Franklin M.: Identity-based encryption from the Weil pairing. SIAM J. Comput. 32(3), 586\u2013615, (2003). Preliminary version in Advances in Cryptology \u2013 CRYPTO '01, Lecture Notes in Computer Science Vol. 2139 , J. Kilian ed., Springer-Verlag, 2001","journal-title":"SIAM J. Comput."},{"key":"183_CR10","doi-asserted-by":"crossref","unstructured":"Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology revisited. Proceedings of the 30 th Annual Symposium on the Theory of Computing, ACM, 1998","DOI":"10.1145\/276698.276741"},{"key":"183_CR11","doi-asserted-by":"crossref","unstructured":"Canetti, R., Goldwasser S.: An efficient threshold public-key cryptosystem secure against adaptive chosen-ciphertext attack. Advances in Cryptology \u2013 EUROCRYPT '99, Lecture Notes in Computer Science Vol. 1592 , J. Stern ed., Springer-Verlag, 1999","DOI":"10.1007\/3-540-48910-X_7"},{"key":"183_CR12","doi-asserted-by":"crossref","unstructured":"Canetti, R., Halevi, S., Katz, J.: A Forward-Secure Public-Key Encryption Scheme. Advances in Cryptology \u2013 EUROCRYPT '03, Lecture Notes in Computer ScienceVol. 2656 , E. Biham ed., Springer-Verlag, 2003","DOI":"10.1007\/3-540-39200-9_16"},{"key":"183_CR13","unstructured":"CERT Coordination Center: Overview of attack trends. April 8, 2002. http:\/\/www.cert.org\/"},{"key":"183_CR14","doi-asserted-by":"crossref","unstructured":"Cocks, C.: An identity based encryption based on quadratic residues. Cryptography and Coding, Lecture Notes in Computer Science Vol. 2260, Springer-Verlag, 2001","DOI":"10.1007\/3-540-45325-3_32"},{"key":"183_CR15","doi-asserted-by":"crossref","unstructured":"Cramer, R., Shoup V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. Advances in Cryptology \u2013 CRYPTO '98, Lecture Notes in Computer Science Vol. 1462 , H. Krawczyk ed., Springer-Verlag, 1998","DOI":"10.1007\/BFb0055717"},{"key":"183_CR16","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Franklin, M., Katz, J., Miyaji, A., Yung, M.: Intrusion-Resilient Public-Key Encryption. Topics in Cryptology \u2013 CT-RSA '03, Lecture Notes in Computer Science Vol. 2612 , M. Joye ed., Springer-Verlag, 2003","DOI":"10.1007\/3-540-36563-X_2"},{"key":"183_CR17","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Katz, J., Xu, S. Yung, M.: Key-Insulated Public Key Cryptosystems. Advances in Cryptology \u2013 EUROCRYPT '02, Lecture Notes in Computer ScienceVol. 2332 , L.Knudsen ed., Springer-Verlag, 2002","DOI":"10.1007\/3-540-46035-7_5"},{"key":"183_CR18","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Katz, J., Xu, S., Yung, M.: Strong Key-Insulated Signature Schemes. Public-Key Cryptography '03, Lecture Notes in Computer Science Vol. 2567 , Y. Desmdedt ed., Springer-Verlag, 2003","DOI":"10.1007\/3-540-36288-6_10"},{"key":"183_CR19","doi-asserted-by":"crossref","unstructured":"Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. Advances in Cryptology \u2013 CRYPTO '99, Lecture Notes in Computer Science Vol. 1666 , M.Wiener ed., Springer-Verlag, 1999","DOI":"10.1007\/3-540-48405-1_34"},{"key":"183_CR20","unstructured":"Gennaro, R., Shoup, V.: Securing threshold cryptosystems against chosen-ciphertext attack. Advances in Cryptology \u2013 EUROCRYPT '98, Lecture Notes in Computer Science Vol. 1403 , K. Nyberg ed., Springer-Verlag, 1998"},{"key":"183_CR21","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"Goldwasser","year":"1984","unstructured":"Goldwasser, S., Micali S.: Probabilistic Encryption. J. Comput. Syst. Sci. 28, 270\u2013299 (1984)","journal-title":"J. Comput. Syst. Sci."},{"key":"183_CR22","unstructured":"Hanaoka, Y., Hanaoka, G., Shikata, J., Imai, H.: Identity-based encryption with non-interactive key update. Cryptology ePrint Archive: Report 2004\/338. http:\/\/eprint.iacr.org\/2004\/338"},{"key":"183_CR23","unstructured":"IEEE.: IEEE P1363: Standard Specifications For Public Key Cryptography. http:\/\/grouper.ieee.org\/groups\/1363\/P1363\/"},{"key":"183_CR24","doi-asserted-by":"crossref","unstructured":"Itkis, G., Reyzin, L.: Forward-secure signatures with optimal signing and verifying. Advances in Cryptology \u2013 CRYPTO '01, Lecture Notes in Computer Science Vol. 2139 , J. Kilian ed., Springer-Verlag, 2001","DOI":"10.1007\/3-540-44647-8_20"},{"key":"183_CR25","doi-asserted-by":"crossref","unstructured":"Itkis, G., Reyzin L.: SiBIR: Signer-Base Intrusion-Resilient Signatures. Advances in Cryptology \u2013 CRYPTO '02, Lecture Notes in Computer Science Vol. 2442 , M. Yung ed., Springer-Verlag, 2002","DOI":"10.1007\/3-540-45708-9_32"},{"key":"183_CR26","doi-asserted-by":"crossref","unstructured":"Kozlov, A., Reyzin, L.: Forward-Secure Signatures with Fast Key Update. In: Cimato, S., Galdi, C., Persiano, G., (eds) Third International Conference on Security in Communication Networks (SCN '02), Lecture Notes in Computer Science Vol. 2576, Springer-Verlag, 2003","DOI":"10.1007\/3-540-36413-7_18"},{"key":"183_CR27","doi-asserted-by":"crossref","unstructured":"Krawczyk, H.: Simple forward-secure signatures from any signature scheme. In: Proceedings of the 7th Annual Conference on Computer and Communications Security, ACM, 2000","DOI":"10.1145\/352600.352617"},{"key":"183_CR28","doi-asserted-by":"crossref","unstructured":"Malkin, T., Micciancio, D., Miner, S.: Efficient generic forward-secure signatures with an unbounded number of time periods. Advances in Cryptology \u2013 EUROCRYPT '02, Lecture Notes in Computer Science Vol. 2332 , L. Knudsen ed., Springer-Verlag, 2002","DOI":"10.1007\/3-540-46035-7_27"},{"key":"183_CR29","unstructured":"Miller, V.: Short programs for functions on curves. Unpublished manuscript, 1986"},{"key":"183_CR30","unstructured":"Rackoff, C., Simon, D.: Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. Advances in Cryptology \u2013 CRYPTO '91, Lecture Notes in Computer Science Vol. 576 , J. Feigenbaum ed., Springer-Verlag, 1991"},{"key":"183_CR31","unstructured":"RSA Laboratories. PKCS #1 \u2013 RSA Cryptography Standard. http:\/\/www.rsasecurity.com\/rsalabs\/pkcs\/pkcs-1\/index.html"},{"key":"183_CR32","unstructured":"Sahai, A.: Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security. Proceedings of the 40 th Symposium on Foundations of Computer Science, IEEE, 1999"},{"key":"183_CR33","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Communications of the ACM, 22, 612\u2013613 (1979)","journal-title":"Communications of the ACM,"},{"key":"183_CR34","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. Advances in Cryptology \u2013 CRYPTO '84, Lecture Notes in Computer Science Vol. 196, R. Blakely ed., Springer-Verlag, 1984"},{"key":"183_CR35","unstructured":"Shoup, V.: A Proposal for an ISO Standard for Public Key Encryption. Cryptology eprint archive Report 2001\/112, Dec 2001. http:\/\/eprint.iacr.org\/2001\/112\/"},{"key":"183_CR36","unstructured":"Shoup,V.: Why chosen ciphertext security matters. IBM Research Report RZ 3076, November, 1998. http:\/\/www.shoup.net"},{"key":"183_CR37","doi-asserted-by":"crossref","unstructured":"Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed) Advances in Cryptology \u2013 EUROCRYPT '05, Lecture Notes in Computer Science, Springer-Verlag, 2005","DOI":"10.1007\/11426639_7"}],"container-title":["Applicable Algebra in Engineering, Communication and Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00200-005-0183-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00200-005-0183-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00200-005-0183-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00200-005-0183-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T18:31:43Z","timestamp":1736188303000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00200-005-0183-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,12,23]]},"references-count":37,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2006,1]]}},"alternative-id":["183"],"URL":"https:\/\/doi.org\/10.1007\/s00200-005-0183-y","relation":{},"ISSN":["0938-1279","1432-0622"],"issn-type":[{"value":"0938-1279","type":"print"},{"value":"1432-0622","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,12,23]]},"assertion":[{"value":"5 September 2004","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 April 2005","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 December 2005","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}