{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T07:40:09Z","timestamp":1744011609105,"version":"3.40.3"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2012,8,26]],"date-time":"2012-08-26T00:00:00Z","timestamp":1345939200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2012,11]]},"DOI":"10.1007\/s10207-012-0176-3","type":"journal-article","created":{"date-parts":[[2012,8,25]],"date-time":"2012-08-25T03:08:31Z","timestamp":1345864111000},"page":"389-401","source":"Crossref","is-referenced-by-count":2,"title":["New constructions of OSBE schemes and their applications in oblivious access control"],"prefix":"10.1007","volume":"11","author":[{"given":"Jinguang","family":"Han","sequence":"first","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,8,26]]},"reference":[{"key":"176_CR1","doi-asserted-by":"crossref","unstructured":"Argyrakis, J., Gritzalis, S., Kioulafas, C.: Privacy enhancing technologies: a review. In: Traunmller, R. (ed.) Electronic Government (EGOV 2003). Lecture Notes in Compture Science, vol. 2739, pp. 282\u2013287. Springer, Berlin (2003)","DOI":"10.1007\/10929179_51"},{"key":"176_CR2","doi-asserted-by":"crossref","unstructured":"Camenisch, J.: Privacy-enhancing cryptography: from theory into practice. In: Micciancio, D. (ed.) 7th Theory of Cryptography Conference (TCC 2010). Lecture Notes in Compture Science, vol. 5978, pp. 498\u2013498. Springer, Berlin (2010)","DOI":"10.1007\/978-3-642-11799-2_29"},{"key":"176_CR3","doi-asserted-by":"crossref","unstructured":"Chang, Y.C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) Applied Cryptography and Network Security (ACNS 2005). Lecture Notes in Compture Science, vol. 3531, pp. 442\u2013455. Springer, Berlin (2005)","DOI":"10.1007\/11496137_30"},{"issue":"10","key":"176_CR4","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1109\/TC.2006.158","volume":"55","author":"K Frikken","year":"2006","unstructured":"Frikken, K., Atallah, M., Li, J.: Attribute-based access control with hidden policies and hidden credentials. IEEE Trans. Comput. 55(10), 1259\u20131270 (2006)","journal-title":"IEEE Trans. Comput."},{"key":"176_CR5","doi-asserted-by":"crossref","unstructured":"Bhargav-Spantzel, A., Camenisch, J., Gross, T., Sommer, D.: User centricity: a taxonomy and open issues. In: 2nd ACM Workshop on Digital Identity Management (DIM 2006), pp. 1\u201310. ACM (2006)","DOI":"10.1145\/1179529.1179531"},{"key":"176_CR6","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Pfitzmann, B.: Federated identity management. In: Milan, P., Willem, J. (eds.) Security, Privacy, and Trust in Modern Data Management, Data-Centric Systems and Applications, pp. 218\u2013238. Springer, Berlin (2007)","DOI":"10.1007\/978-3-540-69861-6_15"},{"key":"176_CR7","doi-asserted-by":"crossref","unstructured":"Li, N., Du, W., Boneh, D.: Oblivious signature-based envelope. In: 22nd Annual Symposium on Principles of Distributed Computing (PODC 2003), pp. 182\u2013189. ACM (2003)","DOI":"10.1145\/872035.872061"},{"key":"176_CR8","doi-asserted-by":"crossref","unstructured":"Winsborough, W.H., Seamons, K.E., Jones, V.E.: Automated trust negotiation. In: DARPA Information Survivability Conference and Exposition (DISCEX 2000), pp. 88\u2013102. IEEE (2000)","DOI":"10.1109\/DISCEX.2000.824965"},{"issue":"2","key":"176_CR9","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"176_CR10","doi-asserted-by":"crossref","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) Advances in Cryptology (ASIACRYPT 2001). Lecture Notes in Compture Science, vol. 2248, pp. 514\u2013532. Springer, Berlin (2001)","DOI":"10.1007\/3-540-45682-1_30"},{"key":"176_CR11","unstructured":"Rabin, M.: Digitalized signatures and public-key functions as in tractable as factorization. Technical Report MIT\/LCS\/TR-212; MIT Laboratory for Computer Science (1979)"},{"key":"176_CR12","doi-asserted-by":"crossref","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) Advances in Cryptology (CRYPTO 2001). Lecture Notes in Compture Science, vol. 2139, pp. 213\u2013229. Springer, Berlin (2001)","DOI":"10.1007\/3-540-44647-8_13"},{"key":"176_CR13","doi-asserted-by":"crossref","unstructured":"Cocks, C.: An identity based encryption scheme based on quadratic residues. In: Honary, B. (ed.) Cryptography and Coding. Lecture Notes in Compture Science, vol. 2260, pp. 360\u2013363. Springer, Berlin (2001)","DOI":"10.1007\/3-540-45325-3_32"},{"issue":"4","key":"176_CR14","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/s00446-004-0116-1","volume":"17","author":"N Li","year":"2005","unstructured":"Li, N., Du, W., Boneh, D.: Oblivious signature-based envelope. Distrib. Comput. 17(4), 293\u2013302 (2005)","journal-title":"Distrib. Comput."},{"key":"176_CR15","doi-asserted-by":"crossref","unstructured":"Zhou, L., Susilo, W., Mu, Y.: Three-round secret handshakes based on ELG amal and DSA. In: Chen, K., Deng, R.H., Lai, X., Zhou, J. (eds.) Information Security Practice and Experience (ISPEC 2006). Lecture Notes in Compture Science, vol. 3903, pp. 332\u2013342. Springer, Berlin (2006)","DOI":"10.1007\/11689522_31"},{"key":"176_CR16","doi-asserted-by":"crossref","unstructured":"Li, J., Li, N.: A construction for general and efficient oblivious commitment based envelope protocols. In: Ning, P., Qing, S., Li, N. (eds.) 8th International Conference on Information and Communications Security (ICICS 2006). Lecture Notes in Compture Science, vol. 4307, pp. 122\u2013138. Springer, Berlin (2006)","DOI":"10.1007\/11935308_10"},{"key":"176_CR17","doi-asserted-by":"crossref","unstructured":"Li, J., Li, N.: Oacerts: Oblivious attribute certificates. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) Applied Cryptography and Network Security (ACNS 2005). Lecture Notes in Compture Science, vol. 3531, pp. 301\u2013317. Springer, Berlin (2005)","DOI":"10.1007\/11496137_21"},{"key":"176_CR18","doi-asserted-by":"crossref","unstructured":"Nasserian, S., Tsudik, G.: Revisiting oblivious signature-based envelopes. In: Crescenzo, G.D. (ed.) Financial Cryptography and Data Security (FC 2006). Lecture Notes in Compture Science, vol. 4107, pp. 221\u2013235. Springer, Berlin (2006)","DOI":"10.1007\/11889663_19"},{"key":"176_CR19","doi-asserted-by":"crossref","unstructured":"Holt, J.E., Bradshaw, R.W., Seamons, K.E., Orman, H.: Hidden credentials. In: Jajodia, S., Samarati, P., Syverson, P.F. (eds.) Workshop on Privacy in the Electronic Society (WPES 2003), pp. 1\u20138. ACM (2003)","DOI":"10.1145\/1005140.1005142"},{"key":"176_CR20","doi-asserted-by":"crossref","unstructured":"Bradshaw, R.W., Holt, J.E., Seamons, K.E.: Concealing complex policies with hidden credentials. In: Atluri, V., Pfitzmann, B., McDaniel, P.D. (eds.) 11th ACM Conference on Computer and Communications Security (CCS 2004), pp. 146\u2013157. ACM (2004)","DOI":"10.1145\/1030083.1030104"},{"key":"176_CR21","doi-asserted-by":"crossref","unstructured":"Coull, S., Green, M., Hohenberger, S.: Controlling access to an oblivious database using stateful anonymous credentials. In: JareckiJ, S., Tsudik, G. (eds.) Public Key Cryptography (PKC 2009). Lecture Notes in Compture Science, vol. 5443, pp. 501\u2013520. Springer, Berlin (2009)","DOI":"10.1007\/978-3-642-00468-1_28"},{"key":"176_CR22","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Dubovitskaya, M., Neven, G.: Oblivious transfer with access control. In: Al-Shaer, E., Jha, S., Keromytis, A.D. (eds.) 16th ACM Conference on Computer and Communications Security (CCS 2009), pp. 131\u2013140. ACM (2009)","DOI":"10.1145\/1653662.1653679"},{"key":"176_CR23","doi-asserted-by":"crossref","unstructured":"Chu, C.K., Tzeng, W.G.: Efficient k-out-of-n oblivious transfer schemes with adaptive and non-adaptive queries. In: Vaudenay, S. (ed.) Public Key Cryptography (PKC 2005). Lecture Notes in Compture Science, vol. 3386, pp. 172\u2013183. Springer, Berlin (2005)","DOI":"10.1007\/978-3-540-30580-4_12"},{"key":"176_CR24","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory IT-22, 644\u2013654 (1976)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"176_CR25","doi-asserted-by":"crossref","unstructured":"Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J. (eds.) Advances in Cryptology (EUROCRYPT 2004). Lecture Notes in Computer Science, vol. 3027, pp. 56\u201373. Springer, Berlin (2004)","DOI":"10.1007\/978-3-540-24676-3_4"},{"key":"176_CR26","doi-asserted-by":"crossref","unstructured":"Boldyreva, A.: Threshold signatures, multisignatures and blind signatures based on the gap-diffie-hellman-group signature scheme. In: Desmedt, Y. (ed.) Public Key Cryptography (PKC 2003). Lecture Notes in Computer Science, vol. 2567, pp. 31\u201346. Springer, Berlin (2003)","DOI":"10.1007\/3-540-36288-6_3"},{"key":"176_CR27","doi-asserted-by":"crossref","unstructured":"Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J. (eds.) Advances in Cryptology (EUROCRYPT 2004). Lecture Notes in Compture Science, vol. 3027, pp. 56\u201373. Springer, Berlin (2004)","DOI":"10.1007\/978-3-540-24676-3_4"},{"key":"176_CR28","doi-asserted-by":"crossref","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) Advances in Cryptology (CRYPTO 1984). Lecture Notes in Compture Science, vol. 196, pp. 47\u201353. Springer, Berlin (1985)","DOI":"10.1007\/3-540-39568-7_5"},{"key":"176_CR29","doi-asserted-by":"crossref","unstructured":"Boneh D and Franklin M. Identity-based encryption from the weil pairing. In: Kilian J. (ed.) Advances in Cryptology (CRYPTO 2001). Lecture Notes in Compture Science, Springer, Santa Barbara, California, USA, vol. 2139, pp. 213\u2013229. Springer, Berlin (2001)","DOI":"10.1007\/3-540-44647-8_13"},{"key":"176_CR30","doi-asserted-by":"crossref","unstructured":"Chow, S.S.: Removing escrow from identity-based encryption new security notions and key management technique. In: Jarecki, S., Tsudik, G. (eds.) Public Key Cryptography (PKC 2009). Lecture Notes in Compture Science, vol. 5443, pp. 256\u2013276. Springer, Berlin (2009)","DOI":"10.1007\/978-3-642-00468-1_15"},{"key":"176_CR31","doi-asserted-by":"crossref","unstructured":"Boneh, D., Boyen, X.: Efficient selective-Id secure identity-based encryption without random oracles. In: Cachin, C., Camenisch, J. (eds.) Advances in Cryptology (EUROCRYPT 2004). Lecture Notes in Compture Science, vol. 3027, pp. 223\u2013238. Springer, Berlin (2004)","DOI":"10.1007\/978-3-540-24676-3_14"},{"key":"176_CR32","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Practical identity-based encryption without random oracles. In: Vaudenay, S. (ed.) Advances in Cryptology (EUROCRYPT 2006). Lecture Notes in Compture Science, vol. 4004, pp. 445\u2013464. Springer, Berlin (2006)","DOI":"10.1007\/11761679_27"},{"key":"176_CR33","unstructured":"Kiltz, E.: From selective-ID to full security: The case of the inversion-based Boneh-Boyen IBE scheme. Cryptol. ePrint Arch. 2007\/033 (2007)"},{"key":"176_CR34","doi-asserted-by":"crossref","unstructured":"Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) Advances in Cryptology (EUROCRYPT 2005). Lecture Notes in Compture Science, vol. 3494, pp. 114\u2013127. Springer, Berlin (2005)","DOI":"10.1007\/11426639_7"},{"key":"176_CR35","doi-asserted-by":"crossref","unstructured":"Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M.K. (ed.) Advances in Cryptology (CRYPTO 2004). Lecture Notes in Compture Science, vol. 3152, pp. 41\u201355. Springer, Berlin (2004)","DOI":"10.1007\/978-3-540-28628-8_3"},{"key":"176_CR36","doi-asserted-by":"crossref","unstructured":"Au, M.H., Susilo, J.W., Mu, Y.: Constant-size dynamic k-TAA. In: Prisco, R.D., Yung, M. (eds.) Security and Cryptography for Networks (SCN 2006). Lecture Notes in Compture Science, vol. 4116, pp. 111\u2013125. Springer, Berlin (2006)","DOI":"10.1007\/11832072_8"},{"key":"176_CR37","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) Advances in Cryptology (EUROCRYPT 2001). Lecture Notes in Compture Science, vol. 2045, pp. 93\u2013118. Springer, Berlin (2001)","DOI":"10.1007\/3-540-44987-6_7"},{"key":"176_CR38","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Neven, G., Shelat, A.: Simulatable adaptive oblivious transfer. In: Naor, M. (ed.) Advances in Cryptology (EUROCRYPT 2007). Lecture Notes in Compture Science, vol. 4515, pp. 573\u2013590. Springer, Berlin (2007)","DOI":"10.1007\/978-3-540-72540-4_33"},{"key":"176_CR39","doi-asserted-by":"crossref","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) Advances in Cryptology (EUROCRYPT 2005). Lecture Notes in Compture Science, vol. 3494, pp. 457\u2013473. Springer, Berlin (2005)","DOI":"10.1007\/11426639_27"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-012-0176-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-012-0176-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-012-0176-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T07:13:43Z","timestamp":1744010023000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-012-0176-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8,26]]},"references-count":39,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2012,11]]}},"alternative-id":["176"],"URL":"https:\/\/doi.org\/10.1007\/s10207-012-0176-3","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2012,8,26]]}}}