{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T04:44:55Z","timestamp":1764305095363},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2005,9,1]],"date-time":"2005-09-01T00:00:00Z","timestamp":1125532800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des Codes Crypt"],"published-print":{"date-parts":[[2005,9]]},"DOI":"10.1007\/s10623-004-1721-5","type":"journal-article","created":{"date-parts":[[2005,7,4]],"date-time":"2005-07-04T09:02:48Z","timestamp":1120467768000},"page":"301-316","source":"Crossref","is-referenced-by-count":13,"title":["A Public Key Cryptosystem Based On A Subgroup Membership Problem"],"prefix":"10.1007","volume":"36","author":[{"given":"Juan Manuel","family":"Gonzalez Nieto","sequence":"first","affiliation":[]},{"given":"Colin","family":"Boyd","sequence":"additional","affiliation":[]},{"given":"Ed","family":"Dawson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1721_CR1","unstructured":"M. Bellare, A. Desai, D. Pointcheval and P. Rogaway, Relations among notions of security for public-key encryption schemes, in [15], (1998) pp. 26\u201345."},{"key":"1721_CR2","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway, Optimal asymmetric encryption \u2013 how to encrypt with RSA, In A. D. Santis (ed.) Advances in Cryptology \u2013 EUROCRYPT \u201994. Final (revised) version appeared November 19, (1995) pp. 92\u2013111. Available from http:\/\/www-cse.ucsd.edu\/users\/mihir\/papers\/oaep.html.","DOI":"10.1007\/BFb0053428"},{"key":"1721_CR3","doi-asserted-by":"crossref","unstructured":"D. Boneh, The decision Diffie-Hellman problem, In L. A. and M. Huang (eds), Third Algorithmic Number Theory Symposium, (1998) pp. 48\u201363.","DOI":"10.1007\/BFb0054851"},{"key":"1721_CR4","unstructured":"R. Cramer and V. Shoup, A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, in [15], (1988) pp. 13\u201325."},{"key":"1721_CR5","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/3-540-46035-7_4","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2002","author":"R. Cramer","year":"2002"},{"issue":"6","key":"1721_CR6","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","journal-title":"IEEE Transactions on Information Theory"},{"key":"1721_CR7","doi-asserted-by":"crossref","unstructured":"D. Dolev, C. Dwork and M. Naor, Non-malleable cryptography, In 23rd Annual Symposium on Theory of Computing (STOC). New Orleans, LA, USA, (1991) pp. 542\u2013552.","DOI":"10.1145\/103418.103474"},{"issue":"2","key":"1721_CR8","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1137\/S0097539795291562","volume":"30","author":"D. Dolev","year":"2001","journal-title":"SICOMP: SIAM Journal on Computing"},{"issue":"4","key":"1721_CR9","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-31","author":"T. ElGamal","year":"1985","journal-title":"IEEE Transactions on Information Theory"},{"key":"1721_CR10","unstructured":"E. Fujisaki and T. Okamoto, How to enhance the security of public-key encryption at minimum cost, In International Workshop on Practice and Theory in Public Key Cryptography 99 (PKC \u201999), Kamakura, Japan, (1999) pp. 53\u201368."},{"key":"1721_CR11","unstructured":"E. Fujisaki, T. Okamoto, D. Pointcheval and J. Stern, 2000 RSA-OAEP is Still Alive!, Record 2000\/061, Cryptology ePrint Archive."},{"key":"1721_CR12","first-page":"270","volume":"28","author":"S. Goldwasser","year":"1984","journal-title":"Journal of Computer Security"},{"key":"1721_CR13","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1007\/3-540-45600-7_38","volume-title":"Information and Communications Security \u2013ICICS\u201901: Third International Conference","author":"J. M. Gonz\u00e1lez Nieto","year":"2001"},{"key":"1721_CR14","unstructured":"H. Imai and Y. Zheng (eds), International Workshop on Practice and Theory in Public Key Cryptography 2000 (PKC 2000), No. 1751 in Lecture Notes in Computer Science. Melbourne, Australia:, Springer-Verlag, Berlin, Germany (2000)."},{"key":"1721_CR15","volume-title":"Advances in Cryptology \u2013 CRYPTO \u201998, No. 1462 in Lecture Notes in Computer Science","year":"1998"},{"key":"1721_CR16","unstructured":"A. K. Lenstra and E. R. Verheul, Selecting cryptographic key sizes\u2019, in [14], (2000) pp. 446\u2013465."},{"key":"1721_CR17","unstructured":"W. Mao, Fast Monte-Carlo Primality Evidence Shown in the Dark, In Cryptographer\u2019s Track, RSA Conference 2000, Europe Munich, Germany (2000)."},{"key":"1721_CR18","unstructured":"A. J. Menezes, P. C. van Oorschot and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press series on discrete mathematics and its applications. CRC Press, (1997) ISBN 0-8493-8523-7."},{"key":"1721_CR19","doi-asserted-by":"crossref","unstructured":"M. Naor and M. Yung, Public-key cryptosystems provably secure against chosen ciphertext attack, In 22nd Annual Symposium on Theory of Computing (STOC). Baltimore, MD, USA, (1990) pp. 427\u2013437.","DOI":"10.1145\/100216.100273"},{"key":"1721_CR20","doi-asserted-by":"crossref","unstructured":"T. Okamoto and S. Uchiyama, A new public key cryptosystem as secure as factoring, In K. Nyberg (ed.), Advances in Cryptology \u2013 EUROCRYPT \u201998. (1998) pp. 308\u2013318.","DOI":"10.1007\/BFb0054135"},{"key":"1721_CR21","doi-asserted-by":"crossref","unstructured":"P. Paillier, Public-key cryptosystems based on composite degree residuosity classes, In J. Stern (ed.), Advances in Cryptology \u2013 EUROCRYPT \u201999. (1999) pp. 223\u2013238.","DOI":"10.1007\/3-540-48910-X_16"},{"key":"1721_CR22","unstructured":"D. Pointcheval, Chosen-ciphertext security for any one-way cryptosystem, in [14], (2000) pp. 129\u2013146."},{"key":"1721_CR23","first-page":"173","volume-title":"EUROCRYPT 2000","author":"G. Poupard","year":"2000"},{"key":"1721_CR24","unstructured":"M. O. Rabin, Digitalized Signatures and Public Key Functions as Intractable as Factoring, Technical Report TR-212, Laboratory of Computer Science LCS, Massachusetts Institute of Technology MIT, 545 Technology Sq., Cambridge MA, 02139 (1979)."},{"key":"1721_CR25","unstructured":"C. Rackoff and D. R. Simon, Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack, In J. Feigenbaum (ed.), Advances in Cryptology \u2013 CRYPTO \u201991, Vol. 576 of Lecture Notes in Computer Science, (1992) pp. 433\u2013444."},{"issue":"2","key":"1721_CR26","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"2","author":"R. Rivest","year":"1978","journal-title":"Comunications of the ACM"},{"key":"1721_CR27","doi-asserted-by":"crossref","unstructured":"A. Yamamura and T. Saito, Private information retrieval based on the subgroup membership problem, In V. Varadharajan (ed.), Sixth Australian Conference on Information Security and Privacy, Vol. 2119 of Lecture Notes in Computer Science. Sydney, Australia, (2001) pp. 206\u2013220.","DOI":"10.1007\/3-540-47719-5_18"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-004-1721-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-004-1721-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-004-1721-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T03:50:21Z","timestamp":1586317821000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-004-1721-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,9]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2005,9]]}},"alternative-id":["1721"],"URL":"https:\/\/doi.org\/10.1007\/s10623-004-1721-5","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,9]]}}}