{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:32:50Z","timestamp":1759638770342},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2008,6,21]],"date-time":"2008-06-21T00:00:00Z","timestamp":1214006400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2009,1]]},"DOI":"10.1007\/s10623-008-9218-2","type":"journal-article","created":{"date-parts":[[2008,6,20]],"date-time":"2008-06-20T14:33:19Z","timestamp":1213972399000},"page":"115-133","source":"Crossref","is-referenced-by-count":19,"title":["A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model"],"prefix":"10.1007","volume":"50","author":[{"given":"Jean-S\u00e9bastien","family":"Coron","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,6,21]]},"reference":[{"key":"9218_CR1","doi-asserted-by":"crossref","unstructured":"Attrapadung N., Chevallier-Mames B., Furukawa J., Gomi T., Hanaoka G., Imai H., Zhang R.: Efficient Identity-Based Encryption with Tight Security Reduction. Cryptology ePrint Archive, Report 2005\/320 (2005).","DOI":"10.1007\/11935070_2"},{"key":"9218_CR2","doi-asserted-by":"crossref","unstructured":"Bellare M., Rogaway P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the First Annual Conference on Computer and Communications Security, ACM (1993).","DOI":"10.1145\/168588.168596"},{"key":"9218_CR3","doi-asserted-by":"crossref","unstructured":"Boneh D., Franklin M.K.: Identity-based encryption from the Weil pairing. In: Proceedings of Crypto (2001).","DOI":"10.1007\/3-540-44647-8_13"},{"key":"9218_CR4","doi-asserted-by":"crossref","unstructured":"Boneh D., Boyen X.: Efficient selective-ID secure identity based encryption without random oracles. In: Proceedings of Eurocrypt (2004).","DOI":"10.1007\/978-3-540-24676-3_14"},{"key":"9218_CR5","unstructured":"Boneh D., Boyen X.: Secure Identity Based Encryption without random oracles. In: Proceedings of Crypto\u201904, LNCS, vol. 3152 (2004)."},{"key":"9218_CR6","unstructured":"Canetti R., Goldreich O., Halevi S.: The random oracle methodology, revisited. In: STOC\u201998, ACM (1998)."},{"key":"9218_CR7","unstructured":"Fujisaki E., Okamoto T.: Secure integration of asymmetric and symmetric encryption schemes. In: Crypto\u201999, LNCS, vol. 1666, Springer-Verlag, pp. 537\u2013554 (1999)."},{"key":"9218_CR8","unstructured":"Galindo D.: Boneh-Franklin identity based encryption revisited. In: Proceedings of ICALP 2005, LNCS, vol. 3580 (2005)."},{"key":"9218_CR9","unstructured":"Gentry C.: Practical identity-based encryption without random oracles. In: Proceedings of Eurocrypt, LNCS, vol. 4004 (2006)."},{"key":"9218_CR10","doi-asserted-by":"crossref","unstructured":"Katz J., Wang N.: Efficiency improvements for signature schemes with tight security reductions. In: ACM Conference on Computer and Communications Security, pp. 155\u2013164 (2003).","DOI":"10.1145\/948109.948132"},{"key":"9218_CR11","doi-asserted-by":"crossref","unstructured":"Kiltz E.: On the Limitations of the spread of an IBE-to-PKE transformation. In: Proceedings of PKC, pp. 274\u2013289 (2006).","DOI":"10.1007\/11745853_18"},{"key":"9218_CR12","unstructured":"Libert B., Quisquater J.J.: Identity based encryption without redundancy. In: Proceedings of ACNS, LNCS, vol. 3531 (2005)."},{"key":"9218_CR13","unstructured":"Shamir A.: Identity-based cryptosystems and signature schemes. In: Proceedings of Crypto\u201984, Springer-Verlag (1985)."},{"key":"9218_CR14","unstructured":"Shoup V.: Sequences of games: a tool for taming complexity in security proofs, manuscript, Nov. 30, 2004. Available at http:\/\/shoup.net\/papers\/ ."},{"key":"9218_CR15","doi-asserted-by":"crossref","unstructured":"Waters B.: Efficient Identity-Based Encryption without random oracles. In: Proceedings of Eurocrypt (2005).","DOI":"10.1007\/11426639_7"},{"key":"9218_CR16","unstructured":"Yang P., Kitagawa T., Hanaoka G., Zhang R., Matsuura K., Imai H.: Applying Fujisaki-Okamoto to identity-based encryption. In Fossorier M. et al. (eds.) AAECC 2006, LNCS, vol. 3857, pp. 183\u2013192. Springer-Verlag (2006)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-008-9218-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-008-9218-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-008-9218-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:50:10Z","timestamp":1559245810000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-008-9218-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6,21]]},"references-count":16,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009,1]]}},"alternative-id":["9218"],"URL":"https:\/\/doi.org\/10.1007\/s10623-008-9218-2","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,6,21]]}}}