{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T06:59:26Z","timestamp":1775199566603,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2013,8,2]],"date-time":"2013-08-02T00:00:00Z","timestamp":1375401600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2015,2]]},"DOI":"10.1007\/s10623-013-9868-6","type":"journal-article","created":{"date-parts":[[2013,8,1]],"date-time":"2013-08-01T17:48:48Z","timestamp":1375379328000},"page":"395-425","source":"Crossref","is-referenced-by-count":20,"title":["Anonymous HIBE with short ciphertexts: full security in prime order groups"],"prefix":"10.1007","volume":"74","author":[{"given":"Kwangsu","family":"Lee","sequence":"first","affiliation":[]},{"given":"Jong Hwan","family":"Park","sequence":"additional","affiliation":[]},{"given":"Dong Hoon","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,8,2]]},"reference":[{"key":"9868_CR1","unstructured":"Abdalla M., Bellare M., Catalano D., Kiltz E., Kohno T., Lange T., Malone-Lee J., Neven G., Paillier P., Shi H.: Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions. In: Shoup V. (ed.) CRYPTO. Lecture Notes in Computer Science, vol. 3621, pp. 205\u2013222. Springer, Heidelberg (2005)."},{"key":"9868_CR2","unstructured":"Abdalla M., Bellare M., Neven G.: Robust encryption. In: Micciancio D. (ed.) TCC. Lecture Notes in Computer Science, vol. 5978, pp. 480\u2013497. Springer, Heidelberg (2010)."},{"key":"9868_CR3","unstructured":"Agrawal S., Boneh D., Boyen X.: Efficient lattice (h)ibe in the standard model. In: Gilbert H. (ed.) EUROCRYPT. Lecture Notes in Computer Science, vol. 6110, pp. 553\u2013572. Springer, Heidelberg (2010)."},{"key":"9868_CR4","unstructured":"Agrawal s Boneh D., Boyen X.: Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical ibe. In: Rabin T. (ed.) CRYPTO. Lecture Notes in Computer Science, vol. 6223, pp. 98\u2013115. Springer, Heidelberg (2010)."},{"key":"9868_CR5","unstructured":"Boneh D., Boyen X.: Efficient selective-id secure identity-based encryption without random oracles. In: Cachin C., Camenisch J. (eds.) EUROCRYPT. Lecture Notes in Computer Science, vol. 3027, pp. 223\u2013238. Springer, Heidelberg (2004)."},{"key":"9868_CR6","doi-asserted-by":"crossref","unstructured":"Boneh D., Boyen X.: Efficient selective identity-based encryption without random oracles. J. Cryptol. 24(4), 659\u2013693 (2011).","DOI":"10.1007\/s00145-010-9078-6"},{"key":"9868_CR7","unstructured":"Boneh D., Franklin M.K.: Identity-based encryption from the weil pairing. In: Kilian J. (ed.) CRYPTO. Lecture Notes in Computer Science, vol. 2139, pp. 213\u2013229. Springer, Heidelberg (2001)."},{"key":"9868_CR8","unstructured":"Boneh D., Franklin M.K.: Identity-based encryption from the weil pairing. SIAM J. Comput. 32(3), 586\u2013615 (2003)."},{"key":"9868_CR9","unstructured":"Boneh D., Hamburg M.: Generalized identity based and broadcast encryption schemes. In: Pieprzyk J. (ed.) ASIACRYPT. Lecture Notes in Computer Science, vol. 5350, pp. 455\u2013470. Springer, Heidelberg (2008)."},{"key":"9868_CR10","unstructured":"Boneh D., Waters B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan S.P. (ed.) TCC. Lecture Notes in Computer Science, vol. 4392, pp. 535\u2013554. Springer, Heidelberg (2007)."},{"key":"9868_CR11","unstructured":"Boneh D., Crescenzo G.D., Ostrovsky R., Persiano G.: Public key encryption with keyword search. In: Cachin C., Camenisch J. (eds.) EUROCRYPT. Lecture Notes in Computer Science, vol. 3027, pp. 506\u2013522. Springer, Heidelberg (2004)."},{"key":"9868_CR12","unstructured":"Boneh D., Boyen X., Goh E.J.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer R. (ed.) EUROCRYPT. Lecture Notes in Computer Science, vol. 3494, pp. 440\u2013456. Springer, Heidelberg (2005)."},{"key":"9868_CR13","unstructured":"Boyen X., Waters B.: Anonymous hierarchical identity-based encryption (without random oracles). In: Dwork C. (ed.) CRYPTO. Lecture Notes in Computer Science, vol. 4117, 290th edn, p. 307. Springer, Heidelberg (2006)."},{"key":"9868_CR14","unstructured":"Canetti R., Halevi S., Katz J.: A forward-secure public-key encryption scheme. In: Biham E. (ed.) EUROCRYPT. Lecture Notes in Computer Science, vol. 2656, pp. 255\u2013271. Springer, Heidelberg (2003)."},{"key":"9868_CR15","unstructured":"Canetti R., Halevi S., Katz J.: Chosen-ciphertext security from identity-based encryption. In: Cachin C., Camenisch J. (eds.) EUROCRYPT. Lecture Notes in Computer Science, vol. 3027, pp. 207\u2013222. Springer, Heidelberg (2004)."},{"key":"9868_CR16","unstructured":"Caro A.D., Iovino V., Persiano G.: Fully secure anonymous hibe and secret-key anonymous ibe with short ciphertexts. In: Joye M., Miyaji A., Otsuka A. (eds.) Pairing. Lecture Notes in Computer Science, vol. 6487, pp. 347\u2013366. Springer, Heidelberg (2010)."},{"key":"9868_CR17","unstructured":"Cash D., Hofheinz D., Kiltz E., Peikert C.: Bonsai trees, or how to delegate a lattice basis. In: Gilbert H. (ed.) EUROCRYPT. Lecture Notes in Computer Science, vol. 6110, pp. 523\u2013552. Springer, Heidelberg (2010)."},{"key":"9868_CR18","unstructured":"Chatterjee S., Sarkar P.: Hibe with short public parameters without random oracle. In: Lai X., Chen K. (eds.) ASIACRYPT. Lecture Notes in Computer Science, vol. 4284, pp. 145\u2013160. Springer, Heidelberg (2006)."},{"key":"9868_CR19","unstructured":"Chen J., Lim H.W., Ling S., Wang H., The relation and transformation between hierarchical inner product encryption and spatial encryption. Cryptology ePrint Archive, Report 2011\/455. http:\/\/eprint.iacr.org\/2011\/455 (2011)."},{"key":"9868_CR20","unstructured":"Dodis Y., Fazio N.: Public key broadcast encryption for stateless receivers. In: Feigenbaum J. (ed.) Digital Rights Management Workshop. Lecture Notes in Computer Science, vol. 2696, pp. 61\u201380. Springer, Heidelberg (2002)."},{"key":"9868_CR21","unstructured":"Ducas L.: Anonymity from asymmetry: new constructions for anonymous hibe. In: Pieprzyk J. (ed.) CT-RSA. Lecture Notes in Computer Science, vol. 5985, pp. 148\u2013164. Springer, Heidelberg (2010)."},{"key":"9868_CR22","unstructured":"Freeman D.M.: Converting pairing-based cryptosystems from composite-order groups to prime-order groups. In: Gilbert H. (ed.) EUROCRYPT. Lecture Notes in Computer Science, vol. 6110, pp. 44\u201361. Springer, Heidelberg (2010)."},{"key":"9868_CR23","unstructured":"Gentry C.: Practical identity-based encryption without random oracles. In: Vaudenay S. (ed.) EUROCRYPT. Lecture Notes in Computer Science, vol. 4004, pp. 445\u2013464. Springer, Heidelberg (2006)."},{"key":"9868_CR24","unstructured":"Gentry C., Halevi S.: Hierarchical identity based encryption with polynomially many levels. In: Reingold O. (ed.) TCC. Lecture Notes in Computer Science, vol. 5444, pp. 437\u2013456. Springer, Heidelberg (2009)."},{"key":"9868_CR25","unstructured":"Gentry C., Silverberg A.: Hierarchical id-based cryptography. In: Zheng Y. (ed.) ASIACRYPT. Lecture Notes in Computer Science, vol. 2501, pp. 548\u2013566. Springer, Heidelberg (2002)."},{"key":"9868_CR26","unstructured":"Goyal V., Pandey O., Sahai A., Waters B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Juels A, Wright RN, di Vimercati SDC (eds.) ACM Conference on Computer and Communications Security, pp 89\u201398. ACM, New York (2006)."},{"key":"9868_CR27","unstructured":"Horwitz J., Lynn B.: Toward hierarchical identity-based encryption. In: Knudsen L.R. (ed.) EUROCRYPT. Lecture Notes in Computer Science, vol. 2332, pp. 466\u2013481. Springer, Heidelberg (2002)."},{"key":"9868_CR28","unstructured":"Katz J., Sahai A., Waters B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Smart N.P. (ed.) EUROCRYPT. Lecture Notes in Computer Science, vol. 4965, pp. 146\u2013162. Springer, Heidelberg (2008)."},{"key":"9868_CR29","unstructured":"Lee K., Lee D.H.: New techniques for anonymous hibe with short ciphertexts in prime order groups. KSII Trans. Internet Inf. Syst. 4(5), 968\u2013988 (2010)."},{"key":"9868_CR30","unstructured":"Lewko A.B.: Tools for simulating features of composite order bilinear groups in the prime order setting. In: Pointcheval D., Johansson T. (eds.) EUROCRYPT. Lecture Notes in Computer Science, vol. 7237, pp. 318\u2013335. Springer, Heidelberg (2012)."},{"key":"9868_CR31","unstructured":"Lewko A.B., Waters B.: New techniques for dual system encryption and fully secure hibe with short ciphertexts. In: Micciancio D. (ed.) TCC. Lecture Notes in Computer Science, vol. 5978, pp. 455\u2013479. Springer, Heidelberg (2010)."},{"key":"9868_CR32","unstructured":"Lewko A.B., Waters B.: Unbounded hibe and attribute-based encryption. In: Paterson K.G. (ed.) EUROCRYPT. Lecture Notes in Computer Science, vol. 6632, pp. 547\u2013567. Springer, Heidelberg (2011)."},{"key":"9868_CR33","unstructured":"Lewko A.B., Okamoto T., Sahai A., Takashima K., Waters B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert H. (ed.) EUROCRYPT. Lecture Notes in Computer Science, vol. 6110, pp. 62\u201391. Springer, Heidelberg (2010)."},{"key":"9868_CR34","unstructured":"Lewko A.B., Rouselakis Y., Waters B.: Achieving leakage resilience through dual system encryption. In: Ishai Y. (ed.) TCC. Lecture Notes in Computer Science, vol. 6597, pp. 70\u201388. Springer, Heidelberg (2011)."},{"key":"9868_CR35","unstructured":"Lynn B.: The pairing-based cryptography library. http:\/\/crypto.stanford.edu\/pbc\/ (2007)."},{"key":"9868_CR36","unstructured":"Okamoto T., Takashima K.: Hierarchical predicate encryption for inner-products. In: Matsui M. (ed.) ASIACRYPT. Lecture Notes in Computer Science, vol. 5912, pp. 214\u2013231. Springer, Heidelberg (2009)."},{"key":"9868_CR37","unstructured":"Okamoto T., Takashima K.: Fully secure functional encryption with general relations from the decisional linear assumption. In: Rabin T. (ed.) CRYPTO. Lecture Notes in Computer Science, vol. 6223, pp. 191\u2013208. Springer, Heidelberg (2010)."},{"key":"9868_CR38","unstructured":"Okamoto T., Takashima K.: Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption. In: Lin D., Tsudik G., Wang X. (eds.) CANS. Lecture Notes in Computer Science, vol. 7092, pp. 138\u2013159. Springer, Heidelberg (2011)."},{"key":"9868_CR39","unstructured":"Okamoto T., Takashima K.: Adaptively attribute-hiding (hierarchical) inner product encryption. In: Pointcheval D., Johansson T. (eds.) EUROCRYPT. Lecture Notes in Computer Science, vol. 7237, pp. 591\u2013608. Springer, Heidelberg (2012)."},{"key":"9868_CR40","doi-asserted-by":"crossref","unstructured":"Schwartz J.T.: Fast probabilistic algorithms for verification of polynomial identities. J. ACM 27(4), 701\u2013717 (1980).","DOI":"10.1145\/322217.322225"},{"key":"9868_CR41","unstructured":"Seo J.H., Kobayashi T., Ohkubo M., Suzuki K.: Anonymous hierarchical identity-based encryption with constant size ciphertexts. In: Jarecki S., Tsudik G. (eds.) Public Key Cryptography. Lecture Notes in Computer Science, vol. 5443, pp. 215\u2013234. Springer, Heidelberg (2009)."},{"key":"9868_CR42","unstructured":"Shi E., Waters B.: Delegating capabilities in predicate encryption systems. In: Aceto L., Damg\u00e5rd I., Goldberg L.A., Halld\u00f3rsson M.M., Ing\u00f3lfsd\u00f3ttir A., Walukiewicz I. (eds.) ICALP (2). Lecture Notes in Computer Science, vol. 5126, pp. 560\u2013578. Springer, Heidelberg (2008)."},{"key":"9868_CR43","unstructured":"Shoup V.: Lower bounds for discrete logarithms and related problems. In: Fumy W. (ed.) EUROCRYPT. Lecture Notes in Computer Science, vol. 1233, pp. 256\u2013266. Springer, Heidelberg (1997)."},{"key":"9868_CR44","unstructured":"Waters B.: Efficient identity-based encryption without random oracles. In: Cramer R. (ed.) EUROCRYPT. Lecture Notes in Computer Science, vol. 3494, pp. 114\u2013127. Springer, Heidelberg (2005)."},{"key":"9868_CR45","unstructured":"Waters B.: Dual system encryption: realizing fully secure ibe and hibe under simple assumptions. In: Halevi S. (ed.) CRYPTO. Lecture Notes in Computer Science, vol. 5677, pp. 619\u2013636. Springer, Heidelberg (2009)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-013-9868-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-013-9868-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-013-9868-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:58:36Z","timestamp":1559246316000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-013-9868-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,2]]},"references-count":45,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,2]]}},"alternative-id":["9868"],"URL":"https:\/\/doi.org\/10.1007\/s10623-013-9868-6","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,8,2]]}}}