{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T00:56:07Z","timestamp":1768265767366,"version":"3.49.0"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T00:00:00Z","timestamp":1556841600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502044"],"award-info":[{"award-number":["61502044"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["2015RC23"],"award-info":[{"award-number":["2015RC23"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s11042-019-7598-0","type":"journal-article","created":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T13:10:09Z","timestamp":1556889009000},"page":"23399-23414","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Authenticated public key broadcast encryption with short ciphertexts"],"prefix":"10.1007","volume":"78","author":[{"given":"Dianli","family":"Guo","sequence":"first","affiliation":[]},{"given":"Qiaoyan","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Zhengping","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Wenmin","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,3]]},"reference":[{"key":"7598_CR1","doi-asserted-by":"crossref","unstructured":"Boneh D, Gentry C, Waters B (2005) Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Advances in Cryptology-CRYPTO 2005. Springer, pp 258\u2013275","DOI":"10.1007\/11535218_16"},{"key":"7598_CR2","doi-asserted-by":"crossref","unstructured":"Boneh D, Naor M (2008) Traitor tracing with constant size ciphertext. In: Proceedings of the 15th ACM conference on Computer and communications security. ACM, pp 501\u2013510","DOI":"10.1145\/1455770.1455834"},{"key":"7598_CR3","doi-asserted-by":"crossref","unstructured":"Boneh D, Sahai A, Waters B (2006) Fully collusion resistant traitor tracing with short ciphertexts and private keys. In: Advances in Cryptology-EUROCRYPT 2006. Springer, pp 573\u2013592","DOI":"10.1007\/11761679_34"},{"issue":"1","key":"7598_CR4","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1090\/conm\/324\/05731","volume":"324","author":"D Boneh","year":"2003","unstructured":"Boneh D, Silverberg A (2003) Applications of multilinear forms to cryptography. Contemp Math 324(1):71\u201390","journal-title":"Contemp Math"},{"key":"7598_CR5","doi-asserted-by":"crossref","unstructured":"Boneh D, Silverberg A (2003) Applications of multilinear forms to cryptography, vol 324, pp 71\u201390","DOI":"10.1090\/conm\/324\/05731"},{"key":"7598_CR6","doi-asserted-by":"crossref","unstructured":"Boneh D, Waters B (2006) A fully collusion resistant broadcast, trace, and revoke system. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, pp 211\u2013220","DOI":"10.1145\/1180405.1180432"},{"key":"7598_CR7","doi-asserted-by":"crossref","unstructured":"Boneh D, Waters B, Zhandry M (2014) Low overhead broadcast encryption from multilinear maps. In: Advances in Cryptology-CRYPTO 2014. Springer, pp 206\u2013223","DOI":"10.1007\/978-3-662-44371-2_12"},{"key":"7598_CR8","doi-asserted-by":"crossref","unstructured":"Boneh D, Zhandry M (2014) Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. In: Advances in Cryptology-CRYPTO 2014. Springer, pp 480\u2013499","DOI":"10.1007\/978-3-662-44371-2_27"},{"issue":"3","key":"7598_CR9","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1109\/18.841169","volume":"46","author":"B Chor","year":"2000","unstructured":"Chor B, Fiat A, Naor M, Pinkas B (2000) Tracing traitors. IEEE Trans Inf Theory 46(3):893\u2013910","journal-title":"IEEE Trans Inf Theory"},{"key":"7598_CR10","doi-asserted-by":"crossref","unstructured":"Coron JS, Lee MS, Lepoint T, Tibouchi M (2016) Cryptanalysis of GGH15 multilinear maps. In: Advances in Cryptology-CCRYPTO 2016. Springer, pp 607\u2013628","DOI":"10.1007\/978-3-662-53008-5_21"},{"key":"7598_CR11","doi-asserted-by":"crossref","unstructured":"Coron JS, Lepoint T, Tibouchi M (2013) Practical multilinear maps over the integers. In: Advances in cryptology-CRYPTO 2013. Springer, pp 476\u2013493","DOI":"10.1007\/978-3-642-40041-4_26"},{"issue":"2","key":"7598_CR12","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1109\/TBC.2005.847600","volume":"51","author":"X Du","year":"2005","unstructured":"Du X, Wang Y, Ge J, Wang Y (2005) An ID-based broadcast encryption scheme for key distribution. IEEE Trans Broadcast 51(2):264\u2013266","journal-title":"IEEE Trans Broadcast"},{"issue":"3","key":"7598_CR13","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1016\/j.jksuci.2015.11.001","volume":"28","author":"M Elhoseny","year":"2016","unstructured":"Elhoseny M, Elminir H, Riad A, Yuan X (2016) A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. Journal of King Saud University - Computer and Information Sciences 28(3):262\u2013275","journal-title":"Journal of King Saud University - Computer and Information Sciences"},{"issue":"13","key":"7598_CR14","doi-asserted-by":"crossref","first-page":"2024","DOI":"10.1002\/sec.1459","volume":"9","author":"M Elhoseny","year":"2016","unstructured":"Elhoseny M, Yuan X, ElMinir HK, Riad AM (2016) An energy efficient encryption method for secure dynamic WSN. Security and Communication Networks 9(13):2024\u20132031","journal-title":"Security and Communication Networks"},{"key":"7598_CR15","unstructured":"Fiat A, Naor M (1993) Broadcast encryption. In: Advances in Cryptology-CRYPTO. Springer, pp 480\u2013491"},{"key":"7598_CR16","doi-asserted-by":"crossref","unstructured":"Garg S, Gentry C, Halevi S (2013) Candidate multilinear maps from ideal lattices. In: Advances in Cryptology-EUROCRYPT 2013. Springer, pp 1\u201317","DOI":"10.1007\/978-3-642-38348-9_1"},{"key":"7598_CR17","doi-asserted-by":"crossref","unstructured":"Garg S, Gentry C, Halevi S, Raykova M, Sahai A, Waters B (2013) Candidate indistinguishability obfuscation and functional encryption for all circuits. In: Proceedings 54th annual symposium on foundations of computer science. IEEE, pp 40\u201349","DOI":"10.1109\/FOCS.2013.13"},{"key":"7598_CR18","doi-asserted-by":"crossref","unstructured":"Garg S, Kumarasubramanian A, Sahai A, Waters B (2010) Building efficient fully collusion-resilient traitor tracing and revocation schemes. In: Proceedings of the 17th ACM conference on computer and communications security. ACM, pp 121\u2013130","DOI":"10.1145\/1866307.1866322"},{"key":"7598_CR19","doi-asserted-by":"crossref","unstructured":"Gentry C, Waters B (2009) Adaptive security in broadcast encryption systems (with short ciphertexts). In: Advances in Cryptology-EUROCRYPT 2009. Springer, pp 171\u2013188","DOI":"10.1007\/978-3-642-01001-9_10"},{"issue":"3","key":"7598_CR20","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1109\/TBC.2016.2550759","volume":"62","author":"D Guo","year":"2016","unstructured":"Guo D, Wen Q, Li W, Zhang H, Jin Z (2016) Adaptively secure broadcast encryption with constant ciphertexts. IEEE Trans Broadcast 62(3):709\u2013715","journal-title":"IEEE Trans Broadcast"},{"key":"7598_CR21","doi-asserted-by":"crossref","unstructured":"Hu Y, Jia H (2016) Cryptanalysis of GGH map. In: Advances in Cryptology-EUROCRYPT 2016. Springer, pp 537\u2013565","DOI":"10.1007\/978-3-662-49890-3_21"},{"issue":"4","key":"7598_CR22","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/s00145-004-0312-y","volume":"17","author":"A Joux","year":"2004","unstructured":"Joux A (2004) A one round protocol for tripartite Diffie-Hellman. J Cryptol 17 (4):263\u2013276","journal-title":"J Cryptol"},{"issue":"4","key":"7598_CR23","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/s00145-003-0052-4","volume":"16","author":"A Joux","year":"2003","unstructured":"Joux A, Nguyen K (2003) Separating decision Diffie-Hellman from Diffie- Hellman in cryptographic groups. J Cryptol 16(4):239\u2013247","journal-title":"J Cryptol"},{"issue":"3","key":"7598_CR24","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1109\/TIFS.2014.2388156","volume":"10","author":"K Kim","year":"2015","unstructured":"Kim K, Susilo W, Ho Au M, Seberry J (2015) Adaptively secure identity-based broadcast encryption with a constant-sized ciphertext. IEEE Trans Inf Forensics Secur 10(3):679\u2013693","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"7","key":"7598_CR25","doi-asserted-by":"publisher","first-page":"4230","DOI":"10.1109\/TIT.2013.2251756","volume":"59","author":"T Laarhoven","year":"2013","unstructured":"Laarhoven T, Doumen J, Roelse P, Skoric B, de Weger B (2013) Dynamic tardos traitor tracing schemes. IEEE Trans Inf Theory 59(7):4230\u20134242","journal-title":"IEEE Trans Inf Theory"},{"key":"7598_CR26","doi-asserted-by":"crossref","unstructured":"Langlois A, Stehl D, Steinfeld R (2014) GGHLite: more efficient multilinear maps from ideal lattices. In: Advances in Cryptology-EUROCRYPT 2014. Springer, pp 239\u2013256","DOI":"10.1007\/978-3-642-55220-5_14"},{"key":"7598_CR27","doi-asserted-by":"crossref","unstructured":"Lee K, Koo WK, Dong HL, Park JH (2014) Public-key revocation and tracing schemes with subset difference methods revisited. In: Advances in ESORICS 2014. Springer, pp 1\u201318","DOI":"10.1007\/978-3-319-11212-1_1"},{"issue":"1","key":"7598_CR28","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/s10207-015-0287-8","volume":"15","author":"W Liu","year":"2016","unstructured":"Liu W, Liu J, Wu Q, Qin B, Li Y (2016) Practical chosen-ciphertext secure hierarchical identity-based broadcast encryption. Int J Inf Secur 15(1):35\u201350","journal-title":"Int J Inf Secur"},{"key":"7598_CR29","doi-asserted-by":"crossref","unstructured":"Nishimaki R, Wichs D, Zhandry M (2016) Anonymous traitor tracing: how to embed arbitrary information in a key. In: Advances in Cryptology-EUROCRYPT 2016. Springer, pp 388\u2013419","DOI":"10.1007\/978-3-662-49896-5_14"},{"issue":"1","key":"7598_CR30","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.mcm.2011.01.056","volume":"55","author":"C Park","year":"2012","unstructured":"Park C, Hur J, Hwang S, Yoon H (2012) Authenticated public key broadcast encryption scheme secure against insiders attack. Math Comput Model 55(1):113\u2013122","journal-title":"Math Comput Model"},{"issue":"3","key":"7598_CR31","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/TBC.2008.919940","volume":"54","author":"JH Park","year":"2008","unstructured":"Park JH, Kim HJ, Sung MH, Lee DH (2008) Public key broadcast encryption schemes with shorter transmissions. IEEE Trans Broadcast 54(3):401\u2013411","journal-title":"IEEE Trans Broadcast"},{"issue":"5","key":"7598_CR32","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1109\/JCN.2011.6112299","volume":"13","author":"JH Park","year":"2011","unstructured":"Park JH, Rhee HS, Lee DH (2011) Fully collusion-resistant trace-and-revoke scheme in prime-order groups. J Commun Netw 13(5):428\u2013441","journal-title":"J Commun Netw"},{"key":"7598_CR33","doi-asserted-by":"publisher","unstructured":"Salve AD, Pietro RD, Mori P, Ricci L (2017) A logical key hierarchy based approach to preserve content privacy in decentralized online social networks. IEEE Transactions on Dependable and Secure Computing. https:\/\/doi.org\/10.1109\/TDSC.2017.2729553","DOI":"10.1109\/TDSC.2017.2729553"},{"key":"7598_CR34","unstructured":"Selvi SSD, Vivek SS, Gopalakrishnan R, Karuturi NN, Rangan CP (2008) Cryptanalysis of Mu et al. and Li et al. Schemes and a provably secure ID-based broadcast Signcryption (IBBSC) scheme. In: International Workshop on Information Security Applications 2008. Springer, pp 115\u2013129"},{"issue":"99","key":"7598_CR35","doi-asserted-by":"publisher","first-page":"10269","DOI":"10.1109\/ACCESS.2018.2799240","volume":"6","author":"A Shehab","year":"2018","unstructured":"Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6(99):10269\u201310278","journal-title":"IEEE Access"},{"key":"7598_CR36","doi-asserted-by":"publisher","unstructured":"Thakur S, Singh AK, Ghrera SP, Elhoseny M (2018) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimedia Tools and Applications 2. https:\/\/doi.org\/10.1007\/s11042-018-6263-3","DOI":"10.1007\/s11042-018-6263-3"},{"key":"7598_CR37","doi-asserted-by":"crossref","unstructured":"Waters B (2009) Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: Advances in Cryptology-CRYPTO 2009. Springer, pp 619\u2013636","DOI":"10.1007\/978-3-642-03356-8_36"},{"key":"7598_CR38","unstructured":"Zhandry M (2014) Adaptively secure broadcast encryption with small system parameters. IACR Cryptology ePrint Archive 757. http:\/\/eprint.iacr.org\/2014\/757"},{"issue":"1-2","key":"7598_CR39","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.mcm.2011.01.004","volume":"55","author":"L Zhang","year":"2012","unstructured":"Zhang L, Hu Y, Wu Q (2012) Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups. Math Comput Model 55(1-2):12\u201318","journal-title":"Math Comput Model"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7598-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-7598-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7598-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,16]],"date-time":"2023-09-16T07:59:17Z","timestamp":1694851157000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-7598-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,3]]},"references-count":39,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["7598"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-7598-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,3]]},"assertion":[{"value":"7 May 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 April 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 May 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}