{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T13:12:05Z","timestamp":1723209125356},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,6,17]],"date-time":"2020-06-17T00:00:00Z","timestamp":1592352000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,17]],"date-time":"2020-06-17T00:00:00Z","timestamp":1592352000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1007\/s11277-020-07606-6","type":"journal-article","created":{"date-parts":[[2020,6,17]],"date-time":"2020-06-17T06:02:12Z","timestamp":1592373732000},"page":"961-969","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Identity Based Broadcast Encryption Scheme with Shorter Decryption Keys for Open Networks"],"prefix":"10.1007","volume":"115","author":[{"given":"Pragya","family":"Mishra","sequence":"first","affiliation":[]},{"family":"Renuka","sequence":"additional","affiliation":[]},{"given":"Vandani","family":"Verma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,17]]},"reference":[{"key":"7606_CR1","doi-asserted-by":"crossref","unstructured":"Fiat, A., & Naor, M. (1993). Broadcast encryption. In Proceedings of Crypto\u201993, volume 773 of LNCS (pp 480\u2013491). Springer.","DOI":"10.1007\/3-540-48329-2_40"},{"key":"7606_CR2","doi-asserted-by":"crossref","unstructured":"Boneh, D., Gentry, C., & Waters, B. (2005). Collusion resistant Broadcast Encryption with short cipher texts and private keys. In Proceedings of Crypto\u201905, volume 3621 of LNCS (pp. 258\u2013275).","DOI":"10.1007\/11535218_16"},{"key":"7606_CR3","doi-asserted-by":"crossref","unstructured":"Delerabl\u00e9e, C., Paillier, P., & Pointcheval, D. (2007). Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys. In Pairing-based cryptography\u2013pairing 2007 (pp. 39\u201359), Springer.","DOI":"10.1007\/978-3-540-73489-5_4"},{"key":"7606_CR4","doi-asserted-by":"crossref","unstructured":"Boneh, D., Sahai, A., & Waters, B. (2006). Fully collusion resistant traitor tracing with short ciphertexts and private keys. In EUROCRYPT 2006 (vol. 4004, pp. 573\u2013592). Heidelberg: LNCS, Springer.","DOI":"10.1007\/11761679_34"},{"key":"7606_CR5","doi-asserted-by":"crossref","unstructured":"Shamir, A. (1985). Identity-based cryptosystems and signature schemes. In Advances in cryptology (pp. 47\u201353).","DOI":"10.1007\/3-540-39568-7_5"},{"key":"7606_CR6","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D Boneh","year":"2003","unstructured":"Boneh, D., & Franklin, M. (2003). Identity-based encryption from the Weil pairing. SIAM Journal on Computing, 32, 586\u2013615.","journal-title":"SIAM Journal on Computing"},{"key":"7606_CR7","doi-asserted-by":"crossref","unstructured":"Gentry, C. (2006). Practical identity-based encryption without random oracles. In Advances in Cryptology-EUROCRYPT 2006 (pp. 445\u2013464). Springer.","DOI":"10.1007\/11761679_27"},{"key":"7606_CR8","first-page":"217","volume":"2007","author":"R Sakai","year":"2007","unstructured":"Sakai, R., & Furukawa, J. (2007). Identity-based broadcast encryption. IACR Cryptology ePrint Archive, 2007, 217.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"7606_CR9","doi-asserted-by":"crossref","unstructured":"Delerabl\u00e9e, C. (2007). Identity-based broadcast encryption with constant size ciphertexts and private keys. In Advances in cryptology\u2014ASIACRYPT 2007 (pp. 200\u2013215). Springer.","DOI":"10.1007\/978-3-540-76900-2_12"},{"key":"7606_CR10","doi-asserted-by":"crossref","unstructured":"Boneh, D., Waters, B., & Zhandry, M. (2014). Low overhead broadcast encryption from multilinear maps. In Advances in cryptology\u2014CRYPTO 2014 (pp. 206\u2013223). Springer.","DOI":"10.1007\/978-3-662-44371-2_12"},{"key":"7606_CR11","doi-asserted-by":"publisher","first-page":"40","DOI":"10.4018\/ijdcf.2014040103","volume":"6","author":"X Li","year":"2014","unstructured":"Li, X., & Yanli, R. (2014). Efficient anonymous identity-based broadcast encryption without random oracles. International Journal of Digital Crime and Forensics (IJDCF), 6, 40\u201351.","journal-title":"International Journal of Digital Crime and Forensics (IJDCF)"},{"key":"7606_CR12","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1109\/TIFS.2014.2388156","volume":"10","author":"J Kim","year":"2015","unstructured":"Kim, J., Susilo, W., Au, M. H., & Seberry, J. (2015). Adaptively secure identity-based broadcast encryption with a constant-sized ciphertext. IEEE Transactions on Information Forensics and Security, 10, 679\u2013693.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"7606_CR13","doi-asserted-by":"crossref","unstructured":"Wu, Q., Qin, B., Zhang, L., Domingo-Ferrer, J. & Farras, O. (2011). Bridging broadcast encryption and group key agreement. In Advances in cryptology\u2013ASIACRYPT 2011 (pp. 143\u2013160), Springer.","DOI":"10.1007\/978-3-642-25385-0_8"},{"key":"7606_CR14","doi-asserted-by":"crossref","unstructured":"Wu, Q., Mu, Y., Susilo, W., Qinand, B., & Domingo-Ferrer, J. (2009). Asymmetric group key agreement. In Advances in cryptology\u2014EUROCRYPT 2009 (pp. 153\u2013170). Springer.","DOI":"10.1007\/978-3-642-01001-9_9"},{"key":"7606_CR15","doi-asserted-by":"crossref","unstructured":"Boneh, D., Gentry, C., Lynn, B., & Shacham, H. (2003). Aggregate and verifiably encrypted signatures from bilinear maps. In EUROCRYPT 2003 (Vol. 2656, pp. 416\u2013432). Heidelberg: LNCS, Springer.","DOI":"10.1007\/3-540-39200-9_26"},{"key":"7606_CR16","doi-asserted-by":"publisher","unstructured":"Li, M. C., Xu, X., Zhuang, R., Guo, C., & Tan, X. (2015). Identity based broadcast encryption schemes for open networks. In 9th international conference on frontier of computer science & technology. https:\/\/doi.org\/10.1109\/fcsc.2015.20.","DOI":"10.1109\/fcsc.2015.20"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07606-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-020-07606-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07606-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,16]],"date-time":"2021-06-16T23:11:55Z","timestamp":1623885115000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-020-07606-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,17]]},"references-count":16,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["7606"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07606-6","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,17]]},"assertion":[{"value":"17 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}