{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:57:55Z","timestamp":1742399875713},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2014,8,17]],"date-time":"2014-08-17T00:00:00Z","timestamp":1408233600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1007\/s11432-014-5139-z","type":"journal-article","created":{"date-parts":[[2014,8,16]],"date-time":"2014-08-16T07:18:08Z","timestamp":1408173488000},"page":"1-10","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["DNA-chip-based dynamic broadcast encryption scheme with constant-size ciphertexts and decryption keys"],"prefix":"10.1007","volume":"57","author":[{"given":"XiWen","family":"Fang","sequence":"first","affiliation":[]},{"given":"XueJia","family":"Lai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,17]]},"reference":[{"key":"5139_CR1","doi-asserted-by":"crossref","first-page":"1021","DOI":"10.1126\/science.7973651","volume":"266","author":"L M Adleman","year":"1994","unstructured":"Adleman L M. Molecular computation of solutions to combinatorial problems. Science, 1994, 266: 1021\u20131024","journal-title":"Science"},{"key":"5139_CR2","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1038\/21092","volume":"399","author":"C T Clelland","year":"1999","unstructured":"Clelland C T, Risca V, Bancroft C. Hiding messages in DNA microdots. Nature, 1999, 399: 533\u2013534","journal-title":"Nature"},{"key":"5139_CR3","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1007\/978-3-540-24635-0_12","volume":"2950","author":"A Gehani","year":"2004","unstructured":"Gehani A, LaBean T, Reif J. DNA-based cryptography. Lecture Notes in Comput Sci, 2004, 2950: 167\u2013188","journal-title":"Lecture Notes in Comput Sci"},{"key":"5139_CR4","doi-asserted-by":"crossref","first-page":"542","DOI":"10.1126\/science.7725098","volume":"268","author":"R Lipton","year":"1995","unstructured":"Lipton R. Using DNA to solve NP-complete problems. Science, 1995, 268: 542\u2013545","journal-title":"Science"},{"key":"5139_CR5","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1090\/dimacs\/027\/04","volume-title":"DNA Based Computers: Proceedings of a DIMACS Workshop. American Mathematical Society","author":"D Boneh","year":"1996","unstructured":"Boneh D, Dunworth C, Lipton R J. Breaking DES using a molecular computer. In: Lipton R J, Baum E B, eds. DNA Based Computers: Proceedings of a DIMACS Workshop. American Mathematical Society, 1996. 37\u201365"},{"key":"5139_CR6","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1007\/s11432-007-0025-6","volume":"50","author":"M X Lu","year":"2007","unstructured":"Lu M X, Lai X J, Xiao G Z, et al. Symmetric-key cryptosystem with DNA technology. Sci China Inf Sci, 2007, 50: 324\u2013333","journal-title":"Sci China Inf Sci"},{"key":"5139_CR7","doi-asserted-by":"crossref","first-page":"506","DOI":"10.1007\/s11432-010-0063-3","volume":"53","author":"X J Lai","year":"2010","unstructured":"Lai X J, Lu M X, Qin L, et al. Asymmetric encryption and signature method with DNA technology. Sci China Inf Sci, 2010, 53: 506\u2013514","journal-title":"Sci China Inf Sci"},{"key":"5139_CR8","first-page":"480","volume-title":"Advances in Cryptology-Crypto 1993","author":"A Fiat","year":"1994","unstructured":"Fiat A, Naor M. Broadcast encryption. In: Stinson D R, ed. Advances in Cryptology-Crypto 1993. Santa Barbara: Springer, 1994. 480\u2013491"},{"key":"5139_CR9","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/978-3-540-73489-5_4","volume-title":"Pairing-Based Cryptography-Pairing 2007","author":"C Delerabl\u00e9e","year":"2007","unstructured":"Delerabl\u00e9e C, Paillier P, Pointcheval D. Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys. In: Takagi T, Okamoto T, Okamoto E, et al., eds. Pairing-Based Cryptography-Pairing 2007. Heidelberg: Springer, 2007. 39\u201350"},{"key":"5139_CR10","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1007\/11535218_16","volume-title":"Advances in Cryptology-Crypto 2005","author":"D Boneh","year":"2005","unstructured":"Boneh D, Gentry C, Waters B. Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup V, ed. Advances in Cryptology-Crypto 2005. Heidelberg: Springer, 2005. 258\u2013275"},{"key":"5139_CR11","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1007\/BF01116186","volume":"1","author":"W Gilbert","year":"1981","unstructured":"Gilbert W. DNA sequencing and gene structure. Biosci Rep, 1981, 1: 353\u2013375","journal-title":"Biosci Rep"},{"key":"5139_CR12","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF01115145","volume":"1","author":"F Sanger","year":"1981","unstructured":"Sanger F. Determination of nucleotide sequences in DNA. Biosci Rep, 1981, 1: 3\u201318","journal-title":"Biosci Rep"},{"key":"5139_CR13","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1090\/dimacs\/048\/03","volume-title":"Third Annual DIMACS Workshop on DNA Based Computers. University of Pennsylvania: American Mathematical Society","author":"J Khodor","year":"1999","unstructured":"Khodor J, Gifford D K. The efficiency of sequence-specific separation of dna mixtures for biological computing. In: Rubin H, ed. Third Annual DIMACS Workshop on DNA Based Computers. University of Pennsylvania: American Mathematical Society, 1999. 39\u201346"},{"key":"5139_CR14","doi-asserted-by":"crossref","first-page":"680","DOI":"10.1126\/science.278.5338.680","volume":"278","author":"J L DeRisi","year":"1997","unstructured":"DeRisi J L, Iyer V R, Brown P O. Exploring the metabolic and genetic control of gene expression on a genomic scale. Science, 1997, 278: 680\u2013686","journal-title":"Science"},{"key":"5139_CR15","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/3-540-44647-8_3","volume-title":"Advances in Cryptology CRYPTO 2001","author":"D Naor","year":"2001","unstructured":"Naor D, Naor M, Lotspiech J. Revocation and tracing schemes for stateless receivers. In: Kilian J, ed. Advances in Cryptology CRYPTO 2001. Santa Barbara: Springer, 2001. 41\u201362"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-014-5139-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-014-5139-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-014-5139-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,13]],"date-time":"2019-08-13T22:22:58Z","timestamp":1565734978000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-014-5139-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,17]]},"references-count":15,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2014,9]]}},"alternative-id":["5139"],"URL":"https:\/\/doi.org\/10.1007\/s11432-014-5139-z","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,8,17]]}}}