{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T16:19:41Z","timestamp":1648657181900},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,3,26]],"date-time":"2014-03-26T00:00:00Z","timestamp":1395792000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1007\/s11704-014-3271-y","type":"journal-article","created":{"date-parts":[[2014,3,26]],"date-time":"2014-03-26T15:01:42Z","timestamp":1395846102000},"page":"456-468","source":"Crossref","is-referenced-by-count":2,"title":["Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks"],"prefix":"10.1007","volume":"8","author":[{"given":"Mingwu","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,26]]},"reference":[{"key":"3271_CR1","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1007\/3-540-45067-X_17","volume":"2727","author":"A Narayanan","year":"2003","unstructured":"Narayanan A, Rangan C P, Kim K. Practical pay TV schemes. Lecture Notes in Computer Science, 2003, 2727: 192\u2013203","journal-title":"Lecture Notes in Computer Science"},{"issue":"2","key":"3271_CR2","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1016\/j.jnca.2010.05.002","volume":"34","author":"Y Han","year":"2011","unstructured":"Han Y, Gui X, Wu X, and Yang X. Proxy encryption based secure multicast in wireless mesh networks. Journal of Network and Computer Applications, 2011, 34(2): 469\u2013477","journal-title":"Journal of Network and Computer Applications"},{"issue":"1","key":"3271_CR3","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/j.jnca.2011.08.001","volume":"35","author":"F Li","year":"2012","unstructured":"Li F, Khan M K, Alghathbar K, Takagi T. Identity-based online\/offline signcryption for low power devices. Journal of Network and Computer Applications, 2012, 35(1): 340\u2013347","journal-title":"Journal of Network and Computer Applications"},{"issue":"1","key":"3271_CR4","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/s11276-008-0121-6","volume":"16","author":"X Yi","year":"2010","unstructured":"Yi X, Batten L. Wireless broadcast encryption based on smart cards. Wireless Networks, 2010, 16(1): 153\u2013165","journal-title":"Wireless Networks"},{"key":"3271_CR5","first-page":"528","volume-title":"Proceedings of the 2nd IEEE International Conference on Computer Science and Information","author":"D Chourishi","year":"2009","unstructured":"Chourishi D, Seshadri S, Chourishi D. Secure content sharing using third party with broadcast encryption for stateless receivers, In: Proceedings of the 2nd IEEE International Conference on Computer Science and Information. 2009, 528\u2013531"},{"key":"3271_CR6","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1007\/978-3-540-76900-2_12","volume":"4833","author":"C Delerabl\u00e9e","year":"2007","unstructured":"Delerabl\u00e9e C, Identity based broadcast encryption with constant size ciphertexts and private keys. Lecture Notes in Computer Science, 2007, 4833: 200\u2013215","journal-title":"Lecture Notes in Computer Science"},{"issue":"2","key":"3271_CR7","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1109\/TBC.2005.847600","volume":"51","author":"X Du","year":"2005","unstructured":"Du X, Wang Y, Ge J, Wang Y. An id-based broadcast encryption scheme for key distribution. IEEE Transactions on Broadcasting, 2005, 51(2): 264\u2013266","journal-title":"IEEE Transactions on Broadcasting"},{"issue":"1\u20132","key":"3271_CR8","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/j.mcm.2011.01.056","volume":"55","author":"C Park","year":"2012","unstructured":"Park C, Hur J, Hwang S, Yoon Y. Authenticated public key broadcast encryption scheme secure against insiders\u2019 attack. Mathematical and Computer Modelling, 2012, 55(1\u20132): 113\u2013122","journal-title":"Mathematical and Computer Modelling"},{"issue":"1\u20132","key":"3271_CR9","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.mcm.2011.01.004","volume":"55","author":"L Zhang","year":"2012","unstructured":"Zhang L, Hu Y, Wu Q. Adaptively secure identity-based broadcast encyrption with constant size private key and ciphertexts from the subgroups. Mathematical and Computer Modelling, 2012, 55(1\u20132): 12\u201318","journal-title":"Mathematical and Computer Modelling"},{"key":"3271_CR10","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1007\/978-3-642-03356-8_2","volume":"5677","author":"M Naor","year":"2009","unstructured":"Naor M, Segev G. Public-key cryptosystems resilient to key leakage. Lecture Notes in Computer Science, 2009, 5677: 18\u201335","journal-title":"Lecture Notes in Computer Science"},{"key":"3271_CR11","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1007\/978-3-642-00457-5_28","volume":"5444","author":"A Akavia","year":"2009","unstructured":"Akavia A, Goldwasser S, and Vaikuntanathan V. Simultaneous hardcore bits and cryptography against memory attacks. Lecture Notes in Computer Science, 2009, 5444: 474\u2013495","journal-title":"Lecture Notes in Computer Science"},{"key":"3271_CR12","first-page":"501","volume-title":"Proceedings of the 51st Annual IEEE Symposium on Foundations of Computer Science","author":"Z Brakershi","year":"2010","unstructured":"Brakershi Z, Kalai Y T, Katz J, Vaikuntanathan V. Overcoming the hole in the bucket: public-key cryptogaphy resilient to continual memory leakage. In: Proceedings of the 51st Annual IEEE Symposium on Foundations of Computer Science. 2010, 501\u2013510"},{"key":"3271_CR13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-14623-7_1","volume":"6223","author":"Z Brakerski","year":"2010","unstructured":"Brakerski Z, Goldwasser S. Circular and leakage resilient public-Key encryption under subgroup indistinguishability. Lecture Notes in Computer Science, 2010, 6223: 1\u201320","journal-title":"Lecture Notes in Computer Science"},{"key":"3271_CR14","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1007\/978-3-642-19571-6_6","volume":"6597","author":"A B Lewko","year":"2011","unstructured":"Lewko A B, Rouselakis R, Waters B. Achieving leakage resilience through dual system encryption. Lecture Notes in Computer Science, 2011, 6597: 70\u201388","journal-title":"Lecture Notes in Computer Science"},{"issue":"8","key":"3271_CR15","doi-asserted-by":"crossref","first-page":"1044","DOI":"10.1002\/sec.678","volume":"6","author":"M Zhang","year":"2013","unstructured":"Zhang M, Yang B, Chen Z, Takagi T. Efficient and adaptively secure broadcast encryption systems. Security and Communication Networks, 2013, 6(8): 1044\u20131052","journal-title":"Security and Communication Networks"},{"key":"3271_CR16","doi-asserted-by":"crossref","first-page":"547","DOI":"10.1007\/978-3-642-20465-4_30","volume":"6332","author":"A B Lewko","year":"2011","unstructured":"Lewko A B, Waters B. Unbounded hibe and attribute-based encryption. Lecture Notes in Computer Science, 2011, 6332: 547\u2013567","journal-title":"Lecture Notes in Computer Science"},{"key":"3271_CR17","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1145\/1866307.1866325","volume-title":"Proceedings of the 17th ACM Conference on Computer and Communications Security","author":"S Chow","year":"2010","unstructured":"Chow S, Dodis Y, Rouselakis Y, Waters B. Practical leakage-resilient identity-based encryption from simple assumptions. In: Proceedings of the 17th ACM Conference on Computer and Communications Security. 2010, 152\u2013161"},{"key":"3271_CR18","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/978-3-642-13190-5_6","volume":"6110","author":"J Alwen","year":"2010","unstructured":"Alwen J, Dodis Y, and Naor M. Public-key encryption in the boundedretrieval model. Lecture Notes in Computer Science, 2010, 6110: 113\u2013134","journal-title":"Lecture Notes in Computer Science"},{"key":"3271_CR19","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1007\/978-3-642-42045-0_21","volume":"8270","author":"S Agrawal","year":"2013","unstructured":"Agrawal S, Dodis Y, Vaikuntanathan V, and Wichs D. On continual leakage of discrete log representations. Lecture Notes in Computer Science, 2013, 8270: 401\u2013420","journal-title":"Lecture Notes in Computer Science"},{"key":"3271_CR20","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/978-3-540-24676-3_14","volume":"3027","author":"D Boneh","year":"2004","unstructured":"Boneh D and Boyen X. Efficient selective-ID secure identity based encryption without random oracles. Lecture Notes in Computer Science, 2004, 3027: 223\u2013238","journal-title":"Lecture Notes in Computer Science"},{"key":"3271_CR21","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/978-3-642-01001-9_10","volume":"5479","author":"C Gentry","year":"2009","unstructured":"Gentry C, Waters B. Adaptive security in broadcast encryption systems. Lecture Notes in Computer Science, 2009, 5479: 171\u2013188","journal-title":"Lecture Notes in Computer Science"},{"key":"3271_CR22","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1007\/978-3-642-00457-5_26","volume":"5444","author":"C Gentry","year":"2009","unstructured":"Gentry C and Halevi S. Hierarchical identity based encryption with polynomially many levels. Lecture Notes in Computer Science, 2009, 5444: 437\u2013456","journal-title":"Lecture Notes in Computer Science"},{"issue":"4","key":"3271_CR23","doi-asserted-by":"crossref","first-page":"464","DOI":"10.1093\/comjnl\/bxs133","volume":"56","author":"M Zhang","year":"2013","unstructured":"Zhang M, Yang B, Takagi T. Bounded leakage-resilient funtional encryption with hidden vector predicate. The Computer Journal, 2013, 56(4): 464\u2013477","journal-title":"The Computer Journal"},{"issue":"6","key":"3271_CR24","doi-asserted-by":"crossref","first-page":"955","DOI":"10.1007\/s11704-013-3051-0","volume":"7","author":"X Zhang","year":"2013","unstructured":"Zhang X, Xu C, Zhang W, Li W. Threshold public key encryption scheme resilient against continual leakage without random oracles. Froniter of Computer Sciences, 2013, 7(6): 955\u2013968","journal-title":"Froniter of Computer Sciences"},{"key":"3271_CR25","volume-title":"Cryptology ePrint Archive, Report 2014\/079","author":"A Duc","year":"2014","unstructured":"Duc A, Dziembowski S, Faust S. Unifying leakage models: from probing attacks to noisy leakage. Cryptology ePrint Archive, Report 2014\/079, 2014."},{"key":"3271_CR26","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1007\/3-540-45247-8_8","volume":"2015","author":"A Miyaji","year":"2001","unstructured":"Miyaji A, Nakabayashi M and Takano S. Characterization of elliptic curve traces under FR-reduction. Lecture Notes in Computer Science, 2001, 2015: 90\u2013108","journal-title":"Lecture Notes in Computer Science"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-014-3271-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11704-014-3271-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-014-3271-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T21:01:19Z","timestamp":1559422879000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11704-014-3271-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,26]]},"references-count":26,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,6]]}},"alternative-id":["3271"],"URL":"https:\/\/doi.org\/10.1007\/s11704-014-3271-y","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,3,26]]}}}