{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:14:05Z","timestamp":1763507645475},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540772712"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77272-9_16","type":"book-chapter","created":{"date-parts":[[2007,12,6]],"date-time":"2007-12-06T11:56:55Z","timestamp":1196942215000},"page":"257-276","source":"Crossref","is-referenced-by-count":8,"title":["Randomness Reuse: Extensions and Improvements"],"prefix":"10.1007","author":[{"given":"Manuel","family":"Barbosa","sequence":"first","affiliation":[]},{"given":"Pooya","family":"Farshim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Abe, M., Cui, Y., Imai, H., Kiltz, E.: Efficient Hybrid Encryption from ID-Based Encryption. Cryptology ePrint Archive, Report 2007\/023 (2007)"},{"key":"16_CR2","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/s10207-006-0002-x","volume":"5","author":"S.S. Al-Riyami","year":"2006","unstructured":"Al-Riyami, S.S., Malone-Lee, J., Smart, N.P.: Escrow-Free Encryption Supporting Cryptographic Workflow. International Journal of Information Security\u00a05, 217\u2013230 (2006)","journal-title":"International Journal of Information Security"},{"key":"16_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/978-3-540-40061-5_29","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"S.S. Al-Riyami","year":"2003","unstructured":"Al-Riyami, S.S., Paterson, K.G.: Certificateless Public-Key Cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol.\u00a02894, pp. 452\u2013473. Springer, Heidelberg (2003)"},{"key":"16_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/3-540-36288-6_7","volume-title":"Public Key Cryptography - PKC 2003","author":"M. Bellare","year":"2002","unstructured":"Bellare, M., Boldyreva, A., Staddon, J.: Randomness Re-Use in Multi-recipient Encryption Schemes. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol.\u00a02567, pp. 85\u201399. Springer, Heidelberg (2002)"},{"key":"16_CR5","volume-title":"3th ACM Conference on Computer and Communications Security \u2013 CCS","author":"M. Bellare","year":"2006","unstructured":"Bellare, M., Kohno, T., Shoup, V.: Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation. In: 3th ACM Conference on Computer and Communications Security \u2013 CCS, ACM, New York (2006)"},{"key":"16_CR6","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D. Boneh","year":"2003","unstructured":"Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. SIAM Journal on Computing\u00a032, 586\u2013615 (2003)","journal-title":"SIAM Journal on Computing"},{"key":"16_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/BFb0055717","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"R. Cramer","year":"1998","unstructured":"Cramer, R., Shoup, V.: A Practical Public-Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 13\u201325. Springer, Heidelberg (1998)"},{"key":"16_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/978-3-540-40974-8_12","volume-title":"Cryptography and Coding","author":"A.W. Dent","year":"2003","unstructured":"Dent, A.W.: A Designer\u2019s Guide to KEMs. In: Paterson, K.G. (ed.) Cryptography and Coding. LNCS, vol.\u00a02898, pp. 133\u2013151. Springer, Heidelberg (2003)"},{"key":"16_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1007\/3-540-48405-1_34","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"E. Fujisaki","year":"1999","unstructured":"Fujisaki, E., Okamoto, T.: Secure Integration of Asymmetric and Symmetric Encryption Schemes. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 537\u2013554. Springer, Heidelberg (1999)"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Hastad, J.: Solving Simultaneous Modular Equations of Low Degree. SIMA Journal on Computing\u00a017(2) (April 1988)","DOI":"10.1137\/0217019"},{"key":"16_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/3-540-45664-3_4","volume-title":"Public Key Cryptography","author":"K. Kurosawa","year":"2002","unstructured":"Kurosawa, K.: Multi-Recipient Public-Key Encryption with Shortened Ciphertext. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol.\u00a02274, pp. 48\u201363. Springer, Heidelberg (2002)"},{"key":"16_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1007\/978-3-540-30598-9_15","volume-title":"Security in Communication Networks","author":"N.P. Smart","year":"2005","unstructured":"Smart, N.P.: Efficient Key Encapsulation to Multiple Parties. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol.\u00a03352, pp. 208\u2013219. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Cryptography and Coding"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77272-9_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:06:55Z","timestamp":1619521615000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77272-9_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540772712"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77272-9_16","relation":{},"subject":[]}}