{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T19:43:22Z","timestamp":1710359002165},"reference-count":30,"publisher":"Oxford University Press (OUP)","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["The Computer Journal"],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1093\/comjnl\/bxv070","type":"journal-article","created":{"date-parts":[[2015,9,3]],"date-time":"2015-09-03T23:58:51Z","timestamp":1441324731000},"page":"508-521","source":"Crossref","is-referenced-by-count":3,"title":["Efficient Generic Construction of CCA-Secure Identity-Based Encryption from Randomness Extraction"],"prefix":"10.1093","volume":"59","author":[{"given":"Joonsang","family":"Baek","sequence":"first","affiliation":[]},{"given":"Duncan S.","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Man Ho","family":"Au","sequence":"additional","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2015,9,3]]},"reference":[{"key":"2016032809071871000_59.4.508.1","doi-asserted-by":"crossref","unstructured":"Bellare M. and Rogaway P. (1993) Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. Proc. ACM-CCS 93, Fairfax, USA, November 3\u20135, pp. 62\u201373. ACM, New York.","DOI":"10.1145\/168588.168596"},{"key":"2016032809071871000_59.4.508.2","doi-asserted-by":"crossref","unstructured":"Cramer R. and Shoup V. (2002) Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption. Proc. Eurocrypt 02, Amsterdam, The Netherlands, April 28\u2013May 2, Lecture Notes in Computer Science 2332, pp. 45\u201364. Springer, Berlin.","DOI":"10.1007\/3-540-46035-7_4"},{"key":"2016032809071871000_59.4.508.3","doi-asserted-by":"crossref","unstructured":"Cramer R. and Shoup V. (1998) A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack. Proc. Crypto 98, Santa Barbara, CA, USA, August 23\u201327, Lecture Notes in Computer Science 1462, pp. 13\u201325. Springer, Berlin.","DOI":"10.1007\/BFb0055717"},{"key":"2016032809071871000_59.4.508.4","doi-asserted-by":"crossref","unstructured":"Kurosawa K. and Desmedt Y. (2004) A New Paradigm of Hybrid Encryption Scheme. Proc. Crypto 04, Santa Barbara, CA, USA, August 15\u201319, Lecture Notes in Computer Science 3152, pp. 426\u2013442. Springer, Berlin.","DOI":"10.1007\/978-3-540-28628-8_26"},{"key":"2016032809071871000_59.4.508.5","doi-asserted-by":"crossref","unstructured":"Hofheinz D. and Kiltz E. (2007) Secure Hybrid Encryption from Weakened Key Encapsulation. Proc. Crypto 07, Santa Barbara, CA, USA, August 19\u201323, Lecture Notes in Computer Science 4622, pp. 553\u2013571. Springer, Berlin.","DOI":"10.1007\/978-3-540-74143-5_31"},{"key":"2016032809071871000_59.4.508.6","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398521"},{"key":"2016032809071871000_59.4.508.7","doi-asserted-by":"publisher","DOI":"10.1504\/IJACT.2008.017047"},{"key":"2016032809071871000_59.4.508.8","doi-asserted-by":"crossref","unstructured":"Waters B. (2005) Efficient Identity-Based Encryption Without Random Oracles. Proc. Eurocrypt 05, Aarhus, Denmark, May 22\u201326, Lecture Notes in Computer Science 3494, pp. 114\u2013127. Springer, Berlin.","DOI":"10.1007\/11426639_7"},{"key":"2016032809071871000_59.4.508.9","doi-asserted-by":"crossref","unstructured":"Boneh D. and Boyen X. (2004) Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. Proc. Eurocrypt 04, Interlaken, Switzerland, May 2\u20136, Lecture Notes in Computer Science 3027, pp. 223\u2013238. Springer, Berlin.","DOI":"10.1007\/978-3-540-24676-3_14"},{"key":"2016032809071871000_59.4.508.10","doi-asserted-by":"crossref","unstructured":"Naor M. and Yung M. (1990) Public-Key Cryptosystems Provably Secure Against Chosen Ciphertext Attacks. Proc. STOC 90, Baltimore, MD, USA, May 13\u201317, pp. 427\u2013437. ACM, New York.","DOI":"10.1145\/100216.100273"},{"key":"2016032809071871000_59.4.508.11","first-page":"1301","article-title":"Chosen-ciphertext security from identity-based encryption","volume":"5","author":"Boneh","year":"2006","journal-title":"SIAM J. Comput."},{"key":"2016032809071871000_59.4.508.12","doi-asserted-by":"crossref","unstructured":"Kiltz E. and Galindo D. (2006) Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles. Proc. ACISP 06, Melbourne, Australia, July 3\u20135, Lecture Notes in Computer Science 4058, pp. 336\u2013347. Springer, Berlin.","DOI":"10.1007\/11780656_28"},{"key":"2016032809071871000_59.4.508.13","doi-asserted-by":"crossref","unstructured":"Kiltz E. and Vahlis Y. (2008) CCA2 Secure IBE: Standard Model Efficiency Through Authenticated Symmetric Encryption. Proc. CT-RSA 08, San Francisco, CA, USA, April 8\u201311, Lecture Notes in Computer Science 4964, pp. 221\u2013238. Springer, Berlin.","DOI":"10.1007\/978-3-540-79263-5_14"},{"key":"2016032809071871000_59.4.508.14","doi-asserted-by":"crossref","unstructured":"Chen Y. , Zhang Z. , Lin D. and Cao Z. (2012) Identity-Based Extractable Hash Proof Systems and their Applications. Proc. ACNS 12, Singapore, June 26\u201329, Lecture Notes in Computer Science 7341, pp. 153\u2013170. Springer, Berlin.","DOI":"10.1007\/978-3-642-31284-7_10"},{"key":"2016032809071871000_59.4.508.15","doi-asserted-by":"crossref","unstructured":"Wee H. (2010) Efficient Chosen-Ciphertext Security via Extractable Hash proofs. Proc. Crypto 10, Santa Barbara, CA, USA, August 15\u201319, Lecture Notes in Computer Science 6223, pp. 314\u2013332. Springer, Berlin.","DOI":"10.1007\/978-3-642-14623-7_17"},{"key":"2016032809071871000_59.4.508.16","doi-asserted-by":"crossref","unstructured":"Kiltz E. , Pietrzak K. , Stam M. and Yung M. (2009) A New Randomness Extraction Paradigm for Hybrid Encryption. Proc. Eurocrypt 09, Cologne, Germany, April 26\u201330, Lecture Notes in Computer Science 5479, pp. 590\u2013609. Springer, Berlin.","DOI":"10.1007\/978-3-642-01001-9_34"},{"key":"2016032809071871000_59.4.508.17","doi-asserted-by":"crossref","unstructured":"Alwen M , Dodis Y. , Naor M. , Segev G. , Walfish S. and Wichs D. (2010) Public-Key Encryption in the Bounded-Retrieval Model. Proc. Eurocrypt 10, French Riviera, France, May 26\u201328, Lecture Notes in Computer Science 6110, pp. 113\u2013134. Springer, Berlin.","DOI":"10.1007\/978-3-642-13190-5_6"},{"key":"2016032809071871000_59.4.508.18","unstructured":"Cormen T. , Leiserson C. , Rivest R. and Clifford C. (2009) Introduction to Algorithms (3rd edn). MIT Press, Cambridge, MA, USA."},{"key":"2016032809071871000_59.4.508.19","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd I. , Goldreich O. , Okamoto T. and Wigderson A. (1995) Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge Proofs. Proc. Crypto 95, Santa Barbara, CA, USA, August 27\u201331, Lecture Notes in Computer Science 963, pp. 325\u2013338. Springer, Berlin.","DOI":"10.1007\/3-540-44750-4_26"},{"key":"2016032809071871000_59.4.508.20","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-009-9051-4"},{"key":"2016032809071871000_59.4.508.21","doi-asserted-by":"crossref","unstructured":"S., Chatterjee and Sarkar P. (2005) Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model. Proc. ICISC 05, Seoul, Korea, December 1\u20132, Lecture Notes in Computer Science 3935, pp. 424\u2013440. Springer, Berlin.","DOI":"10.1007\/11734727_33"},{"key":"2016032809071871000_59.4.508.22","unstructured":"Naccache D. (2005) Secure and Practical Identity-Based Encryption. Cryptology ePrint Archive, Report 2005\/369."},{"key":"2016032809071871000_59.4.508.23","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2009.08.007"},{"key":"2016032809071871000_59.4.508.24","doi-asserted-by":"crossref","unstructured":"Boyen X. , Mei Q. and Waters B. (2005) Direct Chosen Ciphertext Security from Identity-Based Techniques. Proc. ACM-CCS 05, Alexandria, VA, USA, November 7\u201311, pp. 320\u2013329. ACM, New York.","DOI":"10.1145\/1102120.1102162"},{"key":"2016032809071871000_59.4.508.25","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxs133"},{"key":"2016032809071871000_59.4.508.26","doi-asserted-by":"crossref","unstructured":"Chow S.M. , Dodis Y. , Rouselakis Y. and Waters B. (2010) Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions. Proc. ACM-CCS 10, Chicago, IL, USA, October 4\u20138, pp. 152\u2013161. ACM, New York.","DOI":"10.1145\/1866307.1866325"},{"key":"2016032809071871000_59.4.508.27","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539793244708"},{"key":"2016032809071871000_59.4.508.28","doi-asserted-by":"crossref","unstructured":"Bellare M. and Namprepre C. (2000) Authenticated Encryption: Relations Among Notions and Analysis of the Generic Composition Paradigm. Proc. Asiacrypt 00, Kyoto, Japan, December 3\u20137, Lecture Notes in Computer Science 1976, pp. 531\u2013545. Springer, Berlin.","DOI":"10.1007\/3-540-44448-3_41"},{"key":"2016032809071871000_59.4.508.29","doi-asserted-by":"crossref","unstructured":"Gentry C. (2006) Practical Identity-Based Encryption Without Random Oracles. Proc. Eurocrypt 06, St. Petersburg, Russia, May 28\u2013June 1, Lecture Notes in Computer Science 4004, pp. 445\u2013464. Springer, Berlin.","DOI":"10.1007\/11761679_27"},{"key":"2016032809071871000_59.4.508.30","doi-asserted-by":"crossref","unstructured":"Lewko A.B. and Waters B. (2010) New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts. Proc. TCC 10, Zurich, Switzerland, February 9\u201311, Lecture Notes in Computer Science 5978, pp. 455\u2013479. Springer, Berlin.","DOI":"10.1007\/978-3-642-11799-2_27"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/59\/4\/508\/9986746\/bxv070.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,30]],"date-time":"2019-08-30T05:12:46Z","timestamp":1567141966000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article-lookup\/doi\/10.1093\/comjnl\/bxv070"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,3]]},"references-count":30,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2016,3,28]]},"published-print":{"date-parts":[[2016,4]]}},"alternative-id":["10.1093\/comjnl\/bxv070"],"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxv070","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,9,3]]}}}