{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T13:00:03Z","timestamp":1740142803570,"version":"3.37.3"},"reference-count":26,"publisher":"Oxford University Press (OUP)","issue":"2","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672346","61373153"],"award-info":[{"award-number":["61672346","61373153"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,2,1]]},"DOI":"10.1093\/comjnl\/bxx080","type":"journal-article","created":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T07:07:48Z","timestamp":1502867268000},"page":"288-318","source":"Crossref","is-referenced-by-count":2,"title":["Public-Key Encryption with Tight Simulation-Based Selective-Opening Security"],"prefix":"10.1093","volume":"61","author":[{"given":"Lin","family":"Lyu","sequence":"first","affiliation":[]},{"given":"Shengli","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Shuai","family":"Han","sequence":"additional","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2017,8,16]]},"reference":[{"year":"2009","author":"Bellare","key":"key\n\t\t\t\t20180213073652_bxx080C1"},{"year":"2012","author":"B\u00f6hl","key":"key\n\t\t\t\t20180213073652_bxx080C2"},{"year":"1999","author":"Dwork","key":"key\n\t\t\t\t20180213073652_bxx080C3"},{"year":"2011","author":"Hemenway","key":"key\n\t\t\t\t20180213073652_bxx080C4"},{"year":"2012","author":"Hofheinz","key":"key\n\t\t\t\t20180213073652_bxx080C5"},{"key":"key\n\t\t\t\t20180213073652_bxx080C6","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","article-title":"Probabilistic encryption","volume":"28","author":"Goldwasser","year":"1984","journal-title":"J. Comput. Syst. Sci."},{"year":"2016","author":"Hofheinz","key":"key\n\t\t\t\t20180213073652_bxx080C7"},{"year":"2008","author":"Peikert","key":"key\n\t\t\t\t20180213073652_bxx080C8"},{"year":"2010","author":"Fehr","key":"key\n\t\t\t\t20180213073652_bxx080C9"},{"year":"2013","author":"Huang","key":"key\n\t\t\t\t20180213073652_bxx080C10"},{"year":"2013","author":"Huang","key":"key\n\t\t\t\t20180213073652_bxx080C11"},{"year":"2015","author":"Liu","key":"key\n\t\t\t\t20180213073652_bxx080C12"},{"year":"2016","author":"Heuer","key":"key\n\t\t\t\t20180213073652_bxx080C13"},{"year":"2016","author":"Gay","key":"key\n\t\t\t\t20180213073652_bxx080C14"},{"year":"2017","author":"Hofheinz","key":"key\n\t\t\t\t20180213073652_bxx080C15"},{"year":"2000","author":"Bellare","key":"key\n\t\t\t\t20180213073652_bxx080C16"},{"year":"2012","author":"Hofheinz","key":"key\n\t\t\t\t20180213073652_bxx080C17"},{"year":"2013","author":"Chen","key":"key\n\t\t\t\t20180213073652_bxx080C18"},{"year":"2016","author":"Hofheinz","key":"key\n\t\t\t\t20180213073652_bxx080C19"},{"year":"2016","author":"Gong","key":"key\n\t\t\t\t20180213073652_bxx080C20"},{"year":"2017","author":"Chen","key":"key\n\t\t\t\t20180213073652_bxx080C21"},{"key":"key\n\t\t\t\t20180213073652_bxx080C22","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","article-title":"New hash functions and their use in authentication and set equality","volume":"22","author":"Wegman","year":"1981","journal-title":"J. Comput. Syst. Sci."},{"key":"key\n\t\t\t\t20180213073652_bxx080C23","doi-asserted-by":"crossref","first-page":"1364","DOI":"10.1137\/S0097539793244708","article-title":"A pseudorandom generator from any one-way function","volume":"28","author":"H\u00e5stad","year":"1999","journal-title":"SIAM J. Comput."},{"year":"2013","author":"Escala","key":"key\n\t\t\t\t20180213073652_bxx080C24"},{"year":"2000","author":"Damg\u00e5rd","key":"key\n\t\t\t\t20180213073652_bxx080C25"},{"year":"2014","author":"Lai","key":"key\n\t\t\t\t20180213073652_bxx080C26"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/2\/288\/23912779\/bxx080.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,13]],"date-time":"2018-02-13T07:37:45Z","timestamp":1518507465000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/2\/288\/4259796"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,16]]},"references-count":26,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2017,8,16]]},"published-print":{"date-parts":[[2018,2,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxx080","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"type":"print","value":"0010-4620"},{"type":"electronic","value":"1460-2067"}],"subject":[],"published-other":{"date-parts":[[2018,2]]},"published":{"date-parts":[[2017,8,16]]}}}