{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T09:36:52Z","timestamp":1758274612340},"reference-count":35,"publisher":"Oxford University Press (OUP)","issue":"4","license":[{"start":{"date-parts":[[2017,12,11]],"date-time":"2017-12-11T00:00:00Z","timestamp":1512950400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/about_us\/legal\/notices"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4,1]]},"DOI":"10.1093\/comjnl\/bxx111","type":"journal-article","created":{"date-parts":[[2017,12,6]],"date-time":"2017-12-06T12:08:42Z","timestamp":1512562122000},"page":"561-574","source":"Crossref","is-referenced-by-count":4,"title":["Novel Smooth Hash Proof Systems Based on Lattices"],"prefix":"10.1093","volume":"61","author":[{"given":"Qiqi","family":"Lai","sequence":"first","affiliation":[{"name":"School of Computer Science, Shaanxi Normal University, Xi\u2019an 710119, PR China"},{"name":"Science and Technology on Communication Security Laboratory, Chengdu 610041, PR China"},{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, PR China"}]},{"given":"Bo","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Shaanxi Normal University, Xi\u2019an 710119, PR China"},{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, PR China"}]},{"given":"Yong","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Computer Science, Shaanxi Normal University, Xi\u2019an 710119, PR China"},{"name":"Science and Technology on Communication Security Laboratory, Chengdu 610041, PR China"}]},{"given":"Yuan","family":"Chen","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi\u2019an 710071, PR China"}]},{"given":"Jian","family":"Bai","sequence":"additional","affiliation":[{"name":"Science and Technology on Communication Security Laboratory, Chengdu 610041, PR China"}]}],"member":"286","published-online":{"date-parts":[[2017,12,11]]},"reference":[{"key":"key\n\t\t\t\t20180329074327_bxx111C1","author":"Cramer","year":"2002"},{"key":"key\n\t\t\t\t20180329074327_bxx111C2","author":"Gennaro","year":"2003"},{"key":"key\n\t\t\t\t20180329074327_bxx111C3","author":"Katz","year":"2009"},{"key":"key\n\t\t\t\t20180329074327_bxx111C4","author":"Abdalla","year":"2009"},{"key":"key\n\t\t\t\t20180329074327_bxx111C5","author":"Katz","year":"2011"},{"key":"key\n\t\t\t\t20180329074327_bxx111C6","author":"Benhamouda","year":"2013"},{"key":"key\n\t\t\t\t20180329074327_bxx111C7","author":"Abdalla","year":"2015"},{"key":"key\n\t\t\t\t20180329074327_bxx111C8","author":"Blazy","year":"2016"},{"key":"key\n\t\t\t\t20180329074327_bxx111C9","author":"Kalai","year":"2005"},{"key":"key\n\t\t\t\t20180329074327_bxx111C10","author":"Abdalla","year":"2013"},{"key":"key\n\t\t\t\t20180329074327_bxx111C11","author":"Choi","year":"2013"},{"key":"key\n\t\t\t\t20180329074327_bxx111C12","author":"Wee","year":"2012"},{"key":"key\n\t\t\t\t20180329074327_bxx111C13","author":"Hemenway","year":"2012"},{"key":"key\n\t\t\t\t20180329074327_bxx111C14","author":"Zhang","year":"2014"},{"key":"key\n\t\t\t\t20180329074327_bxx111C15","author":"Naor","year":"2009"},{"key":"key\n\t\t\t\t20180329074327_bxx111C16","author":"Alwen","year":"2010"},{"key":"key\n\t\t\t\t20180329074327_bxx111C17","author":"Blazy","year":"2012"},{"key":"key\n\t\t\t\t20180329074327_bxx111C18","author":"Chen","year":"2016"},{"key":"key\n\t\t\t\t20180329074327_bxx111C19","author":"Gentry","year":"2008"},{"key":"key\n\t\t\t\t20180329074327_bxx111C20","author":"Yang","year":"2015"},{"key":"key\n\t\t\t\t20180329074327_bxx111C21","author":"Peikert","year":"2014"},{"key":"key\n\t\t\t\t20180329074327_bxx111C22","author":"Hofheinz","year":"2007"},{"key":"key\n\t\t\t\t20180329074327_bxx111C23","author":"Wee","year":"2010"},{"key":"key\n\t\t\t\t20180329074327_bxx111C24","author":"Chen","year":"2012"},{"key":"key\n\t\t\t\t20180329074327_bxx111C25","doi-asserted-by":"crossref","first-page":"1698","DOI":"10.1002\/sec.827","article-title":"Generalized (identity-based) hash proof system and its applications","volume":"9","author":"Chen","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"key\n\t\t\t\t20180329074327_bxx111C26","author":"Chen","year":"2012"},{"key":"key\n\t\t\t\t20180329074327_bxx111C27","doi-asserted-by":"crossref","first-page":"1537","DOI":"10.1093\/comjnl\/bxt090","article-title":"CCA-secure IB-KEM from identity-based extractable hash proof system","volume":"57","author":"Chen","year":"2014","journal-title":"Comput. J."},{"key":"key\n\t\t\t\t20180329074327_bxx111C28","first-page":"1","article-title":"Hash proof system based on lattice","volume":"4","author":"Xia","year":"2012","journal-title":"J. Adv. Comput. Technol."},{"key":"key\n\t\t\t\t20180329074327_bxx111C29","first-page":"1","article-title":"Attribute-Based Hash Proof System Under Learning-With-Errors Assumption In Obfuscator-Free And Leakage-Resilient Environments","volume":"99","author":"Zhang","year":"2015","journal-title":"IEEE Syst. J."},{"key":"key\n\t\t\t\t20180329074327_bxx111C30","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1137\/S0097539705447360","article-title":"Worst-case to average-case reductions based on Gaussian measures","volume":"37","author":"Micciancio","year":"2007","journal-title":"SIAM J. Comput."},{"key":"key\n\t\t\t\t20180329074327_bxx111C31","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1007\/s00037-008-0251-3","article-title":"Limits on the hardness of lattice problems in \u2113p norms","volume":"17","author":"Peikert","year":"2008","journal-title":"Comput. Complexity"},{"key":"key\n\t\t\t\t20180329074327_bxx111C32","doi-asserted-by":"crossref","first-page":"34:1","DOI":"10.1145\/1568318.1568324","article-title":"On lattices, learning with errors, random linear codes, and cryptography","volume":"56","author":"Regev","year":"2009","journal-title":"J. ACM"},{"key":"key\n\t\t\t\t20180329074327_bxx111C33","author":"Agrawal"},{"key":"key\n\t\t\t\t20180329074327_bxx111C34","author":"Dodis","year":"2010"},{"key":"key\n\t\t\t\t20180329074327_bxx111C35","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1007\/s00224-010-9278-3","article-title":"Generating shorter bases for hard random lattices","volume":"48","author":"Alwen","year":"2009","journal-title":"Theory Comput. Syst."}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/4\/561\/24509688\/bxx111.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,29]],"date-time":"2018-03-29T11:43:37Z","timestamp":1522323817000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/4\/561\/4725104"}},"subtitle":[],"editor":[{"given":"Ludovic","family":"Perret","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2017,12,11]]},"references-count":35,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2017,12,11]]},"published-print":{"date-parts":[[2018,4,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxx111","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2018,4]]},"published":{"date-parts":[[2017,12,11]]}}}