{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T08:32:33Z","timestamp":1772008353504,"version":"3.50.1"},"reference-count":20,"publisher":"Oxford University Press (OUP)","issue":"4","license":[{"start":{"date-parts":[[2018,1,25]],"date-time":"2018-01-25T00:00:00Z","timestamp":1516838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/about_us\/legal\/notices"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4,1]]},"DOI":"10.1093\/comjnl\/bxy003","type":"journal-article","created":{"date-parts":[[2018,1,8]],"date-time":"2018-01-08T07:12:41Z","timestamp":1515395561000},"page":"586-600","source":"Crossref","is-referenced-by-count":26,"title":["Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles"],"prefix":"10.1093","volume":"61","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7254-3579","authenticated-orcid":false,"given":"Yanwei","family":"Zhou","sequence":"first","affiliation":[{"name":"School of Computer Science, Shaanxi Normal University, Xi\u2019an, China"},{"name":"School of Computing and Information Technology, University of Wollongong, Wollongong, Australia"},{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Bo","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Shaanxi Normal University, Xi\u2019an, China"},{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[{"name":"School of Computing and Information Technology, University of Wollongong, Wollongong, Australia"}]}],"member":"286","published-online":{"date-parts":[[2018,1,25]]},"reference":[{"key":"key\n\t\t\t\t20180329074319_bxy003C1","author":"Liu","year":"2013"},{"key":"key\n\t\t\t\t20180329074319_bxy003C2","doi-asserted-by":"crossref","first-page":"772","DOI":"10.1137\/100813464","article-title":"Public-key cryptosystems resilient to key leakage","volume":"41","author":"Naor","year":"2012","journal-title":"SIAM J. Comput."},{"key":"key\n\t\t\t\t20180329074319_bxy003C3","author":"Dodis","year":"2010"},{"key":"key\n\t\t\t\t20180329074319_bxy003C4","author":"Akavia","year":"2012"},{"key":"key\n\t\t\t\t20180329074319_bxy003C5","author":"Akavia","year":"2009"},{"key":"key\n\t\t\t\t20180329074319_bxy003C6","author":"Alwen","year":"2010"},{"key":"key\n\t\t\t\t20180329074319_bxy003C7","author":"Chow","year":"2010"},{"key":"key\n\t\t\t\t20180329074319_bxy003C8","author":"Boneh","year":"2004"},{"key":"key\n\t\t\t\t20180329074319_bxy003C9","author":"Waters","year":"2005"},{"key":"key\n\t\t\t\t20180329074319_bxy003C10","author":"Lewko","year":"2010"},{"key":"key\n\t\t\t\t20180329074319_bxy003C11","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1504\/IJGUC.2013.056255","article-title":"Leakage-resilient identity-based encryption scheme","volume":"4","author":"Li","year":"2013","journal-title":"Int. J. Grid Util. Comput."},{"key":"key\n\t\t\t\t20180329074319_bxy003C12","doi-asserted-by":"crossref","first-page":"1066","DOI":"10.1093\/comjnl\/bxv128","article-title":"A leakage-resilient cca-secure identity-based encryption scheme","volume":"59","author":"Li","year":"2016","journal-title":"Comput. J."},{"key":"key\n\t\t\t\t20180329074319_bxy003C13","author":"Gentry","year":"2006"},{"key":"key\n\t\t\t\t20180329074319_bxy003C14","author":"Chen","year":"2011"},{"key":"key\n\t\t\t\t20180329074319_bxy003C15","doi-asserted-by":"crossref","first-page":"1417","DOI":"10.1002\/sec.1429","article-title":"Efficient chosen ciphertext secure identity-based encryption against key leakage attacks","volume":"9","author":"Sun","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"key\n\t\t\t\t20180329074319_bxy003C16","volume-title":"Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data","author":"Dodis","year":"2004"},{"key":"key\n\t\t\t\t20180329074319_bxy003C17","first-page":"1","article-title":"Continuous leakage-resilient certificate-based encryption","volume":"355\u2013356","author":"Li","year":"2016","journal-title":"Inf. Sci."},{"key":"key\n\t\t\t\t20180329074319_bxy003C18","author":"Dziembowski","year":"2011"},{"key":"key\n\t\t\t\t20180329074319_bxy003C19","author":"Malkin","year":"2011"},{"key":"key\n\t\t\t\t20180329074319_bxy003C20","doi-asserted-by":"crossref","first-page":"4505","DOI":"10.1002\/sec.1643","article-title":"CCA2 secure public-key encryption scheme tolerating continual leakage attacks","volume":"9","author":"Zhou","year":"2016","journal-title":"Secur. Commun. Netw."}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/4\/586\/24509710\/bxy003.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,29]],"date-time":"2018-03-29T07:43:27Z","timestamp":1522309407000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/4\/586\/4824746"}},"subtitle":[],"editor":[{"given":"Joseph","family":"Liu","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,1,25]]},"references-count":20,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2018,1,25]]},"published-print":{"date-parts":[[2018,4,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxy003","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2018,4]]},"published":{"date-parts":[[2018,1,25]]}}}