{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T13:00:09Z","timestamp":1740142809111,"version":"3.37.3"},"reference-count":28,"publisher":"Oxford University Press (OUP)","issue":"12","license":[{"start":{"date-parts":[[2018,8,7]],"date-time":"2018-08-07T00:00:00Z","timestamp":1533600000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672346","U1636217"],"award-info":[{"award-number":["61672346","U1636217"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012247","name":"Shanghai Academic Research Leader","doi-asserted-by":"crossref","award":["16XD1401300"],"award-info":[{"award-number":["16XD1401300"]}],"id":[{"id":"10.13039\/501100012247","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12,1]]},"DOI":"10.1093\/comjnl\/bxy074","type":"journal-article","created":{"date-parts":[[2018,7,9]],"date-time":"2018-07-09T15:02:12Z","timestamp":1531148532000},"page":"1825-1844","source":"Crossref","is-referenced-by-count":1,"title":["Tightly Secure Encryption Schemes against Related-Key Attacks"],"prefix":"10.1093","volume":"61","author":[{"given":"Shuai","family":"Han","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"},{"name":"Karlsruhe Institute of Technology, Karlsruhe, Germany"},{"name":"State Key Laboratory of Cryptology, Beijing, China"}]},{"given":"Shengli","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"},{"name":"State Key Laboratory of Cryptology, Beijing, China"},{"name":"Westone Cryptologic Research Center, Beijing, China"}]},{"given":"Lin","family":"Lyu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"},{"name":"State Key Laboratory of Cryptology, Beijing, China"}]},{"given":"Dawu","family":"Gu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"},{"name":"Shanghai Institute for Advanced Communication and Data Science, Shanghai, China"}]}],"member":"286","published-online":{"date-parts":[[2018,8,7]]},"reference":[{"year":"1997","author":"Boneh","key":"key\n\t\t\t\t2018112402025074200_bxy074C1"},{"year":"1997","author":"Biham","key":"key\n\t\t\t\t2018112402025074200_bxy074C2"},{"year":"2004","author":"Gennaro","key":"key\n\t\t\t\t2018112402025074200_bxy074C3"},{"year":"1993","author":"Biham","key":"key\n\t\t\t\t2018112402025074200_bxy074C4"},{"year":"1992","author":"Knudsen","key":"key\n\t\t\t\t2018112402025074200_bxy074C5"},{"year":"2003","author":"Bellare","key":"key\n\t\t\t\t2018112402025074200_bxy074C6"},{"year":"2011","author":"Bellare","key":"key\n\t\t\t\t2018112402025074200_bxy074C7"},{"year":"2012","author":"Bellare","key":"key\n\t\t\t\t2018112402025074200_bxy074C8"},{"year":"2016","author":"Han","key":"key\n\t\t\t\t2018112402025074200_bxy074C9"},{"year":"2012","author":"Wee","key":"key\n\t\t\t\t2018112402025074200_bxy074C10"},{"year":"1998","author":"Cramer","key":"key\n\t\t\t\t2018112402025074200_bxy074C11"},{"year":"2004","author":"Kurosawa","key":"key\n\t\t\t\t2018112402025074200_bxy074C12"},{"year":"2010","author":"Bellare","key":"key\n\t\t\t\t2018112402025074200_bxy074C13"},{"year":"2014","author":"Lu","key":"key\n\t\t\t\t2018112402025074200_bxy074C14"},{"key":"key\n\t\t\t\t2018112402025074200_bxy074C15","first-page":"167","article-title":"Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack","volume":"33","author":"Cramer","year":"2004","journal-title":"SIAM J. Comput."},{"year":"2004","author":"Canetti","key":"key\n\t\t\t\t2018112402025074200_bxy074C16"},{"year":"2005","author":"Boyen","key":"key\n\t\t\t\t2018112402025074200_bxy074C17"},{"year":"2005","author":"Waters","key":"key\n\t\t\t\t2018112402025074200_bxy074C18"},{"year":"2013","author":"Jia","key":"key\n\t\t\t\t2018112402025074200_bxy074C19"},{"year":"2014","author":"Jia","key":"key\n\t\t\t\t2018112402025074200_bxy074C20"},{"year":"2002","author":"Cramer","key":"key\n\t\t\t\t2018112402025074200_bxy074C21"},{"key":"key\n\t\t\t\t2018112402025074200_bxy074C22","first-page":"32","article-title":"Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience","volume":"9","author":"Qin","year":"2015","journal-title":"IET Inf. Secur."},{"year":"2013","author":"Damgard","key":"key\n\t\t\t\t2018112402025074200_bxy074C23"},{"year":"2000","author":"Bellare","key":"key\n\t\t\t\t2018112402025074200_bxy074C24"},{"year":"2012","author":"Hofheinz","key":"key\n\t\t\t\t2018112402025074200_bxy074C25"},{"year":"2013","author":"Escala","key":"key\n\t\t\t\t2018112402025074200_bxy074C26"},{"year":"2016","author":"Gay","key":"key\n\t\t\t\t2018112402025074200_bxy074C27"},{"year":"2016","author":"Morillo","key":"key\n\t\t\t\t2018112402025074200_bxy074C28"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/12\/1825\/26725113\/bxy074.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T20:00:40Z","timestamp":1589918440000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/12\/1825\/5067538"}},"subtitle":[],"editor":[{"given":"Ludovic","family":"Perret","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,8,7]]},"references-count":28,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2018,8,7]]},"published-print":{"date-parts":[[2018,12,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxy074","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"type":"print","value":"0010-4620"},{"type":"electronic","value":"1460-2067"}],"subject":[],"published-other":{"date-parts":[[2018,12]]},"published":{"date-parts":[[2018,8,7]]}}}