{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T01:58:00Z","timestamp":1761789480434,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/icait.2017.8388939","type":"proceedings-article","created":{"date-parts":[[2018,6,21]],"date-time":"2018-06-21T22:32:13Z","timestamp":1529620333000},"page":"322-328","source":"Crossref","is-referenced-by-count":1,"title":["On the key dependent message security of DHIES"],"prefix":"10.1109","author":[{"given":"Honglong","family":"Dai","sequence":"first","affiliation":[]},{"given":"Luxuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Janyan","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Jinyong","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Maozhi","family":"Xu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"143c158","article-title":"The oracle diffie-hellman assumptions and an analysis of DHIES","volume":"2020","author":"abdalla","year":"2001","journal-title":"Topics in Cryptology - CT-RSA"},{"key":"ref11","first-page":"62","article-title":"Encryption-Scheme Security in the Presence of Key-Dependent Messages","author":"black","year":"2002","journal-title":"Sac"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_7"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54631-0_28"},{"key":"ref14","first-page":"1","article-title":"Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability-(or: Quadratic Residuosity Strikes Back)","author":"brakerski","year":"2010","journal-title":"Crypto"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_20"},{"key":"ref16","first-page":"93","article-title":"An Efficient System for Non-Transferable Anonymous Credentials with Optional Anonymity Revocation","author":"camenisch","year":"2001","journal-title":"EOROCRYPT"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30057-8_32"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1705"},{"key":"ref19","first-page":"45","article-title":"Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption","author":"cramer","year":"2002","journal-title":"EU-ROCRYPT"},{"key":"ref28","first-page":"332","article-title":"Sequences of Games: A Tool for Taming Complexity in Security Proofs","author":"shoup","year":"2004","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref4","first-page":"1","volume":"1462","author":"bleichenbacher","year":"1998","journal-title":"Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard[S]"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49384-7_5"},{"key":"ref3","first-page":"595","article-title":"Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems","author":"applebaum","year":"2009","journal-title":"Crypto"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_22"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89255-7_31"},{"key":"ref8","first-page":"143c158","article-title":"The oracle diffie-hellman assumptions and an analysis of DHIES","volume":"2020","author":"abdalla","year":"2001","journal-title":"Topics in Cryptology - CT-RSA"},{"key":"ref7","first-page":"93c118","article-title":"An efficient system for non-transferable anonymous credentials with optional anonymity revocation","volume":"2045","author":"camenisch","year":"2001","journal-title":"Eurocrypt"},{"key":"ref2","first-page":"527","article-title":"Key-Depdendent Message Security: Generic Amplification and Completeness","author":"applebaum","year":"2011","journal-title":"Eurocrypt"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0055717","article-title":"A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack","volume":"1462","author":"cramer","year":"1998","journal-title":"Advances in Cryptology-CRYPTO"},{"key":"ref1","first-page":"143c158","article-title":"The oracle diffie-hellman assumptions and an analysis of DHIES","volume":"2020","author":"abdalla","year":"2001","journal-title":"Topics in Cryptology - CT-RSA"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04852-9_24"},{"key":"ref22","first-page":"365","article-title":"How to Enhance the Security of Public-Key Encryption at Minimum Cost","volume":"377","author":"fujisaki","year":"1982","journal-title":"keeping secret all partial information"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/800070.802212"},{"journal-title":"A Fully Homomorphic Encryption Scheme","year":"2009","author":"gentry","key":"ref24"},{"key":"ref23","first-page":"537","article-title":"Secure Integration of Asymmetric and Symmetric Encryption Schemes","author":"fujisaki","year":"1999","journal-title":"Crypto"},{"key":"ref26","first-page":"202","article-title":"On the (Im)possibility of Key Dependent Message Encryption","author":"haitner","year":"2009","journal-title":"TCC"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53890-6_11"}],"event":{"name":"2017 9th International Conference on Advanced Infocomm Technology (ICAIT)","start":{"date-parts":[[2017,11,22]]},"location":"Chengdu","end":{"date-parts":[[2017,11,24]]}},"container-title":["2017 9th International Conference on Advanced Infocomm Technology (ICAIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8379735\/8388809\/08388939.pdf?arnumber=8388939","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T16:00:47Z","timestamp":1643212847000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8388939\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icait.2017.8388939","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]}}}