{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:58:38Z","timestamp":1729619918941,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/isias.2011.6122836","type":"proceedings-article","created":{"date-parts":[[2012,1,11]],"date-time":"2012-01-11T17:01:11Z","timestamp":1326301271000},"page":"298-303","source":"Crossref","is-referenced-by-count":10,"title":["An identity based beta cryptosystem"],"prefix":"10.1109","author":[{"given":"Chandrashekhar","family":"Meshram","sequence":"first","affiliation":[]},{"given":"S. A.","family":"Meshram","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/49.223874"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.3923\/ajit.2011.32.35"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2005.01.107"},{"key":"15","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/978-3-540-79263-5_14","article-title":"CCA2 Secure IBE: Standard model efficiency through authenticated symmetric encryption","volume":"4964","author":"kiltz","year":"2008","journal-title":"Lecture Notes in Computer Science"},{"key":"16","first-page":"285","article-title":"A Cryptosystem based on Double Generalized Discrete Logarithm Problem","volume":"6","author":"meshram","year":"2011","journal-title":"Int J Contemp Math Sciences"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1049\/el:19840357"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1137\/S009753970544713X"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/49.223874"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1049\/ip-cdt:19941040"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.14"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2006.05.001"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398521"},{"key":"23","first-page":"1301","article-title":"Chosenciphertext security from identity-based encryption","volume":"5","author":"boneh","year":"2006","journal-title":"SIAM Journal on Computing"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_43"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/BF00129771"},{"key":"26","first-page":"237","article-title":"ID-based cryptographic schemes using a noninteractive public-key distribution system","author":"tseng","year":"1998","journal-title":"21st Annual Computer Security Applications Conference"},{"key":"27","first-page":"360","article-title":"An Identity Based Encryption Scheme Based on Quadratic Residues","volume":"2260","author":"cocks","year":"2001","journal-title":"LNCS"},{"year":"1987","author":"coppersmith","key":"28"},{"year":"1988","author":"shamir","key":"29"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/49.17709"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055927"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2004.03.006"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2004.03.001"},{"key":"5","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1109\/49.17711","article-title":"Key distribution system based on identification information","volume":"7","author":"okarnoto","year":"1989","journal-title":"IEEE J Se Areas Commun"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-008-9028-8"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2005.01.107"}],"event":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","start":{"date-parts":[[2011,12,5]]},"location":"Melacca, Malaysia","end":{"date-parts":[[2011,12,8]]}},"container-title":["2011 7th International Conference on Information Assurance and Security (IAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6112288\/6122777\/06122836.pdf?arnumber=6122836","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T08:36:57Z","timestamp":1497947817000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6122836\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/isias.2011.6122836","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}