{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T08:43:52Z","timestamp":1765961032638,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/iwbis.2017.8275110","type":"proceedings-article","created":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T21:48:11Z","timestamp":1517521691000},"page":"105-111","source":"Crossref","is-referenced-by-count":7,"title":["Improved proxy re-encryption scheme for symmetric key cryptography"],"prefix":"10.1109","author":[{"given":"Kouichi","family":"Sakurai","sequence":"first","affiliation":[]},{"given":"Takashi","family":"Nishide","sequence":"additional","affiliation":[]},{"given":"Amril","family":"Syalim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127346"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1145\/1315245.1315269","article-title":"Chosen-ciphertext secure proxy reencryption","author":"canetti","year":"2007","journal-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security ACM"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72738-5_19"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2104470"},{"key":"ref14","first-page":"127","article-title":"Divertible protocols and atomic proxy cryptography","author":"blaze","year":"1998","journal-title":"Eurocrypt"},{"key":"ref15","first-page":"662","article-title":"Conversion and proxy functions for symmetric key ciphers","author":"cook","year":"2005","journal-title":"ITCC"},{"key":"ref16","article-title":"On re-encryption for symmetric authenticated encryption","author":"hirose","year":"2010","journal-title":"Computer Security Symposium (CSS) 2010"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1109\/SFCS.1997.646128","article-title":"A concrete security treatment of symmetric encryption","author":"bellare","year":"1997","journal-title":"Foundations of Computer Science 1997 Proceedings 38th Annual Symposium on"},{"key":"ref18","first-page":"332","article-title":"Sequences of games: a tool for taming complexity in security proofs","volume":"2004","author":"shoup","year":"2004","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-002-0133-9"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_32"},{"key":"ref3","first-page":"92","article-title":"Optimal asymmetric encryption","author":"bellare","year":"1994","journal-title":"Eurocrypt"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44987-6_19"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_33"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008304703074"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44598-6_23"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052348"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25327-0_23"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_23"}],"event":{"name":"2017 International Workshop on Big Data and Information Security (IWBIS)","start":{"date-parts":[[2017,9,23]]},"location":"Jakarta","end":{"date-parts":[[2017,9,24]]}},"container-title":["2017 International Workshop on Big Data and Information Security (IWBIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8263128\/8275086\/08275110.pdf?arnumber=8275110","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,13]],"date-time":"2022-08-13T19:53:29Z","timestamp":1660420409000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8275110\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/iwbis.2017.8275110","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}