{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:11:54Z","timestamp":1771697514834,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,25]],"date-time":"2004-10-25T00:00:00Z","timestamp":1098662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,25]]},"DOI":"10.1145\/1030083.1030130","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:55:16Z","timestamp":1107107716000},"page":"354-363","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":82,"title":["ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption"],"prefix":"10.1145","author":[{"given":"Danfeng","family":"Yao","sequence":"first","affiliation":[{"name":"Brown University, Providence, RI"}]},{"given":"Nelly","family":"Fazio","sequence":"additional","affiliation":[{"name":"New York University, New York, NY"}]},{"given":"Yevgeniy","family":"Dodis","sequence":"additional","affiliation":[{"name":"New York University, New York, NY"}]},{"given":"Anna","family":"Lysyanskaya","sequence":"additional","affiliation":[{"name":"Brown University, Providence, RI"}]}],"member":"320","published-online":{"date-parts":[[2004,10,25]]},"reference":[{"key":"e_1_3_2_1_1_1","series-title":"LNCS","first-page":"441","volume-title":"Topics in Cryptography -- CT-RSA '01","author":"Abdalla M.","unstructured":"M. Abdalla , S. K. Miner , and C. Namprempre . Forward-secure threshold signature schemes . In Topics in Cryptography -- CT-RSA '01 , volume 2020 of LNCS , pages 441 -- 456 .]] M. Abdalla, S. K. Miner, and C. Namprempre. Forward-secure threshold signature schemes. In Topics in Cryptography -- CT-RSA '01, volume 2020 of LNCS, pages 441--456.]]"},{"key":"e_1_3_2_1_2_1","volume-title":"4th ACM Conference on Computer and Communications Security","author":"Anderson R.","year":"1997","unstructured":"R. Anderson . Two remarks on public-key cryptology. Invited lecture , 4th ACM Conference on Computer and Communications Security , 1997 .]] R. Anderson. Two remarks on public-key cryptology. Invited lecture, 4th ACM Conference on Computer and Communications Security, 1997.]]"},{"key":"e_1_3_2_1_3_1","series-title":"LNCS","first-page":"431","volume-title":"Advances in Cryptology -- Crypto '99","author":"Bellare M.","unstructured":"M. Bellare and S. K. Miner . A forward-secure digital signature scheme . In Advances in Cryptology -- Crypto '99 , volume 1666 of LNCS , pages 431 -- 448 .]] M. Bellare and S. K. Miner. A forward-secure digital signature scheme. In Advances in Cryptology -- Crypto '99, volume 1666 of LNCS, pages 431--448.]]"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"e_1_3_2_1_5_1","series-title":"LNCS","first-page":"1","volume-title":"CT-RSA","author":"Bellare M.","unstructured":"M. Bellare and B. Yee . Forward security in private-key cryptography . In CT-RSA , volume 2612 of LNCS , pages 1 -- 18 .]] M. Bellare and B. Yee. Forward security in private-key cryptography. In CT-RSA, volume 2612 of LNCS, pages 1--18.]]"},{"key":"e_1_3_2_1_6_1","series-title":"LNCS","first-page":"223","volume-title":"Advances in Cryptology -- Eurocrypt '04","author":"Boneh D.","unstructured":"D. Boneh and X. Boyen . Efficient selective-ID secure identity-based encryption without random oracles . In Advances in Cryptology -- Eurocrypt '04 , volume 3027 of LNCS , pages 223 -- 238 .]] D. Boneh and X. Boyen. Efficient selective-ID secure identity-based encryption without random oracles. In Advances in Cryptology -- Eurocrypt '04, volume 3027 of LNCS, pages 223--238.]]"},{"key":"e_1_3_2_1_7_1","volume-title":"Crypto '04","author":"Boneh D.","unstructured":"D. Boneh and X. Boyen . Secure identity based encryption without random oracles . Crypto '04 .]] D. Boneh and X. Boyen. Secure identity based encryption without random oracles. Crypto '04.]]"},{"key":"e_1_3_2_1_8_1","series-title":"LNCS","first-page":"213","volume-title":"Advances in Cryptology -- Crypto '01","author":"Boneh D.","unstructured":"D. Boneh and M. K. Franklin . Identity-based encryption from the Weil pairing . In Advances in Cryptology -- Crypto '01 , volume 2139 of LNCS , pages 213 -- 229 .]] D. Boneh and M. K. Franklin. Identity-based encryption from the Weil pairing. In Advances in Cryptology -- Crypto '01, volume 2139 of LNCS, pages 213--229.]]"},{"key":"e_1_3_2_1_9_1","first-page":"71","volume":"324","author":"Boneh D.","year":"2003","unstructured":"D. Boneh and A. Silverberg . Applications of multilinear forms to cryptography. Contemporary Mathematics , 324 : 71 -- 90 , 2003 .]] D. Boneh and A. Silverberg. Applications of multilinear forms to cryptography. Contemporary Mathematics, 324:71--90, 2003.]]","journal-title":"Applications of multilinear forms to cryptography. Contemporary Mathematics"},{"key":"e_1_3_2_1_10_1","series-title":"LNCS","first-page":"255","volume-title":"Advances in Cryptology -- Eurocrypt '03","author":"Canetti R.","unstructured":"R. Canetti , S. Halevi , and J. Katz . A forward-secure public-key encryption scheme . In Advances in Cryptology -- Eurocrypt '03 , volume 2656 of LNCS , pages 255 -- 271 .]] R. Canetti, S. Halevi, and J. Katz. A forward-secure public-key encryption scheme. In Advances in Cryptology -- Eurocrypt '03, volume 2656 of LNCS, pages 255--271.]]"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00124891"},{"key":"e_1_3_2_1_12_1","series-title":"LNCS","first-page":"61","volume-title":"Digital Rights Management -- DRM '02","author":"Dodis Y.","unstructured":"Y. Dodis and N. Fazio . Public-key broadcast encryption for stateless receivers . In Digital Rights Management -- DRM '02 , volume 2696 of LNCS , pages 61 -- 80 .]] Y. Dodis and N. Fazio. Public-key broadcast encryption for stateless receivers. In Digital Rights Management -- DRM '02, volume 2696 of LNCS, pages 61--80.]]"},{"key":"e_1_3_2_1_13_1","series-title":"LNCS","first-page":"100","volume-title":"Public Key Cryptography -- PKC '03","author":"Dodis Y.","unstructured":"Y. Dodis and N. Fazio . Public-key trace and revoke scheme secure against adaptive chosen ciphertext attack . In Public Key Cryptography -- PKC '03 , volume 2567 of LNCS , pages 100 -- 115 .]] Y. Dodis and N. Fazio. Public-key trace and revoke scheme secure against adaptive chosen ciphertext attack. In Public Key Cryptography -- PKC '03, volume 2567 of LNCS, pages 100--115.]]"},{"key":"e_1_3_2_1_14_1","series-title":"LNCS","first-page":"480","volume-title":"Advances in Cryptology -- Crypto '93","author":"Fiat A.","unstructured":"A. Fiat and M. Naor . Broadcast encryption . In Advances in Cryptology -- Crypto '93 , volume 773 of LNCS , pages 480 -- 491 .]] A. Fiat and M. Naor. Broadcast encryption. In Advances in Cryptology -- Crypto '93, volume 773 of LNCS, pages 480--491.]]"},{"key":"e_1_3_2_1_15_1","series-title":"LNCS","first-page":"537","volume-title":"Advances in Cryptology -- Crypto '99","author":"Fujisaki E.","unstructured":"E. Fujisaki and T. Okamoto . Secure integration of asymmetric and symmetric encryption schemes . In Advances in Cryptology -- Crypto '99 , volume 1666 of LNCS , pages 537 -- 554 .]] E. Fujisaki and T. Okamoto. Secure integration of asymmetric and symmetric encryption schemes. In Advances in Cryptology -- Crypto '99, volume 1666 of LNCS, pages 537--554.]]"},{"key":"e_1_3_2_1_16_1","series-title":"LNCS","first-page":"333","volume-title":"Advances in Cryptology -- Crypto","author":"Garay A.","year":"2000","unstructured":"A. Garay , J. Staddon , and A. Wool . Long-lived broadcast encryption . In Advances in Cryptology -- Crypto 2000 , volume 1880 of LNCS , pages 333 -- 352 .]] A. Garay, J. Staddon, and A. Wool. Long-lived broadcast encryption. In Advances in Cryptology -- Crypto 2000, volume 1880 of LNCS, pages 333--352.]]"},{"key":"e_1_3_2_1_17_1","series-title":"LNCS","first-page":"29","volume-title":"Advances in Cryptology -- Eurocrypt '89","author":"G\u00fcnther C.","unstructured":"C. G\u00fcnther . An identity-based key exchange protocol . In Advances in Cryptology -- Eurocrypt '89 , volume 434 of LNCS , pages 29 -- 37 .]] C. G\u00fcnther. An identity-based key exchange protocol. In Advances in Cryptology -- Eurocrypt '89, volume 434 of LNCS, pages 29--37.]]"},{"key":"e_1_3_2_1_18_1","series-title":"LNCS","first-page":"548","volume-title":"Advances in Cryptology -- Asiacrypt '02","author":"Gentry C.","unstructured":"C. Gentry and A. Silverberg . Hierarchical ID-based cryptography . In Advances in Cryptology -- Asiacrypt '02 , volume 2501 of LNCS , pages 548 -- 566 .]] C. Gentry and A. Silverberg. Hierarchical ID-based cryptography. In Advances in Cryptology -- Asiacrypt '02, volume 2501 of LNCS, pages 548--566.]]"},{"key":"e_1_3_2_1_19_1","volume-title":"Advances in Cryptology - Crypto '04","author":"Goodrich M. T.","unstructured":"M. T. Goodrich , J. Z. Sun , and R. Tamassia . Efficient tree-based revocation in groups of low-state devices . In Advances in Cryptology - Crypto '04 , LNCS.]] M. T. Goodrich, J. Z. Sun, and R. Tamassia. Efficient tree-based revocation in groups of low-state devices. In Advances in Cryptology - Crypto '04, LNCS.]]"},{"key":"e_1_3_2_1_20_1","series-title":"LNCS","first-page":"47","volume-title":"Advances in Cryptology -- Crypto '02","author":"Halevy D.","unstructured":"D. Halevy and A. Shamir . The LSD broadcast encryption scheme . In Advances in Cryptology -- Crypto '02 , volume 2442 of LNCS , pages 47 -- 60 .]] D. Halevy and A. Shamir. The LSD broadcast encryption scheme. In Advances in Cryptology -- Crypto '02, volume 2442 of LNCS, pages 47--60.]]"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1005140.1005142"},{"key":"e_1_3_2_1_22_1","series-title":"LNCS","first-page":"466","volume-title":"Advances in Cryptology -- Eurocrypt '02","author":"Horwitz J.","unstructured":"J. Horwitz and B. Lynn . Toward hierarchical identity-based encryption . In Advances in Cryptology -- Eurocrypt '02 , volume 2332 of LNCS , pages 466 -- 481 .]] J. Horwitz and B. Lynn. Toward hierarchical identity-based encryption. In Advances in Cryptology -- Eurocrypt '02, volume 2332 of LNCS, pages 466--481.]]"},{"key":"e_1_3_2_1_24_1","series-title":"LNCS","first-page":"359","volume-title":"Advances in Cryptology -- Asiacrypt","author":"Kim C.","year":"2003","unstructured":"C. Kim , Y. Hwang , and P. Lee . An efficient public key trace and revoke scheme secure against adaptive chosen ciphertext attack . In Advances in Cryptology -- Asiacrypt 2003 , volume 2894 of LNCS , pages 359 -- 373 .]] C. Kim, Y. Hwang, and P. Lee. An efficient public key trace and revoke scheme secure against adaptive chosen ciphertext attack. In Advances in Cryptology -- Asiacrypt 2003, volume 2894 of LNCS, pages 359--373.]]"},{"key":"e_1_3_2_1_25_1","series-title":"LNCS","first-page":"512","volume-title":"Advances in Cryptology -- Eurocrypt '98","author":"Luby M.","unstructured":"M. Luby and J. Staddon . Combinatorial bounds for broadcast encryption . In Advances in Cryptology -- Eurocrypt '98 , volume 1403 of LNCS , pages 512 -- 526 .]] M. Luby and J. Staddon. Combinatorial bounds for broadcast encryption. In Advances in Cryptology -- Eurocrypt '98, volume 1403 of LNCS, pages 512--526.]]"},{"key":"e_1_3_2_1_26_1","series-title":"LNCS","first-page":"400","volume-title":"Advances in Cryptology -- Eurocrypt '02","author":"Malkin T.","unstructured":"T. Malkin , D. Micciancio , and S. K. Miner . Efficient generic forward-secure signatures with an unbounded number of time periods . In Advances in Cryptology -- Eurocrypt '02 , volume 2332 of LNCS , pages 400 -- 417 .]] T. Malkin, D. Micciancio, and S. K. Miner. Efficient generic forward-secure signatures with an unbounded number of time periods. In Advances in Cryptology -- Eurocrypt '02, volume 2332 of LNCS, pages 400--417.]]"},{"key":"e_1_3_2_1_27_1","series-title":"LNCS","first-page":"41","volume-title":"Advances in Cryptology -- Crypto '01","author":"Naor D.","unstructured":"D. Naor , M. Naor , and J. Lotspiech . Revocation and tracing schemes for stateless receivers . In Advances in Cryptology -- Crypto '01 , volume 2139 of LNCS , pages 41 -- 62 .]] D. Naor, M. Naor, and J. Lotspiech. Revocation and tracing schemes for stateless receivers. In Advances in Cryptology -- Crypto '01, volume 2139 of LNCS, pages 41--62.]]"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/990036.990061"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/285237.285260"}],"event":{"name":"CCS04: 11th ACM Conference on Computer and Communications Security 2004","location":"Washington DC USA","acronym":"CCS04","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 11th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1030083.1030130","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1030083.1030130","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:25:07Z","timestamp":1750263907000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1030083.1030130"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10,25]]},"references-count":29,"alternative-id":["10.1145\/1030083.1030130","10.1145\/1030083"],"URL":"https:\/\/doi.org\/10.1145\/1030083.1030130","relation":{},"subject":[],"published":{"date-parts":[[2004,10,25]]},"assertion":[{"value":"2004-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}