{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:36:19Z","timestamp":1750307779468,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,29]],"date-time":"2007-10-29T00:00:00Z","timestamp":1193616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,29]]},"DOI":"10.1145\/1314333.1314341","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"48-55","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Single-bit re-encryption with applications to distributed proof systems"],"prefix":"10.1145","author":[{"given":"Nikita","family":"Borisov","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL"}]},{"given":"Kazuhiro","family":"Minami","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL"}]}],"member":"320","published-online":{"date-parts":[[2007,10,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11556992_31"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.9"},{"key":"e_1_3_2_1_3_1","series-title":"Lecture Notes in Computer Science","first-page":"92","volume-title":"A. De Santis","author":"Bellare M.","year":"1994","unstructured":"M. Bellare and P. Rogaway . Optimal asymmetric encryption . In A. De Santis , editor, Advances in Cryptology . EUROCRYPT, volume 950 of Lecture Notes in Computer Science , pages 92 -- 111 , Perugia, Italy , May 1994 . M. Bellare and P. Rogaway. Optimal asymmetric encryption. In A. De Santis, editor, Advances in Cryptology . EUROCRYPT, volume 950 of Lecture Notes in Computer Science, pages 92--111, Perugia, Italy, May 1994."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196727"},{"key":"e_1_3_2_1_5_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/3-540-44586-2_9","volume-title":"Workshop on Practice and Theory in Public Key Cryptography","author":"Damg\u00e5rd I.","year":"2001","unstructured":"I. Damg\u00e5rd and M. Jurik . A generalisation, a simplification and some applications of Paillier's probabilistic public-key system . In K. Kim, editor, Workshop on Practice and Theory in Public Key Cryptography , volume 1992 of Lecture Notes in Computer Science , pages 119 -- 136 , Cheju Island , Korea, Feb . 2001 . I. Damg\u00e5rd and M. Jurik. A generalisation, a simplification and some applications of Paillier's probabilistic public-key system. In K. Kim, editor, Workshop on Practice and Theory in Public Key Cryptography, volume 1992 of Lecture Notes in Computer Science, pages 119--136, Cheju Island, Korea, Feb. 2001."},{"key":"e_1_3_2_1_6_1","first-page":"105","volume-title":"IEEE Symposium on Security and Privacy","author":"DeTreville J.","year":"2002","unstructured":"J. DeTreville . Binder, a logic-based security language. In M. Abadi and S. M. Bellovin, editors , IEEE Symposium on Security and Privacy , pages 105 -- 113 , Oakland, CA, USA , May 2002 . J. DeTreville. Binder, a logic-based security language. In M. Abadi and S. M. Bellovin, editors, IEEE Symposium on Security and Privacy, pages 105--113, Oakland, CA, USA, May 2002."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1006\/jsco.1998.0226"},{"key":"e_1_3_2_1_8_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1007\/3-540-44647-8_22","volume-title":"Advances in Cryptology (CRYPTO)","author":"Furukawa J.","year":"2001","unstructured":"J. Furukawa and K. Sako . An efficient scheme for proving a shuffle . In J. Kilian, editor, Advances in Cryptology (CRYPTO) , volume 2139 of Lecture Notes in Computer Science , pages 368 -- 387 , Santa Barbara, CA , USA , Aug. 2001 . J. Furukawa and K. Sako. An efficient scheme for proving a shuffle. In J. Kilian, editor, Advances in Cryptology (CRYPTO), volume 2139 of Lecture Notes in Computer Science, pages 368--387, Santa Barbara, CA, USA, Aug. 2001."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/800070.802212"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586121"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/647253.720294"},{"key":"e_1_3_2_1_13_1","first-page":"106","volume-title":"IEEE Symposium on Security and Privacy","author":"Jim T.","year":"2001","unstructured":"T. Jim . SD3 : A trust management system with certified evaluation. In R. Needham and M. Abadi, editors , IEEE Symposium on Security and Privacy , pages 106 -- 115 , Berkeley, CA , May 2001 . Society. T. Jim. SD3: A trust management system with certified evaluation. In R. Needham and M. Abadi, editors, IEEE Symposium on Security and Privacy, pages 106--115, Berkeley, CA, May 2001. Society."},{"key":"e_1_3_2_1_14_1","series-title":"Lecture Notes in Computer Science","first-page":"261","volume-title":"Workshop on Practice and Theory in Public Key Cryptosystems","author":"Juels A.","year":"2002","unstructured":"A. Juels and J. Guajardo . RSA key generation with verifiable randomness . In D. Naccache and P. Paillier, editors, Workshop on Practice and Theory in Public Key Cryptosystems , volume 2274 of Lecture Notes in Computer Science , pages 261 -- 285 , Paris , France, Feb . 2002 . A. Juels and J. Guajardo. RSA key generation with verifiable randomness. In D. Naccache and P. Paillier, editors, Workshop on Practice and Theory in Public Key Cryptosystems, volume 2274 of Lecture Notes in Computer Science, pages 261--285, Paris, France, Feb. 2002."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/795663.796363"},{"key":"e_1_3_2_1_16_1","volume-title":"Mar.","author":"Massey J.","year":"1983","unstructured":"J. Massey and J. Omura . A new multiplicative algorithm over finite fields and its applicability in public key cryptography. Presented at the rump session of EUROCRYPT , Mar. 1983 . J. Massey and J. Omura. A new multiplicative algorithm over finite fields and its applicability in public key cryptography. Presented at the rump session of EUROCRYPT, Mar. 1983."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2005.01.004"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2005.37"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502000"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055817"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_22_1","series-title":"Lecture Notes in Computer Science","first-page":"128","volume-title":"Advances in Cryptology . CRYPTO","author":"van de Graaf J.","year":"1987","unstructured":"J. van de Graaf and R. Peralta . A simple and secure way to show the validity of your public key . In C. Pomerance, editor, Advances in Cryptology . CRYPTO , volume 293 of Lecture Notes in Computer Science , pages 128 -- 134 , Santa Barbara , CA , Aug. 1987 . J. van de Graaf and R. Peralta. A simple and secure way to show the validity of your public key. In C. Pomerance, editor, Advances in Cryptology . CRYPTO, volume 293 of Lecture Notes in Computer Science, pages 128--134, Santa Barbara, CA, Aug. 1987."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102144"}],"event":{"name":"CCS07: 14th ACM Conference on Computer and Communications Security 2007","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS07"},"container-title":["Proceedings of the 2007 ACM workshop on Privacy in electronic society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314333.1314341","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1314333.1314341","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:04Z","timestamp":1750254964000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314333.1314341"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10,29]]},"references-count":23,"alternative-id":["10.1145\/1314333.1314341","10.1145\/1314333"],"URL":"https:\/\/doi.org\/10.1145\/1314333.1314341","relation":{},"subject":[],"published":{"date-parts":[[2007,10,29]]},"assertion":[{"value":"2007-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}