{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:37:00Z","timestamp":1750307820708,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,3,18]],"date-time":"2008-03-18T00:00:00Z","timestamp":1205798400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"MIC (Ministry of Information and Communication), Korea","award":["IITA-2007-(C1090-0701-0025)"],"award-info":[{"award-number":["IITA-2007-(C1090-0701-0025)"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,3,18]]},"DOI":"10.1145\/1368310.1368366","type":"proceedings-article","created":{"date-parts":[[2008,5,15]],"date-time":"2008-05-15T18:35:39Z","timestamp":1210876539000},"page":"373-380","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06"],"prefix":"10.1145","author":[{"given":"Jong Hwan","family":"Park","sequence":"first","affiliation":[{"name":"Korea University"}]},{"given":"Ki Tak","family":"Kim","sequence":"additional","affiliation":[{"name":"Korea University"}]},{"given":"Dong Hoon","family":"Lee","sequence":"additional","affiliation":[{"name":"Korea University"}]}],"member":"320","published-online":{"date-parts":[[2008,3,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/2393847.2393861"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30580-4_26"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/11586821_28"},{"key":"e_1_3_2_1_4_1","series-title":"LNCS","first-page":"223","volume-title":"Proc. Eurocrypt","author":"Boneh D.","year":"2004","unstructured":"D. Boneh and X. Boyen . Efficient selective-id secure identity based encryption without random oracles . In Proc. Eurocrypt 2004 , volume 3027 of LNCS , pages 223 -- 238 . Springer , 2004. D. Boneh and X. Boyen. Efficient selective-id secure identity based encryption without random oracles. In Proc. Eurocrypt 2004, volume 3027 of LNCS, pages 223--238. Springer, 2004."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_26"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/646766.704155"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_16"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30574-3_8"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102162"},{"key":"e_1_3_2_1_10_1","series-title":"LNCS","first-page":"207","volume-title":"Proc. Eurocrypt","author":"Canetti C.","year":"2004","unstructured":"C. Canetti , S. Halevi , and J. Katz . Chosen ciphertext security from identity-based encryption . In Proc. Eurocrypt 2004 , volume 3027 of LNCS , pages 207 -- 222 . Springer , 2004. C. Canetti, S. Halevi, and J. Katz. Chosen ciphertext security from identity-based encryption. In Proc. Eurocrypt 2004, volume 3027 of LNCS, pages 207--222. Springer, 2004."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11745853_16"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/11941378_28"},{"key":"e_1_3_2_1_13_1","first-page":"84","volume-title":"TeX90 Conference Proceedings","author":"Cocks C.","year":"1991","unstructured":"C. Cocks . ibe-3. In TeX90 Conference Proceedings , pages 84 -- 89 . TeX Users Group , March 1991 . C. Cocks. ibe-3. In TeX90 Conference Proceedings, pages 84--89. TeX Users Group, March 1991."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2005.847600"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11780656_28"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_27"},{"key":"e_1_3_2_1_17_1","series-title":"LNCS","first-page":"548","volume-title":"Proc. Asiacrypt","author":"Gentry C.","year":"2002","unstructured":"C. Gentry and A. Silverberg . Hierarchical id-based cryptography . In Proc. Asiacrypt 2002 , volume 2501 of LNCS , pages 548 -- 566 . Springer , 2002. C. Gentry and A. Silverberg. Hierarchical id-based cryptography. In Proc. Asiacrypt 2002, volume 2501 of LNCS, pages 548--566. Springer, 2002."},{"key":"e_1_3_2_1_19_1","first-page":"47","volume-title":"Proc. CRYPTO 1984","volume":"196","author":"Shamir A.","year":"1984","unstructured":"A. Shamir . Identity-based cryptosystems and signature schemes . In Proc. CRYPTO 1984 , volume 196 of LNCS, pages 47 -- 53 . Springer , 1984 . A. Shamir. Identity-based cryptosystems and signature schemes. In Proc. CRYPTO 1984, volume 196 of LNCS, pages 47--53. Springer, 1984."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_7"}],"event":{"name":"Asia CCS '08: Asia CCS'08 ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Tokyo Japan","acronym":"Asia CCS '08"},"container-title":["Proceedings of the 2008 ACM symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1368310.1368366","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1368310.1368366","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:57:46Z","timestamp":1750255066000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1368310.1368366"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3,18]]},"references-count":19,"alternative-id":["10.1145\/1368310.1368366","10.1145\/1368310"],"URL":"https:\/\/doi.org\/10.1145\/1368310.1368366","relation":{},"subject":[],"published":{"date-parts":[[2008,3,18]]},"assertion":[{"value":"2008-03-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}