{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:07:30Z","timestamp":1758845250859,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,27]],"date-time":"2008-10-27T00:00:00Z","timestamp":1225065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,27]]},"DOI":"10.1145\/1456520.1456531","type":"proceedings-article","created":{"date-parts":[[2008,11,6]],"date-time":"2008-11-06T13:49:50Z","timestamp":1225979390000},"page":"59-66","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["RSA-TBOS signcryption with proxy re-encryption"],"prefix":"10.1145","author":[{"given":"Varad","family":"Kirtane","sequence":"first","affiliation":[{"name":"Indian Institute of Technology Madras, Chennai, India"}]},{"given":"C. Pandu","family":"Rangan","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Madras, Chennai, India"}]}],"member":"320","published-online":{"date-parts":[[2008,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054122"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/11935308_19"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127346"},{"key":"e_1_3_2_1_5_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1007\/978-3-540-30580-4_25","volume-title":"Public Key Cryptography 2005 (PKC","author":"Chen L.","year":"2005","unstructured":"L. Chen , J. Malone-- Lee , Improved Identity-Based Signcryption , Public Key Cryptography 2005 (PKC 2005 ), volume 3386 of Lecture Notes in Computer Science , pages 362 -- 379 , Springer-Verlag , 2005. L. Chen, J. Malone--Lee, Improved Identity-Based Signcryption, Public Key Cryptography 2005 (PKC 2005), volume 3386 of Lecture Notes in Computer Science, pages 362--379, Springer-Verlag, 2005."},{"key":"e_1_3_2_1_6_1","volume-title":"Advances in Cryptology - Proceedings of CRYPTO 1997","volume":"1294","author":"Zheng Y.","year":"1997","unstructured":"Y. Zheng , Digital Signcryption or How to Achieve Cost (Signature & Encryption) <<< Cost(Signature) & Cost(Encryption). In Advances in Cryptology - Proceedings of CRYPTO 1997 , volume 1294 of Lecture Notes in Computer Science, pages 165--179. Springer-Verlag , 1997 . Y. Zheng, Digital Signcryption or How to Achieve Cost (Signature & Encryption) <<< Cost(Signature) & Cost(Encryption). In Advances in Cryptology - Proceedings of CRYPTO 1997, volume 1294 of Lecture Notes in Computer Science, pages 165--179. Springer-Verlag,1997."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1767011.1767032"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/648119.746901"},{"key":"e_1_3_2_1_9_1","volume-title":"Relations Among Notions of Security for Public-Key Encryption Schemes. In Advances in Cryptology - CRYPTO 1998","volume":"1462","author":"Bellare M.","year":"1998","unstructured":"M. Bellare , A. Desai , D. Pointcheval and P. Rogaway , Relations Among Notions of Security for Public-Key Encryption Schemes. In Advances in Cryptology - CRYPTO 1998 , volume 1462 of Lecture Notes in Computer Science, pages 26--45. Springer-Verlag , 1998 . M. Bellare, A. Desai, D. Pointcheval and P. Rogaway, Relations Among Notions of Security for Public-Key Encryption Schemes. In Advances in Cryptology - CRYPTO 1998, volume 1462 of Lecture Notes in Computer Science, pages 26--45. Springer-Verlag, 1998."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/647087.715701"},{"key":"e_1_3_2_1_12_1","unstructured":"J. Shao D. Xing and Z. Cao Identity-Based Proxy Re-encryption Schemes with Multiuse Unidirection and CCA Security. Unpublished report available at Cryptology ePrint Archive: http:\/\/eprint.iacr.org\/2008\/103.pdf.  J. Shao D. Xing and Z. Cao Identity-Based Proxy Re-encryption Schemes with Multiuse Unidirection and CCA Security. Unpublished report available at Cryptology ePrint Archive: http:\/\/eprint.iacr.org\/2008\/103.pdf."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72738-5_19"},{"key":"e_1_3_2_1_14_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/BFb0054014","volume-title":"Proceedings of Public Key Cryptography 1998 (PKC'98)","author":"Bao F.","year":"1998","unstructured":"F. Bao and R.H. Deng , A signcryption scheme with signature directly Verfiable by Public Key . In Proceedings of Public Key Cryptography 1998 (PKC'98) , volume 1431 of Lecture Notes in Computer Science , pages 55 -- 59 , Springer Verlag , 1998 . F. Bao and R.H. Deng, A signcryption scheme with signature directly Verfiable by Public Key. In Proceedings of Public Key Cryptography 1998 (PKC'98), volume 1431 of Lecture Notes in Computer Science, pages 55--59, Springer Verlag, 1998."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315269"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS","author":"Ivan A.","year":"2003","unstructured":"A. Ivan and Y. Dodis , Proxy Cryptography Revisited . In Proceedings of the Network and Distributed System Security Symposium (NDSS 2003 ), San Diego, California, USA. A. Ivan and Y. Dodis, Proxy Cryptography Revisited. In Proceedings of the Network and Distributed System Security Symposium (NDSS 2003), San Diego, California, USA."},{"key":"e_1_3_2_1_17_1","volume-title":"March 18","author":"Smith T.","year":"2005","unstructured":"T. Smith , DVD Jon: buy DRM-less Tracks from Apple iTunes , March 18 , 2005 . Available at: http:\/\/www.theregister.co.uk\/2005\/03\/18\/itunes_pymusique. T. Smith, DVD Jon: buy DRM-less Tracks from Apple iTunes, March 18, 2005. Available at: http:\/\/www.theregister.co.uk\/2005\/03\/18\/itunes_pymusique."}],"event":{"name":"CCS08: 15th ACM Conference on Computer and Communications Security 2008","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS08"},"container-title":["Proceedings of the 8th ACM workshop on Digital rights management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456520.1456531","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1456520.1456531","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:45:44Z","timestamp":1750250744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456520.1456531"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10,27]]},"references-count":17,"alternative-id":["10.1145\/1456520.1456531","10.1145\/1456520"],"URL":"https:\/\/doi.org\/10.1145\/1456520.1456531","relation":{},"subject":[],"published":{"date-parts":[[2008,10,27]]},"assertion":[{"value":"2008-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}