{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:27:42Z","timestamp":1750307262974,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,2,21]],"date-time":"2011-02-21T00:00:00Z","timestamp":1298246400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,2,21]]},"DOI":"10.1145\/1943513.1943516","type":"proceedings-article","created":{"date-parts":[[2011,2,15]],"date-time":"2011-02-15T18:31:03Z","timestamp":1297794663000},"page":"3-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Key dependent message security"],"prefix":"10.1145","author":[{"given":"Tal","family":"Malkin","sequence":"first","affiliation":[{"name":"Columbia University, New York, NY, USA"}]},{"given":"Isamu","family":"Teranishi","sequence":"additional","affiliation":[{"name":"NEC Corporation, Kawasaki, Japan and Columbia University, New York, NY, USA"}]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[{"name":"Google Inc. and Columbia University, New York, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,2,21]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1007\/s00145-007-0203-0"},{"key":"e_1_3_2_1_2_1","first-page":"403","volume-title":"Gilbert {21}","author":"Acar T.","unstructured":"T. Acar , M. Belenkiy , M. Bellare , and D. Cash . Cryptographic agility and its relation to circular encryption . In Gilbert {21} , pages 403 -- 422 . 10.1007\/978-3-642-13190-5_21 T. Acar, M. Belenkiy, M. Bellare, and D. Cash. Cryptographic agility and its relation to circular encryption. In Gilbert {21}, pages 403--422. 10.1007\/978-3-642-13190-5_21"},{"key":"e_1_3_2_1_3_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1007\/11555827_22","volume-title":"S. D. C. di Vimercati","author":"Ad\u00e3o P.","year":"2005","unstructured":"P. Ad\u00e3o , G. Bana , J. Herzog , and A. Scedrov . Soundness of formal encryption in the presence of key-cycles . In S. D. C. di Vimercati , P. F. Syverson, and D. Gollmann, editors, ESORICS, volume 3679 of Lecture Notes in Computer Science , pages 374 -- 396 . Springer , 2005 . 10.1007\/11555827_22 P. Ad\u00e3o, G. Bana, J. Herzog, and A. Scedrov. Soundness of formal encryption in the presence of key-cycles. In S. D. C. di Vimercati, P. F. Syverson, and D. Gollmann, editors, ESORICS, volume 3679 of Lecture Notes in Computer Science, pages 374--396. Springer, 2005. 10.1007\/11555827_22"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1007\/978-3-642-03356-8_35"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1007\/978-3-540-89255-7_31"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.5555\/1454415.1454417"},{"key":"e_1_3_2_1_8_1","first-page":"423","volume-title":"Gilbert {21}","author":"Barak B.","unstructured":"B. Barak , I. Haitner , D. Hofheinz , and Y. Ishai . Bounded key-dependent message security . In Gilbert {21} , pages 423 -- 444 . 10.1007\/978-3-642-13190-5_22 B. Barak, I. Haitner, D. Hofheinz, and Y. Ishai. Bounded key-dependent message security. In Gilbert {21}, pages 423--444. 10.1007\/978-3-642-13190-5_22"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/168588.168596"},{"key":"e_1_3_2_1_10_1","first-page":"92","volume-title":"EUROCRYPT","author":"Bellare M.","year":"1994","unstructured":"M. Bellare and P. Rogaway . Optimal asymmetric encryption . In EUROCRYPT , pages 92 -- 111 , 1994 . M. Bellare and P. Rogaway. Optimal asymmetric encryption. In EUROCRYPT, pages 92--111, 1994."},{"key":"e_1_3_2_1_11_1","series-title":"Lecture Notes in Computer Science","first-page":"62","volume-title":"Selected Areas in Cryptography","author":"Black J.","year":"2002","unstructured":"J. Black , P. Rogaway , and T. Shrimpton . Encryption-scheme security in the presence of key-dependent messages . In K. Nyberg and H. M. Heys, editors, Selected Areas in Cryptography , volume 2595 of Lecture Notes in Computer Science , pages 62 -- 75 . Springer , 2002 . J. Black, P. Rogaway, and T. Shrimpton. Encryption-scheme security in the presence of key-dependent messages. In K. Nyberg and H. M. Heys, editors, Selected Areas in Cryptography, volume 2595 of Lecture Notes in Computer Science, pages 62--75. Springer, 2002."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1007\/978-3-540-85174-5_7"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1007\/BFb0054117"},{"doi-asserted-by":"crossref","unstructured":"Z.\n      Brakerski\n     and \n      S.\n      Goldwasser\n  . \n  Circular and leakage resilient public-key encryption under subgroup indistinguishability - (or: Quadratic residuosity strikes back)\n  . In T. Rabin editor CRYPTO volume \n  6223\n   of \n  Lecture Notes in Computer Science pages \n  1\n  --\n  20\n  . \n  Springer 2010\n  .   Z. Brakerski and S. Goldwasser. Circular and leakage resilient public-key encryption under subgroup indistinguishability - (or: Quadratic residuosity strikes back). In T. Rabin editor CRYPTO volume 6223 of Lecture Notes in Computer Science pages 1--20. Springer 2010.","key":"e_1_3_2_1_14_1","DOI":"10.1007\/978-3-642-14623-7_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.5555\/3088723.3088758"},{"doi-asserted-by":"crossref","unstructured":"J.\n      Camenisch\n     and \n      A.\n      Lysyanskaya\n  . \n  An efficient system for non-transferable anonymous credentials with optional anonymity revocation\n  . In B. Pfitzmann editor EUROCRYPT volume \n  2045\n   of \n  Lecture Notes in Computer Science pages \n  93\n  --\n  118\n  . \n  Springer 2001\n  .   J. Camenisch and A. Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In B. Pfitzmann editor EUROCRYPT volume 2045 of Lecture Notes in Computer Science pages 93--118. Springer 2001.","key":"e_1_3_2_1_17_1","DOI":"10.1007\/3-540-44987-6_7"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1007\/978-3-642-11799-2_4"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1109\/TIT.1983.1056650"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1145\/1536414.1536440"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.5555\/2163822"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"e_1_3_2_1_24_1","first-page":"415","volume-title":"Smart {39}","author":"Groth J.","unstructured":"J. Groth and A. Sahai . Efficient non-interactive proof systems for bilinear groups . In Smart {39} , pages 415 -- 432 . J. Groth and A. Sahai. Efficient non-interactive proof systems for bilinear groups. In Smart {39}, pages 415--432."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1007\/978-3-642-00457-5_13"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1145\/1315245.1315303"},{"doi-asserted-by":"crossref","unstructured":"D.\n      Hofheinz\n     and \n      E.\n      Kiltz\n  . \n  Secure hybrid encryption from weakened key encapsulation\n  . In A. Menezes editor CRYPTO volume \n  4622\n   of \n  Lecture Notes in Computer Science pages \n  553\n  --\n  571\n  . \n  Springer 2007\n  .   D. Hofheinz and E. Kiltz. Secure hybrid encryption from weakened key encapsulation. In A. Menezes editor CRYPTO volume 4622 of Lecture Notes in Computer Science pages 553--571. Springer 2007.","key":"e_1_3_2_1_27_1","DOI":"10.1007\/978-3-540-74143-5_31"},{"key":"e_1_3_2_1_28_1","first-page":"108","volume-title":"Smart {39}","author":"Hofheinz D.","unstructured":"D. Hofheinz and D. Unruh . Towards key-dependent message security in the standard model . In Smart {39} , pages 108 -- 126 . D. Hofheinz and D. Unruh. Towards key-dependent message security in the standard model. In Smart {39}, pages 108--126."},{"doi-asserted-by":"crossref","unstructured":"M.\n      Liskov R. L.\n      Rivest and \n      D.\n      Wagner\n  . \n  Tweakable block ciphers\n  . In M. Yung editor CRYPTO volume \n  2442\n   of \n  Lecture Notes in Computer Science pages \n  31\n  --\n  46\n  . \n  Springer 2002\n  .   M. Liskov R. L. Rivest and D. Wagner. Tweakable block ciphers. In M. Yung editor CRYPTO volume 2442 of Lecture Notes in Computer Science pages 31--46. Springer 2002.","key":"e_1_3_2_1_29_1","DOI":"10.1007\/3-540-45708-9_3"},{"key":"e_1_3_2_1_30_1","volume-title":"Efficient block-wise PKE with KDM security under a flexible slp queries. Cryptology ePrint Archive","author":"Malkin T.","year":"2011","unstructured":"T. Malkin , I. Teranishi , and M. Yung . Efficient block-wise PKE with KDM security under a flexible slp queries. Cryptology ePrint Archive , 2011 . http:\/\/eprint.iacr.org\/ (to appear). T. Malkin, I. Teranishi, and M. Yung. Efficient block-wise PKE with KDM security under a flexible slp queries. Cryptology ePrint Archive, 2011. http:\/\/eprint.iacr.org\/ (to appear)."},{"key":"e_1_3_2_1_31_1","volume-title":"Standard for cryptographic protection of data on block-oriented storage devices","author":"IEEE","year":"2007","unstructured":"IEEE P1619. Standard for cryptographic protection of data on block-oriented storage devices , 2007 . IEEE P1619. Standard for cryptographic protection of data on block-oriented storage devices, 2007."},{"unstructured":"IEEE P1619 email archive 2007. http:\/\/grouper.ieee.org\/groups\/1619\/email.  IEEE P1619 email archive 2007. http:\/\/grouper.ieee.org\/groups\/1619\/email.","key":"e_1_3_2_1_32_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1145\/100216.100273"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1145\/352600.352639"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1145\/1568318.1568324"},{"doi-asserted-by":"crossref","unstructured":"O.\n      Reingold L.\n      Trevisan and \n      S. P.\n      Vadhan\n  . \n  Notions of reducibility between cryptographic primitives\n  . In M. Naor editor TCC volume \n  2951\n   of \n  Lecture Notes in Computer Science pages \n  1\n  --\n  20\n  . \n  Springer 2004\n  .  O. Reingold L. Trevisan and S. P. Vadhan. Notions of reducibility between cryptographic primitives. In M. Naor editor TCC volume 2951 of Lecture Notes in Computer Science pages 1--20. Springer 2004.","key":"e_1_3_2_1_36_1","DOI":"10.1007\/978-3-540-24638-1_1"},{"doi-asserted-by":"crossref","unstructured":"P.\n      Rogaway\n    .\n  Efficient instantiations of tweakable blockciphers and refinements to modes ocb and pmac\n  . In P. J. Lee editor ASIACRYPT volume \n  3329\n   of \n  Lecture Notes in Computer Science pages \n  16\n  --\n  31\n  . \n  Springer 2004\n  .  P. Rogaway. Efficient instantiations of tweakable blockciphers and refinements to modes ocb and pmac. In P. J. Lee editor ASIACRYPT volume 3329 of Lecture Notes in Computer Science pages 16--31. Springer 2004.","key":"e_1_3_2_1_37_1","DOI":"10.1007\/978-3-540-30539-2_2"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_39_1","DOI":"10.5555\/1788414"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CODASPY '11","name":"CODASPY '11: First ACM Conference on Data and Application Security and Privacy","location":"San Antonio TX USA"},"container-title":["Proceedings of the first ACM conference on Data and application security and privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1943513.1943516","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1943513.1943516","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:39Z","timestamp":1750243959000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1943513.1943516"}},"subtitle":["recent results and applications"],"short-title":[],"issued":{"date-parts":[[2011,2,21]]},"references-count":35,"alternative-id":["10.1145\/1943513.1943516","10.1145\/1943513"],"URL":"https:\/\/doi.org\/10.1145\/1943513.1943516","relation":{},"subject":[],"published":{"date-parts":[[2011,2,21]]},"assertion":[{"value":"2011-02-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}