{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T07:00:15Z","timestamp":1777964415866,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,4]],"date-time":"2014-06-04T00:00:00Z","timestamp":1401840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,4]]},"DOI":"10.1145\/2590296.2590329","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T18:18:31Z","timestamp":1401473911000},"page":"229-238","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Multi-recipient encryption, revisited"],"prefix":"10.1145","author":[{"given":"Alexandre","family":"Pinto","sequence":"first","affiliation":[{"name":"Royal Holloway, University of London, Egham, United Kingdom"}]},{"given":"Bertram","family":"Poettering","sequence":"additional","affiliation":[{"name":"Royal Holloway, University of London, Egham, United Kingdom"}]},{"given":"Jacob C.N.","family":"Schuldt","sequence":"additional","affiliation":[{"name":"Royal Holloway, University of London, Egham, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2014,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"M.\n      Abdalla M.\n      Bellare and \n      P.\n      Rogaway\n  . \n  The oracle Diffie-Hellman assumptions and an analysis of DHIES\n  . In D. Naccache editor CT-RSA \n  2001 volume \n  2020\n   of \n  LNCS pages \n  143\n  --\n  158 San Francisco CA USA Apr. 8--12 2001. \n  Springer Berlin Germany.   M. Abdalla M. Bellare and P. Rogaway. The oracle Diffie-Hellman assumptions and an analysis of DHIES. In D. Naccache editor CT-RSA 2001 volume 2020 of LNCS pages 143--158 San Francisco CA USA Apr. 8--12 2001. Springer Berlin Germany.","DOI":"10.1007\/3-540-45353-9_12"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30580-4_26"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/11586821_28"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.907471"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"M.\n      Bellare A.\n      Boldyreva and \n      J.\n      Staddon\n  . \n  Randomness re-use in multi-recipient encryption schemes\n  . In Y. Desmedt editor PKC \n  2003 volume \n  2567\n   of \n  LNCS pages \n  85\n  --\n  99 Miami USA Jan. 6--8 2003. \n  Springer Berlin Germany.   M. Bellare A. Boldyreva and J. Staddon. Randomness re-use in multi-recipient encryption schemes. In Y. Desmedt editor PKC 2003 volume 2567 of LNCS pages 85--99 Miami USA Jan. 6--8 2003. Springer Berlin Germany.","DOI":"10.1007\/3-540-36288-6_7"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_16"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11941378_28"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"R.\n      Cramer\n     and \n      V.\n      Shoup\n  . \n  A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack\n  . In H. Krawczyk editor CRYPTO'98 volume \n  1462\n   of \n  LNCS pages \n  13\n  --\n  25 Santa Barbara CA USA Aug. 23--27 1998\n  . \n  Springer Berlin Germany.   R. Cramer and V. Shoup. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In H. Krawczyk editor CRYPTO'98 volume 1462 of LNCS pages 13--25 Santa Barbara CA USA Aug. 23--27 1998. Springer Berlin Germany.","DOI":"10.1007\/BFb0055717"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539702403773"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"C.\n      Delerabl\u00e9e\n    .\n  Identity-based broadcast encryption with constant size ciphertexts and private keys\n  . In K. Kurosawa editor ASIACRYPT \n  2007 volume \n  4833\n   of \n  LNCS pages \n  200\n  --\n  215 Kuching Malaysia Dec. 2--6 2007. \n  Springer Berlin Germany.   C. Delerabl\u00e9e. Identity-based broadcast encryption with constant size ciphertexts and private keys. In K. Kurosawa editor ASIACRYPT 2007 volume 4833 of LNCS pages 200--215 Kuching Malaysia Dec. 2--6 2007. Springer Berlin Germany.","DOI":"10.1007\/978-3-540-76900-2_12"},{"key":"e_1_3_2_1_11_1","unstructured":"T.\n      ElGamal\n    .\n  A public key cryptosystem and a signature scheme based on discrete logarithms\n  . In G. R. Blakley and D. Chaum editors CRYPTO'84 volume \n  196\n   of \n  LNCS pages \n  10\n  --\n  18 Santa Barbara CA USA Aug. 19--23 1984\n  . \n  Springer Berlin Germany.   T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. In G. R. Blakley and D. Chaum editors CRYPTO'84 volume 196 of LNCS pages 10--18 Santa Barbara CA USA Aug. 19--23 1984. Springer Berlin Germany."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"A.\n      Fiat\n     and \n      M.\n      Naor\n  . \n  Broadcast encryption\n  . In D. R. Stinson editor CRYPTO'93 volume \n  773\n   of \n  LNCS pages \n  480\n  --\n  491 Santa Barbara CA USA Aug. 22--26 1993\n  . \n  Springer Berlin Germany.   A. Fiat and M. Naor. Broadcast encryption. In D. R. Stinson editor CRYPTO'93 volume 773 of LNCS pages 480--491 Santa Barbara CA USA Aug. 22--26 1993. Springer Berlin Germany.","DOI":"10.1007\/3-540-48329-2_40"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"K.\n      Kurosawa\n    .\n  Multi-recipient public-key encryption with shortened ciphertext\n  . In D. Naccache and P. Paillier editors PKC \n  2002 volume \n  2274\n   of \n  LNCS pages \n  48\n  --\n  63 Paris France Feb. 12--14 2002. \n  Springer Berlin Germany.   K. Kurosawa. Multi-recipient public-key encryption with shortened ciphertext. In D. Naccache and P. Paillier editors PKC 2002 volume 2274 of LNCS pages 48--63 Paris France Feb. 12--14 2002. Springer Berlin Germany.","DOI":"10.1007\/3-540-45664-3_4"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"D.\n      Naor M.\n      Naor and \n      J.\n      Lotspiech\n  . \n  Revocation and tracing schemes for stateless receivers\n  . In J. Kilian editor CRYPTO \n  2001 volume \n  2139\n   of \n  LNCS pages \n  41\n  --\n  62 Santa Barbara CA USA Aug. 19--23 2001. \n  Springer Berlin Germany.   D. Naor M. Naor and J. Lotspiech. Revocation and tracing schemes for stateless receivers. In J. Kilian editor CRYPTO 2001 volume 2139 of LNCS pages 41--62 Santa Barbara CA USA Aug. 19--23 2001. Springer Berlin Germany.","DOI":"10.1007\/3-540-44647-8_3"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30598-9_15"}],"event":{"name":"ASIA CCS '14: 9th ACM Symposium on Information, Computer and Communications Security","location":"Kyoto Japan","acronym":"ASIA CCS '14","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 9th ACM symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590329","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2590296.2590329","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:55:51Z","timestamp":1750229751000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590329"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,4]]},"references-count":15,"alternative-id":["10.1145\/2590296.2590329","10.1145\/2590296"],"URL":"https:\/\/doi.org\/10.1145\/2590296.2590329","relation":{},"subject":[],"published":{"date-parts":[[2014,6,4]]},"assertion":[{"value":"2014-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}