{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T10:52:01Z","timestamp":1753354321558,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ERC","award":["Project ERCC FP7\/615074"],"award-info":[{"award-number":["Project ERCC FP7\/615074"]}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1526801, CNS-1228890, CNS-1717640, CICI 1738912"],"award-info":[{"award-number":["CNS-1526801, CNS-1228890, CNS-1717640, CICI 1738912"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006597","name":"Florida State University","doi-asserted-by":"publisher","award":["First-year Research Assistant Professor Award"],"award-info":[{"award-number":["First-year Research Assistant Professor Award"]}],"id":[{"id":"10.13039\/100006597","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100004318","name":"Microsoft","doi-asserted-by":"publisher","award":["Gift"],"award-info":[{"award-number":["Gift"]}],"id":[{"id":"10.13039\/100004318","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3133995","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"1515-1532","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Identity-Based Format-Preserving Encryption"],"prefix":"10.1145","author":[{"given":"Mihir","family":"Bellare","sequence":"first","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]},{"given":"Viet Tung","family":"Hoang","sequence":"additional","affiliation":[{"name":"Florida State University, Tallahassee, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44448-3_42"},{"volume-title":"Bart Preneel (Ed.)","author":"Bellare Mihir","key":"e_1_3_2_2_2_1","unstructured":"Mihir Bellare, Alexandra Boldyreva, and Silvio Micali. 2000. Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements EUROCRYPT 2000 (LNCS), Bart Preneel (Ed.), Vol. Vol. 1807. Springer, Heidelberg, 259--274."},{"volume-title":"Pseudorandom functions revisited: The cascade construction and its concrete security 37th FOCS","author":"Bellare Mihir","key":"e_1_3_2_2_3_1","unstructured":"Mihir Bellare, Ran Canetti, and Hugo Krawczyk. 1996. Pseudorandom functions revisited: The cascade construction and its concrete security 37th FOCS. IEEE Computer Society Press, 514--523."},{"volume-title":"A Concrete Security Treatment of Symmetric Encryption 38th FOCS","author":"Bellare Mihir","key":"e_1_3_2_2_4_1","unstructured":"Mihir Bellare, Anand Desai, Eric Jokipii, and Phillip Rogaway 1997. A Concrete Security Treatment of Symmetric Encryption 38th FOCS. IEEE Computer Society Press, 394--403."},{"volume-title":"Standard Security Does Not Imply Security against Selective-Opening EUROCRYPT 2012 (LNCS)","author":"Bellare Mihir","key":"e_1_3_2_2_5_1","unstructured":"Mihir Bellare, Rafael Dowsley, Brent Waters, and Scott Yilek 2012. Standard Security Does Not Imply Security against Selective-Opening EUROCRYPT 2012 (LNCS), David Pointcheval and Thomas Johansson (Eds.), Vol. Vol. 7237. Springer, Heidelberg, 645--662."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"crossref","unstructured":"Mihir Bellare and Viet Tung Hoang 2017. Identity-Based Format-Preserving Encryption. Cryptology ePrint Archive. (2017). Full version of this paper.","DOI":"10.1145\/3133956.3133995"},{"key":"e_1_3_2_2_7_1","volume-title":"Viet Tung Hoang, and Stefano Tessaro","author":"Bellare Mihir","year":"2016","unstructured":"Mihir Bellare, Viet Tung Hoang, and Stefano Tessaro. 2016. Message-Recovery Attacks on Feistel-Based Format Preserving Encryption ACM CCS 16, Edgar R. Weippl, Stefan Katzenbeisser, Christopher Kruegel, Andrew C. Myers, and Shai Halevi (Eds.). ACM Press, 444--455."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_1"},{"volume-title":"Kaisa Nyberg (Ed.)","author":"Bellare Mihir","key":"e_1_3_2_2_9_1","unstructured":"Mihir Bellare, Ted Krovetz, and Phillip Rogaway. 1998. Luby-Rackoff Backwards: Increasing Security by Making Block Ciphers Non-invertible EUROCRYPT'98 (LNCS), Kaisa Nyberg (Ed.), Vol. Vol. 1403. Springer, Heidelberg, 266--280."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05445-7_19"},{"volume-title":"Serge Vaudenay (Ed.)","author":"Bellare Mihir","key":"e_1_3_2_2_11_1","unstructured":"Mihir Bellare and Phillip Rogaway 2006. The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs EUROCRYPT 2006 (LNCS), Serge Vaudenay (Ed.), Vol. Vol. 4004. Springer, Heidelberg, 409--426."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(02)00269-7"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45760-7_9"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_13"},{"key":"e_1_3_2_2_15_1","volume-title":"Viet Tung Hoang, and Stefano Tessaro","author":"Dai Wei","year":"2017","unstructured":"Wei Dai, Viet Tung Hoang, and Stefano Tessaro 2017. Information-theoretic Indistinguishability via the Chi-Squared Method CRYPTO 2017. Springer, 497--523."},{"volume-title":"Tatsuaki Okamoto (Ed.)","author":"Desai Anand","key":"e_1_3_2_2_16_1","unstructured":"Anand Desai and Sara Miner 2000. Concrete security characterizations of PRFs and PRPs: Reductions and applications ASIACRYPT 2000 (LNCS), Tatsuaki Okamoto (Ed.), Vol. Vol. 1976. Springer, Heidelberg, 503--516."},{"key":"e_1_3_2_2_17_1","volume-title":"Breaking and Repairing the FF3 Format Preserving Encryption over Small Domain CRYPTO","author":"Bet\u00fcl Durak F.","year":"2017","unstructured":"F. Bet\u00fcl Durak and Serge Vaudenay 2017. Breaking and Repairing the FF3 Format Preserving Encryption over Small Domain CRYPTO 2017. Springer, 679--707."},{"key":"e_1_3_2_2_18_1","volume-title":"Stockmeyer","author":"Dwork Cynthia","year":"1999","unstructured":"Cynthia Dwork, Moni Naor, Omer Reingold, and Larry J. Stockmeyer 1999. Magic Functions 40th FOCS. IEEE Computer Society Press, 523--534."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800--38G"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_1"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53644-5_5"},{"key":"e_1_3_2_2_23_1","volume-title":"New Blockcipher Modes of Operation with Beyond the Birthday Bound Security FSE 2006 (LNCS), Matthew J. B. Robshaw (Ed.)","volume":"4047","author":"Iwata Tetsu","year":"2006","unstructured":"Tetsu Iwata. 2006. New Blockcipher Modes of Operation with Beyond the Birthday Bound Security FSE 2006 (LNCS), Matthew J. B. Robshaw (Ed.), Vol. Vol. 4047. Springer, Heidelberg, 310--327."},{"key":"e_1_3_2_2_25_1","volume-title":"Connecting tweakable and multi-key blockcipher security. Designs, Codes and Cryptography (Mar","author":"Lee Jooyoung","year":"2017","unstructured":"Jooyoung Lee, Atul Luykx, Bart Mennink, and Kazuhiko Minematsu. 2017. Connecting tweakable and multi-key blockcipher security. Designs, Codes and Cryptography (Mar 2017)."}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Dallas Texas USA","acronym":"CCS '17"},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3133995","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3133995","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3133995","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:26Z","timestamp":1750212806000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3133995"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":23,"alternative-id":["10.1145\/3133956.3133995","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3133995","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}