{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,26]],"date-time":"2026-01-26T15:45:47Z","timestamp":1769442347169,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T00:00:00Z","timestamp":1700006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["AdG REWORC - 101054911 and Starting Grant No. 805031 (EPOQUE)"],"award-info":[{"award-number":["AdG REWORC - 101054911 and Starting Grant No. 805031 (EPOQUE)"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["Germany?s Excellence Strategy - EXC 2092 CASA - 390781972"],"award-info":[{"award-number":["Germany?s Excellence Strategy - EXC 2092 CASA - 390781972"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,15]]},"DOI":"10.1145\/3576915.3623185","type":"proceedings-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T12:35:13Z","timestamp":1700570113000},"page":"1108-1122","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Post-Quantum Multi-Recipient Public Key Encryption"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4473-903X","authenticated-orcid":false,"given":"Jo\u00ebl","family":"Alwen","sequence":"first","affiliation":[{"name":"Amazon.com, Incorporated, Seattle, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0379-7903","authenticated-orcid":false,"given":"Dominik","family":"Hartmann","sequence":"additional","affiliation":[{"name":"Ruhr-Universit\u00e4t Bochum, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1178-048X","authenticated-orcid":false,"given":"Eike","family":"Kiltz","sequence":"additional","affiliation":[{"name":"Ruhr-Universit\u00e4t Bochum, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9462-1275","authenticated-orcid":false,"given":"Marta","family":"Mularczyk","sequence":"additional","affiliation":[{"name":"Amazon.com, Incorporated, Seattle, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1310-0997","authenticated-orcid":false,"given":"Peter","family":"Schwabe","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Security and Privacy &amp; Radboud University, Bochum, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45353-9_12"},{"key":"e_1_3_2_1_2_1","volume-title":"USENIX Security","author":"Alkim Erdem","year":"2016","unstructured":"Erdem Alkim, L\u00e9o Ducas, Thomas P\u00f6ppelmann, and Peter Schwabe. 2016. Post-quantum Key Exchange - A New Hope. In USENIX Security 2016, Thorsten Holz and Stefan Savage (Eds.). USENIX Association, 327--343."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560632"},{"key":"e_1_3_2_1_4_1","unstructured":"Jo\u00ebl Alwen Dominik Hartmann Eike Kiltz Marta Mularczyk and Peter Schwabe. 2022b. Post-Quantum Multi-Recipient Public Key Encryption. Cryptology ePrint Archive Paper 2022\/1046. https:\/\/eprint.iacr.org\/2022\/1046 https:\/\/eprint.iacr.org\/2022\/1046."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26951-7_10"},{"key":"e_1_3_2_1_6_1","unstructured":"Nimrod Aviram Benjamin Dowling Ilan Komargodski Kenneth G. Paterson Eyal Ronen and Eylon Yogev. 2022. Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to TLS. Cryptology ePrint Archive Report 2022\/065. https:\/\/eprint.iacr.org\/2022\/065."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11818175_36"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.907471"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36288-6_7"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25510-7_12"},{"key":"e_1_3_2_1_11_1","unstructured":"Matthew Campagna and Adam Petcher. 2020. Security of Hybrid Key Encapsulation. Cryptology ePrint Archive Report 2020\/1364. https:\/\/eprint.iacr.org\/2020\/1364."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_33"},{"key":"e_1_3_2_1_13_1","volume-title":"Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext. In INDOCRYPT 2006 (LNCS","volume":"408","author":"Chatterjee Sanjit","year":"2006","unstructured":"Sanjit Chatterjee and Palash Sarkar. 2006. Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext. In INDOCRYPT 2006 (LNCS, Vol. 4329), Rana Barua and Tanja Lange (Eds.). Springer, Heidelberg, 394--408."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77886-6_21"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-07082-2_24"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36362-7_17"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_34"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-011-9114-1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_10"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76578-5_7"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_6"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484817"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30574-3_13"},{"key":"e_1_3_2_1_24_1","volume-title":"ACISP 09 (LNCS","author":"Hiwatari Harunaga","unstructured":"Harunaga Hiwatari, Keisuke Tanaka, Tomoyuki Asano, and Koichi Sakumoto. 2009. Multi-recipient Public-Key Encryption from Simulators in Security Proofs. In ACISP 09 (LNCS, Vol. 5594), Colin Boyd and Juan Manuel Gonz\u00e1lez Nieto (Eds.). Springer, Heidelberg, 293--308."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64837-4_10"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45664-3_4"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-019-01490-6"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36362-7_21"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.23919\/ISITA.2018.8664317"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Michael A Nielsen and Isaac Chuang. 2002. Quantum computation and quantum information.","DOI":"10.1119\/1.1463744"},{"key":"e_1_3_2_1_31_1","volume-title":"Ki Tak Kim, and Dong Hoon Lee","author":"Park Jong Hwan","year":"2008","unstructured":"Jong Hwan Park, Ki Tak Kim, and Dong Hoon Lee. 2008. Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06. In ASIACCS 09, Masayuki Abe and Virgil Gligor (Eds.). ACM Press, 373--380."},{"key":"e_1_3_2_1_32_1","volume-title":"Schuldt","author":"Pinto Alexandre","year":"2014","unstructured":"Alexandre Pinto, Bertram Poettering, and Jacob C. N. Schuldt. 2014. Multi-recipient encryption, revisited. In ASIACCS 14, Shiho Moriai, Trent Jaeger, and Kouichi Sakurai (Eds.). ACM Press, 229--238."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30598-9_15"},{"key":"e_1_3_2_1_34_1","unstructured":"Nick Sullivan and Christopher Wood. 2021. Hashing to Elliptic Curves (version 13). IETF Internet Draft. https:\/\/datatracker.ietf.org\/doc\/html\/draft-irtf-cfrg-hash-to-curve."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_8"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1334"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26951-7_9"}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","location":"Copenhagen Denmark","acronym":"CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3623185","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3576915.3623185","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T01:47:14Z","timestamp":1755740834000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3623185"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,15]]},"references-count":37,"alternative-id":["10.1145\/3576915.3623185","10.1145\/3576915"],"URL":"https:\/\/doi.org\/10.1145\/3576915.3623185","relation":{},"subject":[],"published":{"date-parts":[[2023,11,15]]},"assertion":[{"value":"2023-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}