{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T13:55:53Z","timestamp":1775483753004,"version":"3.50.1"},"reference-count":31,"publisher":"Vilnius University Press","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.15388\/20-infor406","type":"journal-article","created":{"date-parts":[[2020,4,3]],"date-time":"2020-04-03T13:24:52Z","timestamp":1585920292000},"page":"597-620","source":"Crossref","is-referenced-by-count":9,"title":["Leakage-Resilient Revocable Identity-Based Signature with Cloud Revocation Authority"],"prefix":"10.15388","author":[{"given":"Jui-Di","family":"Wu","sequence":"first","affiliation":[]},{"given":"Yuh-Min","family":"Tseng","sequence":"additional","affiliation":[]},{"given":"Sen-Shan","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Tung-Tso","family":"TSAI","sequence":"additional","affiliation":[]}],"member":"6097","published-online":{"date-parts":[[2020,4,3]]},"reference":[{"key":"2020092417112564779_j_infor406_ref_001","first-page":"36","volume-title":"Advances in Cryptology \u2013 CRYPTO","volume":"5677","year":"2009"},{"key":"2020092417112564779_j_infor406_ref_002","first-page":"221","volume-title":"Advances in Cryptology \u2013 CRYPTO","volume":"5157","year":"2008"},{"key":"2020092417112564779_j_infor406_ref_003","first-page":"213","volume-title":"Advances in Cryptology \u2013 CRYPTO","volume":"2139","year":"2001"},{"key":"2020092417112564779_j_infor406_ref_004","first-page":"37","volume-title":"Advances in Cryptology \u2013 EUROCRYPT","volume":"1233","year":"1997"},{"key":"2020092417112564779_j_infor406_ref_005","first-page":"514","volume-title":"Advances in Cryptology \u2013 ASIACRYPT","volume":"2248","year":"2001"},{"key":"2020092417112564779_j_infor406_ref_006","first-page":"440","volume-title":"Advances in Cryptology \u2013 EUROCRYPT","volume":"3494","year":"2005"},{"key":"2020092417112564779_j_infor406_ref_007","first-page":"501","volume-title":"Proceedings of 51st Annual IEEE Symposium on Foundations of Computer Science","year":"2010"},{"issue":"5","key":"2020092417112564779_j_infor406_ref_008","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1016\/j.comnet.2005.01.010","article-title":"Remote timing attacks are practical","volume":"48","year":"2005","journal-title":"Computer Networks"},{"issue":"1","key":"2020092417112564779_j_infor406_ref_009","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1137\/060651380","article-title":"Fuzzy extractors: how to generate strong keys from biometrics and other noisy data","volume":"38","year":"2008","journal-title":"SIAM Journal on Computing"},{"key":"2020092417112564779_j_infor406_ref_010","first-page":"50","volume-title":"Proc. SAC\u201912","volume":"7707","year":"2013"},{"issue":"3","key":"2020092417112564779_j_infor406_ref_011","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/s13389-016-0121-x","article-title":"Implementation of a leakage-resilient ElGamal key encapsulation mechanism","volume":"6","year":"2016","journal-title":"Journal of Cryptographic Engineering"},{"key":"2020092417112564779_j_infor406_ref_012"},{"key":"2020092417112564779_j_infor406_ref_013","article-title":"Revocable ID-based signature with short size over lattices","volume":"2017","year":"2017","journal-title":"Security and Communication Networks"},{"key":"2020092417112564779_j_infor406_ref_014","doi-asserted-by":"crossref","first-page":"2945","DOI":"10.1109\/ACCESS.2017.2676021","article-title":"Efficient revocable ID-based signature with cloud revocation server","volume":"5","year":"2017","journal-title":"IEEE Access"},{"key":"2020092417112564779_j_infor406_ref_015","first-page":"595","volume-title":"Advances in Cryptology \u2013 ASIACRYPT","volume":"6477","year":"2010"},{"key":"2020092417112564779_j_infor406_ref_016","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2013 CRYPTO","volume":"1666","year":"1999"},{"issue":"2","key":"2020092417112564779_j_infor406_ref_017","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1109\/TC.2013.208","article-title":"Identity-based encryption with outsourced revocation in cloud computing","volume":"64","year":"2015","journal-title":"IEEE Transactions Computers"},{"key":"2020092417112564779_j_infor406_ref_018"},{"key":"2020092417112564779_j_infor406_ref_019","first-page":"296","volume-title":"Proc. Cryptography and Coding","year":"2011"},{"key":"2020092417112564779_j_infor406_ref_020","first-page":"47","volume-title":"Advances in Cryptology \u2013 CRYPTO","volume":"196","year":"1984"},{"key":"2020092417112564779_j_infor406_ref_021","first-page":"256","volume-title":"Advances in Cryptology \u2013 EUROCRYPT","volume":"1233","year":"1997"},{"key":"2020092417112564779_j_infor406_ref_022","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1007\/978-3-319-06320-1_31","volume-title":"Proc. Information Security Practice and Experience","volume":"8434","year":"2014"},{"issue":"3","key":"2020092417112564779_j_infor406_ref_023","first-page":"481","article-title":"A fully secure revocable ID-based encryption in the standard model","volume":"23","year":"2012","journal-title":"Informatica"},{"issue":"2","key":"2020092417112564779_j_infor406_ref_024","first-page":"159","article-title":"Efficient revocable multi-receiver ID-based encryption","volume":"42","year":"2013","journal-title":"Information Technology and Control"},{"issue":"10","key":"2020092417112564779_j_infor406_ref_025","doi-asserted-by":"crossref","first-page":"1250","DOI":"10.1002\/sec.696","article-title":"Provably secure revocable ID-based signature in the standard model","volume":"6","year":"2013","journal-title":"Security and Communication Networks"},{"issue":"4","key":"2020092417112564779_j_infor406_ref_026","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1093\/comjnl\/bxr098","article-title":"Efficient revocable ID-based encryption with a public channel","volume":"55","year":"2012","journal-title":"Computer Journal"},{"issue":"4","key":"2020092417112564779_j_infor406_ref_027","doi-asserted-by":"crossref","first-page":"1041","DOI":"10.1109\/TCC.2016.2541138","article-title":"Identity-based encryption with cloud revocation authority and its applications","volume":"6","year":"2018","journal-title":"IEEE Transactions on Cloud Computing"},{"issue":"17","key":"2020092417112564779_j_infor406_ref_028","doi-asserted-by":"crossref","first-page":"3987","DOI":"10.1002\/sec.1580","article-title":"Leakage-resilient ID-based signature scheme in the generic bilinear group model","volume":"9","year":"2016","journal-title":"Security and Communication Networks"},{"issue":"1","key":"2020092417112564779_j_infor406_ref_029","doi-asserted-by":"crossref","first-page":"125","DOI":"10.15388\/Informatica.2018.161","article-title":"Leakage-resilient certificateless key encapsulation scheme","volume":"29","year":"2018","journal-title":"Informatica"},{"issue":"1","key":"2020092417112564779_j_infor406_ref_030","first-page":"19041","article-title":"Leakage-resilient certificate-based signature resistant to side-channel attacks","volume":"7","year":"2019","journal-title":"IEEE Access"},{"key":"2020092417112564779_j_infor406_ref_031","first-page":"117","volume-title":"Advances in Cryptology \u2013 EUROCRYPT","volume":"7237","year":"2012"}],"container-title":["Informatica"],"original-title":[],"language":"en","deposited":{"date-parts":[[2020,9,24]],"date-time":"2020-09-24T14:15:39Z","timestamp":1600956939000},"score":1,"resource":{"primary":{"URL":"https:\/\/informatica.vu.lt\/doi\/10.15388\/20-INFOR406"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":31,"alternative-id":["10.15388\/20-INFOR406"],"URL":"https:\/\/doi.org\/10.15388\/20-infor406","relation":{},"ISSN":["0868-4952","1822-8844"],"issn-type":[{"value":"0868-4952","type":"print"},{"value":"1822-8844","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}