{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:43:28Z","timestamp":1761324208919,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.23919\/isita.2018.8664373","type":"proceedings-article","created":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T23:49:11Z","timestamp":1552348151000},"page":"703-706","source":"Crossref","is-referenced-by-count":4,"title":["A Remark on an Identity-Based Encryption Scheme with Non-interactive Opening"],"prefix":"10.23919","author":[{"given":"Yusuke","family":"Sakai","sequence":"first","affiliation":[]},{"given":"Goichiro","family":"Hanaoka","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","article-title":"Public key encryption with keyword search","volume":"3027","author":"boneh","year":"2004","journal-title":"EUROCRYPT 2004 ser LNCS"},{"key":"ref11","first-page":"270","article-title":"Group signatures with message-dependent opening","volume":"7708","author":"sakai","year":"2013","journal-title":"Pairing 2012 ser LNCS"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s12204-008-0670-y"},{"key":"ref13","article-title":"Chosen-ciphertext secure identity-based encryption in the standard model with short ciphertexts","author":"kiltz","year":"2006","journal-title":"Cryptology ePrint Archive Report"},{"key":"ref14","first-page":"389","article-title":"Breaking and repairing Damg&#x00E5;rd public key encryption scheme with non-interactive opening","volume":"5473","author":"galindo","year":"2009","journal-title":"CT-RSA 2009 LNCS"},{"key":"ref15","first-page":"132","article-title":"Efficient CCA-secure PKE from identity-based techniques","volume":"5985","author":"lai","year":"2010","journal-title":"CT-RSA 2010 ser LNCS"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9010-x"},{"key":"ref17","first-page":"231","article-title":"Tag-KEM\/DEM framework for public-key encryption with non-interactive opening","author":"sakai","year":"2016","journal-title":"Proc 2016 International Symposium on Information Theory and its Application"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/978-3-642-12678-9_20","article-title":"Public-key encryption with non-interactive opening: New constructions and stronger definitions","volume":"6055","author":"galindo","year":"2010","journal-title":"Progress in Cryptology - AFRICACRYPT 2010"},{"key":"ref3","first-page":"715","article-title":"On the security of dynamic group signatures: Preventing signature hijacking","volume":"7293","author":"sakai","year":"2012","journal-title":"PKC 2012 ser LNCS"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2016.04.003"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-013-0204-y"},{"key":"ref8","article-title":"Timed-release crypto","author":"may","year":"1993","journal-title":"Manuscript"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"ref2","first-page":"239","article-title":"Public-key encryption with non-interactive opening","volume":"4964","author":"damg\u00e5rd","year":"2008","journal-title":"CT-RSA 2008 Ser LNCS"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1007\/978-3-540-72540-4_24","article-title":"Non-interactive proofs for integer multiplication","volume":"4515","author":"damg\u00e5rd","year":"2007","journal-title":"Advances in Cryptology - EUROCRYPT 2007"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/978-3-540-40061-5_29","article-title":"Certificateless public key cryptography","volume":"2894","author":"al-riyami","year":"2003","journal-title":"ASIACRYPT 2003 ser LNCS"}],"event":{"name":"2018 International Symposium on Information Theory and Its Applications (ISITA)","start":{"date-parts":[[2018,10,28]]},"location":"Singapore","end":{"date-parts":[[2018,10,31]]}},"container-title":["2018 International Symposium on Information Theory and Its Applications (ISITA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8660385\/8664205\/08664373.pdf?arnumber=8664373","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T06:27:24Z","timestamp":1643264844000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8664373\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.23919\/isita.2018.8664373","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}