{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:50:11Z","timestamp":1777704611587,"version":"3.51.4"},"reference-count":24,"publisher":"SAGE Publications","issue":"6","license":[{"start":{"date-parts":[[2018,7,18]],"date-time":"2018-07-18T00:00:00Z","timestamp":1531872000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2018,12,24]]},"abstract":"<jats:p>Telco systems usually run large-scale, centralized key management systems. However, centralized approaches based on conventional public key encryption like RSA raise problems such as key escrow, secure channel to delivery key, and third-party query as well as single point of failure. To address these problems, we propose both certificate-based encryption (CBE) and hierarchical certificate-based encryption (HCBE) schemes proved secure in the standard model. Compared with other schemes, our schemes are proved IND-CCA2 (Indistinguishability under Adaptive Chosen Ciphertext Attack) secure in full model, where the number of group elements is independent of the value of security parameter. As far as we know, the proposed HCBE is the first fully IND-CCA2 secure scheme with ciphetexts of constant size.<\/jats:p>","DOI":"10.3233\/jifs-169838","type":"journal-article","created":{"date-parts":[[2018,7,20]],"date-time":"2018-07-20T12:29:26Z","timestamp":1532089766000},"page":"5971-5981","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["Efficient certificate-based encryption and hierarchical certificate-based encryption schemes in the standard model"],"prefix":"10.1177","volume":"35","author":[{"given":"Seong Oun","family":"Hwang","sequence":"first","affiliation":[{"name":"Department of Software and Communications Engineering, Hongik University, Sejong, Korea"}]},{"given":"Minh-Ha","family":"Le","sequence":"additional","affiliation":[{"name":"Department of Electronics and Computer Engineering, Hongik University, Sejong, Korea"}]}],"member":"179","published-online":{"date-parts":[[2018,7,18]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_17"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_13"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30580-4_27"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_11"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/11774716_7"},{"key":"e_1_3_2_8_2","article-title":"Is it possible to have cbe from cl-pke?","volume":"431","author":"Kang B.G.","year":"2005","unstructured":"KangB.G. and ParkJ.H., Is it possible to have cbe from cl-pke?IACR Cryptology ePrint Archive431 (2005).","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_9_2","first-page":"144","article-title":"Efficient certificate-based encryption in the standard model, In volume 8, Springer, pp.","volume":"8","author":"Liu J.","year":"2008","unstructured":"LiuJ. and ZhouJ., Efficient certificate-based encryption in the standard model, In volume 8, Springer, pp. , SCN, volume 8, Springer, 2008, pp 144\u2013155.","journal-title":"SCN"},{"key":"e_1_3_2_10_2","doi-asserted-by":"crossref","unstructured":"LuY. and LiJ. Constructing efficient certificate-based encryption scheme with pairing in the standard model In Information Theory and Information Security (ICI-TIS) 2010 IEEE International Conference on IEEE 2010 pp. 234\u2013237.","DOI":"10.1109\/ICITIS.2010.5688773"},{"issue":"11","key":"e_1_3_2_11_2","first-page":"4509","article-title":"Constructing pairing-free certificatebased encryption","volume":"9","author":"Lu Y.","year":"2013","unstructured":"LuY. and LiJ., Constructing pairing-free certificatebased encryption, International Journal of Innovative Computing Information and Control9(11) (2013), 4509\u20134518.","journal-title":"International Journal of Innovative Computing Information and Control"},{"key":"e_1_3_2_12_2","first-page":"bxr130","article-title":"A provably secure construction of certificate-based encryption from certificateless encryption","author":"Wu W.","year":"2012","unstructured":"WuW., MuY., SusiloW., HuangX. and XuL., A provably secure construction of certificate-based encryption from certificateless encryption, The Computer Journal (2012), bxr130.","journal-title":"The Computer Journal"},{"issue":"6","key":"e_1_3_2_13_2","article-title":"Certificate-based encryption scheme without pairing","volume":"7","author":"Yao J.","year":"2013","unstructured":"YaoJ., LiJ. and ZhangY., Certificate-based encryption scheme without pairing, KSII Transactions on Internet & Information Systems7(6) (2013).","journal-title":"KSII Transactions on Internet & Information Systems"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24707-4_93"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_13"},{"key":"e_1_3_2_16_2","unstructured":"LamportL. Constructing digital signatures from a oneway function. Technical report. Technical Report CSL-98 SRI International Palo Alto 1979."},{"key":"e_1_3_2_17_2","unstructured":"MorilloP. and R\u00e0folsC. Certificate-based encryption without random oracles 2006."},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_7"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.09.009"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_14"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISECS.2009.52"},{"key":"e_1_3_2_22_2","first-page":"455","article-title":"Waters, New techniques for dual system encryption and fully secure hibe with short ciphertexts","author":"Lewko A.","year":"2010","unstructured":"LewkoA. and WatersB., Waters, New techniques for dual system encryption and fully secure hibe with short ciphertexts, In Theory of Cryptography, Springer, 2010, pp. 455\u2013479.","journal-title":"Theory of Cryptography"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33260-9_3"},{"key":"e_1_3_2_24_2","doi-asserted-by":"crossref","unstructured":"SurC. ParkY. ShinS.U.K. RheeK.H. and SeoC. Certificate-based proxy re-encryption for public cloud storage Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS) 2013 Seventh International Conference on IEEE pp. 2013 pp. 159\u2013166.","DOI":"10.1109\/IMIS.2013.35"},{"key":"e_1_3_2_25_2","doi-asserted-by":"crossref","unstructured":"FanC.-I. TsaiP.-J. HuangJ.-J. and ChenW.-T. Anonymous multi-receiver certificate-based encryption In Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC) 2013 International Conference on IEEE 2013 pp. 19\u201326.","DOI":"10.1109\/CyberC.2013.13"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169838","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-169838","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169838","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:41:37Z","timestamp":1777455697000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-169838"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,18]]},"references-count":24,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2018,12,24]]}},"alternative-id":["10.3233\/JIFS-169838"],"URL":"https:\/\/doi.org\/10.3233\/jifs-169838","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,18]]}}}