{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T14:44:05Z","timestamp":1772808245561,"version":"3.50.1"},"reference-count":49,"publisher":"American Institute of Mathematical Sciences (AIMS)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AMC"],"published-print":{"date-parts":[[2017]]},"DOI":"10.3934\/amc.2017010","type":"journal-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T09:28:42Z","timestamp":1487237322000},"page":"161-177","source":"Crossref","is-referenced-by-count":4,"title":["Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model"],"prefix":"10.3934","volume":"11","author":[{"given":"Yang","family":"Lu","sequence":"first","affiliation":[]},{"given":"Jiguo","family":"Li","sequence":"additional","affiliation":[]}],"member":"2321","reference":[{"key":"key-10.3934\/amc.2017010-1","doi-asserted-by":"crossref","unstructured":"<p>M. Abdalla, S. K. Miner and C. Namprempre, Forward-secure threshold signature schemes, in <i>Proc. CT-RSA 2001, Springer-Verlag, 2001<\/i>,441-456.<\/p>","DOI":"10.1007\/3-540-45353-9_32"},{"key":"key-10.3934\/amc.2017010-2","doi-asserted-by":"crossref","unstructured":"<p>M. Abdalla and L. Reyzin, A new forward-secure digital signature scheme, in Proc. <i>Asiacrypt. 2000<\/i>, Springer-Verlag, 2000,116-129.<\/p>","DOI":"10.1007\/3-540-44448-3_10"},{"key":"key-10.3934\/amc.2017010-3","unstructured":"<p>R. Anderson, Two Remarks on public key cryptology, in 4th ACM Conf. Comp. Commun. Secur. , 1997.<\/p>"},{"key":"key-10.3934\/amc.2017010-4","doi-asserted-by":"crossref","unstructured":"<p>M. Bellare and S. K. Miner, A forward-secure digital signature scheme, in <i>Proc. Crypt. 1999<\/i>, Springer-Verlag, 1999,431-448.<\/p>","DOI":"10.1007\/3-540-48405-1_28"},{"key":"key-10.3934\/amc.2017010-5","doi-asserted-by":"publisher","DOI":"10.1007\/s00200-005-0183-y"},{"key":"key-10.3934\/amc.2017010-6","doi-asserted-by":"crossref","unstructured":"<p>M. Bellare and P. Rogaway, Random oracles are practical: a paradigm for designing efficient protocols, in <i>Proc. ACM CCS 1993<\/i>, ACM, 1993, 62-73.<\/p>","DOI":"10.1145\/168588.168596"},{"key":"key-10.3934\/amc.2017010-7","doi-asserted-by":"crossref","unstructured":"<p>M. Bellare and B. Yee, Forward security in private-key cryptography, in <i>Proc. CT-RSA 2003<\/i>, Springer-Verlag, 2003, 1-18.<\/p>","DOI":"10.1007\/3-540-36563-X_1"},{"key":"key-10.3934\/amc.2017010-8","doi-asserted-by":"crossref","unstructured":"<p>D. Boneh and X. Boyen, Efficient selective-id identity based encryption without random oracles, in <i>Proc. Eurocrypt. 2004<\/i>, Springer-Verlag, 2004,223-238.<\/p>","DOI":"10.1007\/978-3-540-24676-3_14"},{"key":"key-10.3934\/amc.2017010-9","doi-asserted-by":"crossref","unstructured":"<p>D. Boneh, X. Boyen and E. J. Goh, Hierarchical identity based encryption with constant size ciphertext, in <i>Proc. Eurocrypt. 2005<\/i>, Springer-Verlag, 2005,440-456.<\/p>","DOI":"10.1007\/11426639_26"},{"key":"key-10.3934\/amc.2017010-10","doi-asserted-by":"crossref","unstructured":"<p>D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing, in <i>Proc. Crypt. 2001<\/i>, Springer-Verlag, 2001,213-229.<\/p>","DOI":"10.1007\/3-540-44647-8_13"},{"key":"key-10.3934\/amc.2017010-11","doi-asserted-by":"crossref","unstructured":"<p>X. Boyen, H. Shacham, E. Shen and B. Waters, Forward-secure signatures with untrusted update, in <i>Proc. ACM CCS 2006<\/i>, ACM, 2006,191-200.<\/p>","DOI":"10.1145\/1180405.1180430"},{"key":"key-10.3934\/amc.2017010-12","doi-asserted-by":"publisher","DOI":"10.1145\/1008731.1008734"},{"key":"key-10.3934\/amc.2017010-13","doi-asserted-by":"crossref","unstructured":"<p>R. Canetti, S. Halevi and J. Katz, A forward-secure public-key encryption scheme, in <i>Proc. Eurocrypt. 2003<\/i>, Springer-Verlag, 2003,255-271.<\/p>","DOI":"10.1007\/3-540-39200-9_16"},{"key":"key-10.3934\/amc.2017010-14","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-006-0442-5"},{"key":"key-10.3934\/amc.2017010-15","doi-asserted-by":"crossref","unstructured":"<p>L. Chen and Z. Cheng, Security proof of Sakai-Kasahar's identity-based encryption scheme, in <i>Proc. Crypt. Coding 2005<\/i>, Springer-Verlag, 2005,442-459.<\/p>","DOI":"10.1007\/11586821_29"},{"key":"key-10.3934\/amc.2017010-16","doi-asserted-by":"crossref","unstructured":"<p>C. Cocks, An identity based encryption scheme based on quadratic residues, in <i>Proc. Crypt. Coding 2001<\/i>, Springer-Verlag, 2001,360-363.<\/p>","DOI":"10.1007\/3-540-45325-3_32"},{"key":"key-10.3934\/amc.2017010-17","doi-asserted-by":"publisher","DOI":"10.1007\/BF00124891"},{"key":"key-10.3934\/amc.2017010-18","doi-asserted-by":"crossref","unstructured":"<p>Y. Dodis, M. Franklin, J. Katz, A. Miyaji and M. Yung, Intrusion-resilient public-key encryption, in <i>Proc. CT-RSA 2003<\/i>, Springer-Verlag, 2003, 19-32.<\/p>","DOI":"10.1007\/3-540-36563-X_2"},{"key":"key-10.3934\/amc.2017010-19","doi-asserted-by":"crossref","unstructured":"<p>Y. Dodis, J. Katz, S. Xu and M. Yung, Key-insulated public-key cryptosystems, in <i>Proc. Eurocrypt. 2002<\/i>, Springer-Verlag, 2002, 65-82.<\/p>","DOI":"10.1007\/3-540-46035-7_5"},{"key":"key-10.3934\/amc.2017010-20","doi-asserted-by":"crossref","unstructured":"<p>C. Gentry, Practical identity-based encryption without random oracles, in <i>Proc. Eurocrypt. 2006<\/i>, Springer-Verlag, 2006,445-464.<\/p>","DOI":"10.1007\/11761679_27"},{"key":"key-10.3934\/amc.2017010-21","doi-asserted-by":"crossref","unstructured":"<p>C. Gentry and A. Silverberg, Hierarchical ID-based cryptography, in <i>Proc. Asiacrypt. 2002<\/i>, Springer-Verlag, 2002,548-566.<\/p>","DOI":"10.1007\/3-540-36178-2_34"},{"key":"key-10.3934\/amc.2017010-22","doi-asserted-by":"crossref","unstructured":"<p>C. G. G\u00fcnther, An identity-based key-exchange protocol, in <i>Proc. Eurocrypt. 1989<\/i>, SpringerVerlag, 1990, 29-37.<\/p>","DOI":"10.1007\/3-540-46885-4_5"},{"key":"key-10.3934\/amc.2017010-23","doi-asserted-by":"crossref","unstructured":"<p>G. Hanaoka, Y. Hanaoka and H. Imai, Parallel key-insulated public key encryption, in <i>Proc. PKC 2006<\/i>, Springer-Verlag, 2006,105-122.<\/p>","DOI":"10.1007\/11745853_8"},{"key":"key-10.3934\/amc.2017010-24","doi-asserted-by":"crossref","unstructured":"<p>J. Horwitz and B. Lynn, Toward hierarchical identity-based encryption, in <i>Proc. Eurocrypt. 2002<\/i>, Springer-Verlag, 2002,466-481.<\/p>","DOI":"10.1007\/3-540-46035-7_31"},{"key":"key-10.3934\/amc.2017010-25","doi-asserted-by":"crossref","unstructured":"<p>G. Itkis and L. Reyzin, Forward-secure signatures with optimal signing and verifying, in <i>Proc. Crypt. 2001<\/i>, Springer-Verlag, 2001,499-514.<\/p>","DOI":"10.1007\/3-540-44647-8_20"},{"key":"key-10.3934\/amc.2017010-26","doi-asserted-by":"crossref","unstructured":"<p>G. Itkis and L. Reyzin, SiBIR: Signer-base intrusion-resilient signatures, in <i>Proc. Crypt. 2002<\/i>, Springer-Verlag, 2002,499-514.<\/p>","DOI":"10.1007\/3-540-45708-9_32"},{"key":"key-10.3934\/amc.2017010-27","doi-asserted-by":"crossref","unstructured":"<p>E. Kiltz and Y. Vahlis, CCA2 secure IBE: standard model efficiency through authenticated symmetric encryption, in <i>Proc. CT-RSA 2008<\/i>, Springer-Verlag, 2008,221-238.<\/p>","DOI":"10.1007\/978-3-540-79263-5_14"},{"key":"key-10.3934\/amc.2017010-28","unstructured":"<p>A. Kozlov and L. Reyzin, Forward-secure signatures with fast key update, in <i>Proc. SCN 2002<\/i>, Springer-Verlag, 2002,247-262.<\/p>"},{"key":"key-10.3934\/amc.2017010-29","doi-asserted-by":"crossref","unstructured":"<p>H. Krawczyk, Simple forward-secure signatures from any signature scheme, in <i>Proc. ACM CCS 2000<\/i>, ACM, 2000,108-115.<\/p>","DOI":"10.1145\/352600.352617"},{"key":"key-10.3934\/amc.2017010-30","doi-asserted-by":"crossref","unstructured":"<p>J. Li, F. Zhang and Y. Wang, A strong identity-based key-insulated cryptosystem, in <i>Proc. EUC Workshops 2006<\/i>, Springer-Verlag, 2006,352-361.<\/p>","DOI":"10.1007\/11807964_36"},{"key":"key-10.3934\/amc.2017010-31","doi-asserted-by":"crossref","unstructured":"<p>B. Libert, J. Quisquater and M. Yung, Forward-secure signatures in untrusted update environments, in <i>Proc. ACM CCS 2007<\/i>, ACM, 2007,266-275.<\/p>","DOI":"10.1145\/1315245.1315279"},{"key":"key-10.3934\/amc.2017010-32","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.6.9.1254-1261"},{"key":"key-10.3934\/amc.2017010-33","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.7.12.3068-3074"},{"key":"key-10.3934\/amc.2017010-34","doi-asserted-by":"crossref","unstructured":"<p>Y. Lu and J. G. Li, New forward-secure public-key encryption without random oracles, <i>Int. J. Comp. Math.<\/i> , <b>90<\/b> (2013), 2603-2613.<\/p>","DOI":"10.1080\/00207160.2013.807915"},{"key":"key-10.3934\/amc.2017010-35","doi-asserted-by":"publisher","DOI":"10.3934\/amc.2015.9.353"},{"key":"key-10.3934\/amc.2017010-36","doi-asserted-by":"crossref","unstructured":"<p>T. Malkin, D. Micciancio and S. K. Miner, Efficient generic forward-secure signatures with an unbounded number of time periods, in <i>Proc. Eurocrypt. 2002<\/i>, Springer-Verlag, 2002,400-417.<\/p>","DOI":"10.1007\/3-540-46035-7_27"},{"key":"key-10.3934\/amc.2017010-37","doi-asserted-by":"crossref","unstructured":"<p>A. Shamir, Identity-based cryptosystems and signature schemes, in <i>Proc. Crypt. 1984<\/i>, Springer-Verlag, 1984, 47-53.<\/p>","DOI":"10.1007\/3-540-39568-7_5"},{"key":"key-10.3934\/amc.2017010-38"},{"key":"key-10.3934\/amc.2017010-39","doi-asserted-by":"publisher","DOI":"10.1631\/jzus.A0820714"},{"key":"key-10.3934\/amc.2017010-40","doi-asserted-by":"publisher","DOI":"10.1007\/s12204-011-1191-7"},{"key":"key-10.3934\/amc.2017010-41","doi-asserted-by":"crossref","unstructured":"<p>B. Waters, Efficient identity-based encryption without random oracles, in <i>Proc. Eurocrypt. 2005<\/i>, Springer-Verlag, 2005,114-127.<\/p>","DOI":"10.1007\/11426639_7"},{"key":"key-10.3934\/amc.2017010-42","doi-asserted-by":"crossref","unstructured":"<p>J. Weng, X. Li, K. F. Chen and S. L. Liu, Identity-based parallel key-insulated encryption without random oracles, in <i>Proc. Indocrypt. 2006<\/i>, Springer-Verlag, 2006,409-423.<\/p>","DOI":"10.1007\/11941378_29"},{"key":"key-10.3934\/amc.2017010-43","doi-asserted-by":"crossref","unstructured":"<p>J. Weng, S. L. Liu, K. F. Chen, D. Zheng and W. D. Qiu, Identity-based threshold keyinsulated encryption without random oracles, in <i>Proc. CT-RSA 2008<\/i>, Springer-Verlag, 2008,203-220.<\/p>","DOI":"10.1007\/978-3-540-79263-5_13"},{"key":"key-10.3934\/amc.2017010-44"},{"key":"key-10.3934\/amc.2017010-45","doi-asserted-by":"crossref","unstructured":"<p>D. Yao, N. Fazio, Y. Dodis and A. Lysyanskaya, ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption, in <i>Proc. ACM CCS 2004<\/i>, ACM, 2004,354-363.<\/p>","DOI":"10.1145\/1030083.1030130"},{"key":"key-10.3934\/amc.2017010-46","doi-asserted-by":"crossref","unstructured":"<p>J. Yu, R. Hao, H. Zhao, M. Shu and J. Fan, IRIBE: Intrusion-resilient identity-based encryption, <i>Inf. Sci.<\/i> , <b>329<\/b> (2016), 90-104.<\/p>","DOI":"10.1016\/j.ins.2015.09.020"},{"key":"key-10.3934\/amc.2017010-47"},{"key":"key-10.3934\/amc.2017010-48","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.08.034"},{"key":"key-10.3934\/amc.2017010-49","doi-asserted-by":"crossref","unstructured":"<p>J. Yu, F. Y. Kong, X. G. Cheng, R. Hao and G. W. Li, Construction of yet another forwardsecure signature scheme using bilinear maps, in <i>Proc. ProvSec 2008<\/i>, Springer-Verlag, 2008, 83-97.<\/p>","DOI":"10.1007\/978-3-540-88733-1_6"}],"container-title":["Advances in Mathematics of Communications"],"original-title":[],"link":[{"URL":"https:\/\/aimsciences.org\/download\/files\/1930-5346_2017_1_161.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T10:05:00Z","timestamp":1772791500000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.aimsciences.org\/\/article\/doi\/10.3934\/amc.2017010"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":49,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017]]}},"URL":"https:\/\/doi.org\/10.3934\/amc.2017010","relation":{},"ISSN":["1930-5346","1930-5338"],"issn-type":[{"value":"1930-5346","type":"print"},{"value":"1930-5338","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}