{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:15:30Z","timestamp":1729667730655,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/eidwt.2013.76","type":"proceedings-article","created":{"date-parts":[[2013,10,21]],"date-time":"2013-10-21T22:10:57Z","timestamp":1382393457000},"page":"407-413","source":"Crossref","is-referenced-by-count":2,"title":["Efficient Chosen Ciphertext Secure Threshold Public-Key Encryption with Forward Security"],"prefix":"10.1109","author":[{"given":"Xiujie","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Chunxiang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Wenzheng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"441","article-title":"Forward-secure threshold signature schemes","volume":"2020","author":"abdalla","year":"2001","journal-title":"CTRSA 2001 LNCS"},{"key":"17","first-page":"1","article-title":"Securing Threshold Cryptosystems against Chosen Ciphertext Attack","volume":"1403","author":"shoup","year":"1998","journal-title":"EUROCRYPT 1998 LNCS"},{"key":"18","first-page":"226","article-title":"Chosen ciphertext secure public key threshold encryption without random oracles","volume":"3860","author":"boneh","year":"2006","journal-title":"CT-RSA 2006 LNCS"},{"key":"15","first-page":"1","article-title":"Adaptively secure forward-secure noninteractive threshold cryptosystems","author":"libert","year":"0","journal-title":"Information Security and Cryptology Lecture Notes in Computer Science 2012 LNCS"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_35"},{"key":"13","first-page":"619","article-title":"Dual system encryption: Realizing fully secure ibe and hibe under simple assumpitons","author":"waters","year":"2009","journal-title":"Crypto"},{"key":"14","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/3-540-39200-9_16","article-title":"A forward-secure public-key encryption scheme","volume":"2656","author":"canetti","year":"2003","journal-title":"EUROCRYPT 2003 LNCS"},{"key":"11","first-page":"325","article-title":"Evaluating 2-dnf formulas on ciphertexts","author":"boneh","year":"2005","journal-title":"TCC"},{"key":"12","first-page":"455","article-title":"New techniques for dual system encryption and fully secure hibe with short ciphertexts","author":"lewko","year":"2010","journal-title":"TCC"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2010.032216"},{"key":"20","first-page":"537","article-title":"Secure integration of asymmetric and symmetric encryption schemes","author":"fujisaki","year":"1999","journal-title":"Advances in Cryptology-CRYPTO 1999 1666 of LNCS"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_7"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_28"},{"key":"10","first-page":"400","article-title":"Efficient generic forward-secure signatures with an unbounded number of time periods","author":"maklin","year":"2002","journal-title":"Advances in Cryptology-Eurocrypt 2002"},{"key":"7","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1145\/352600.352617","article-title":"Simple forward-secure signatures from any signature scheme","author":"krawczyk","year":"2000","journal-title":"CCS'00 Proceeding of the 7th ACM Conference on Computer and Communications Security"},{"key":"6","first-page":"116","article-title":"A new forward-secure digital signature scheme","author":"abdalla","year":"2000","journal-title":"ASIACRYPT'00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security"},{"key":"5","first-page":"431","article-title":"A forward-secure digital signature scheme","author":"bellare","year":"1999","journal-title":"Crypto"},{"key":"4","article-title":"Two remarks on public key cryptology","author":"anderson","year":"1997","journal-title":"Proc of CCS'97 ACM"},{"key":"9","first-page":"247","article-title":"Forward-secure signatures with fast key update","author":"kozlov","year":"2002","journal-title":"Proc Third International Confernce on Security in Communication Networks"},{"key":"8","first-page":"499","article-title":"Forward-secure signatures with optimal signing and verifying, Advance in Cryptology-CRYPTO","volume":"2001","author":"itkis","year":"2011","journal-title":"LNCS 2139"}],"event":{"name":"2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT)","start":{"date-parts":[[2013,9,9]]},"location":"Xi'an, Shaanxi, China","end":{"date-parts":[[2013,9,11]]}},"container-title":["2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6630243\/6631552\/06631654.pdf?arnumber=6631654","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T00:19:11Z","timestamp":1498090751000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6631654\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/eidwt.2013.76","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}