{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T15:44:52Z","timestamp":1725896692004},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642314476"},{"type":"electronic","value":"9783642314483"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31448-3_15","type":"book-chapter","created":{"date-parts":[[2012,7,4]],"date-time":"2012-07-04T22:03:32Z","timestamp":1341439412000},"page":"194-207","source":"Crossref","is-referenced-by-count":2,"title":["Effort-Release Public-Key Encryption from Cryptographic Puzzles"],"prefix":"10.1007","author":[{"given":"Jothi","family":"Rangasamy","sequence":"first","affiliation":[]},{"given":"Douglas","family":"Stebila","sequence":"additional","affiliation":[]},{"given":"Colin","family":"Boyd","sequence":"additional","affiliation":[]},{"given":"Juan Manuel","family":"Gonz\u00e1lez-Nieto","sequence":"additional","affiliation":[]},{"given":"Lakshmi","family":"Kuppusamy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Bellare, M., Goldwasser, S.: Encapsulated key escrow. Technical Report 688, MIT Laboratory for Computer Science (April 1996), \n \n http:\/\/cseweb.ucsd.edu\/~mihir\/papers\/escrow.html"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Bellare, M., Goldwasser, S.: Verifiable partial key escrow. In: Graveman, R., Janson, P.A., Neumann, C., Gong, L. (eds.) ACM CCS, pp. 78\u201391. ACM (1997)","DOI":"10.1145\/266420.266439"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/11761679_25","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"M. Bellare","year":"2006","unstructured":"Bellare, M., Rogaway, P.: The Security of Triple Encryption and a Framework\u00a0for\u00a0Code-Based\u00a0Game-Playing\u00a0Proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.\u00a04004, pp. 409\u2013426. Springer, Heidelberg (2006)"},{"key":"15_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-540-74835-9_21","volume-title":"Computer Security \u2013 ESORICS 2007","author":"K. Chalkias","year":"2007","unstructured":"Chalkias, K., Hristu-Varsakelis, D., Stephanides, G.: Improved Anonymous Timed-Release Encryption. In: Biskup, J., L\u00f3pez, J. (eds.) ESORICS 2007. LNCS, vol.\u00a04734, pp. 311\u2013326. Springer, Heidelberg (2007)"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/978-3-642-10366-7_30","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2009","author":"L. Chen","year":"2009","unstructured":"Chen, L., Morrissey, P., Smart, N.P., Warinschi, B.: Security Notions and Generic Constructions for Client Puzzles. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol.\u00a05912, pp. 505\u2013523. Springer, Heidelberg (2009)"},{"key":"15_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1330332.1330336","volume":"11","author":"J.H. Cheon","year":"2008","unstructured":"Cheon, J.H., Hopper, N., Kim, Y., Osipkov, I.: Provably secure timed-release public key encryption. ACM Trans. Inf. Syst. Secur.\u00a011, 4:1\u20134:44 (2008)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/978-3-540-88733-1_3","volume-title":"Provable Security","author":"S.S.M. Chow","year":"2008","unstructured":"Chow, S.S.M., Yiu, S.M.: Timed-Release Encryption Revisited. In: Baek, J., Bao, F., Chen, K., Lai, X. (eds.) ProvSec 2008. LNCS, vol.\u00a05324, pp. 38\u201351. Springer, Heidelberg (2008)"},{"issue":"1","key":"15_CR8","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1137\/S0097539702403773","volume":"33","author":"R. Cramer","year":"2003","unstructured":"Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing\u00a033(1), 167\u2013226 (2003)","journal-title":"SIAM Journal on Computing"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/3-540-48071-4_10","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"C. Dwork","year":"1993","unstructured":"Dwork, C., Naor, M.: Pricing via Processing or Combatting Junk Mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 139\u2013147. Springer, Heidelberg (1993)"},{"key":"15_CR10","unstructured":"Juels, A., Brainard, J.: Client puzzles: A cryptographic countermeasure against connection depletion attacks. In: Proc. Network and Distributed System Security Symposium (NDSS) 1999, pp. 151\u2013165. Internet Society (1999)"},{"key":"15_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/3-540-45353-9_13","volume-title":"Topics in Cryptology - CT-RSA 2001","author":"T. Okamoto","year":"2001","unstructured":"Okamoto, T., Pointcheval, D.: REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol.\u00a02020, pp. 159\u2013175. Springer, Heidelberg (2001)"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Rangasamy, J., Stebila, D., Boyd, C., Gonzalez Nieto, J.: An integrated approach to cryptographic mitigation of denial-of-service attacks. In: Sandhu, R., Wong, D.S. (eds.) Proc. 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2011, pp. 114\u2013123. ACM (2011), \n \n http:\/\/eprints.qut.edu.au\/41285\/","DOI":"10.1145\/1966913.1966929"},{"key":"15_CR13","series-title":"LNCS","volume-title":"Proc. International Conference on Information Security and Cryptology (ICISC 2011)","author":"J. Rangasamy","year":"2011","unstructured":"Rangasamy, J., Stebila, D., Boyd, C., Gonzalez Nieto, J., Kuppusamy, L.: Efficient modular exponentiation-based puzzles for denial-of-service protection. In: Proc. International Conference on Information Security and Cryptology (ICISC 2011). LNCS, Springer, Heidelberg (2011) (to appear), \n \n http:\/\/eprints.qut.edu.au\/47894\/"},{"key":"15_CR14","unstructured":"Rivest, R.L., Shamir, A., Wagner, D.A.: Time-lock puzzles and timed-release crypto. Technical Report TR-684, MIT Laboratory for Computer Science (March 1996), \n \n http:\/\/people.csail.mit.edu\/rivest\/RivestShamirWagner-timelock.pdf"},{"key":"15_CR15","unstructured":"Shoup, V.: A proposal for an ISO standard for public key encryption (version 2.1). manuscript (2001), \n \n http:\/\/shoup.net\/papers"},{"key":"15_CR16","unstructured":"Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. Technical report (2004), \n \n http:\/\/eprint.iacr.org\/2004\/332"},{"key":"15_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1007\/978-3-642-19074-2_19","volume-title":"Topics in Cryptology \u2013 CT-RSA 2011","author":"D. Stebila","year":"2011","unstructured":"Stebila, D., Kuppusamy, L., Rangasamy, J., Boyd, C., Gonzalez Nieto, J.: Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol.\u00a06558, pp. 284\u2013301. Springer, Heidelberg (2011), \n \n http:\/\/eprints.qut.edu.au\/40036\/"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31448-3_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:01:05Z","timestamp":1620129665000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31448-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642314476","9783642314483"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31448-3_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}