{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T23:16:14Z","timestamp":1648509374440},"reference-count":17,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2009]]},"DOI":"10.1587\/transfun.e92.a.42","type":"journal-article","created":{"date-parts":[[2009,3,19]],"date-time":"2009-03-19T06:02:26Z","timestamp":1237442546000},"page":"42-52","source":"Crossref","is-referenced-by-count":0,"title":["Tag-KEM from Set Partial Domain One-Way Permutations"],"prefix":"10.1587","volume":"E92-A","author":[{"given":"Masayuki","family":"ABE","sequence":"first","affiliation":[{"name":"NTT Information Sharing Platform Laboratories, NTT Corporation"}]},{"given":"Yang","family":"CUI","sequence":"additional","affiliation":[{"name":"Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science & Technology (AIST)"},{"name":"Chuo University"}]},{"given":"Hideki","family":"IMAI","sequence":"additional","affiliation":[{"name":"Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science & Technology (AIST)"},{"name":"Chuo University"}]},{"given":"Kaoru","family":"KUROSAWA","sequence":"additional","affiliation":[{"name":"Ibaraki University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] M. Abe, R. Gennaro, K. Kurosawa, and V. Shoup, “Tag-KEM\/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-desmedt KEM, ” Proc. Eurocrypt'05, LNCS 3494, pp.128-146, Springer-Verlag, 2005.","DOI":"10.1007\/11426639_8"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] M. Abe, R. Gennaro, and K. Kurosawa, “Tag-KEM\/DEM: A new framework for hybrid encryption, ” J. Cryptol., vol.21, no.1, pp.52-96, Jan. 2008.","DOI":"10.1007\/s00145-007-9010-x"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] M. Bellare and P. Rogaway, “Random oracles are practical: A paradigm for designing efficient protocols, ” Proc. ACM Conference on Computer and Communication Security 1993, pp.62-73, ACM Press, 1993.","DOI":"10.1145\/168588.168596"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] M. Bellare and P. Rogaway, “Optimal asymmetric encryption — How to encrypt with RSA, ” Proc. Eurocrypt'94, LNCS 950, pp.92-111, Springer-Verlag, 1995.","DOI":"10.1007\/BFb0053428"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] D. Boneh, “Simplified OAEP for the RSA and Rabin functions, ” Proc. CRYPTO'01, LNCS 2139, pp.275-291, Springer-Verlag, 2001.","DOI":"10.1007\/3-540-44647-8_17"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] D. Coppersmith, “Small solutions to polynomial equations, and low exponent RSA vulnerabilities, ” J. Cryptol., vol.10, no.4, pp.233-260, 1997.","DOI":"10.1007\/s001459900030"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] J. Coron, H. Handschuh, M. Joye, P. Paillier, D. Pointcheval, and C. Tymen, “GEM: A generic chosen-ciphertext secure encryption method, ” Proc. CT-RSA'02, LNCS 2271, pp.263-276, Springer-Verlag, 2002.","DOI":"10.1007\/3-540-45760-7_18"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539702403773"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] E. Fujisaki and T. Okamoto, “Secure integration of asymmetric and symmetric encryption schemes, ” Proc. CRYPTO'99, LNCS 1666, pp.537-554, Springer-Verlag, 1999.","DOI":"10.1007\/3-540-48405-1_34"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] E. Fujisaki, T. Okamoto, D. Pointcheval, and J. Stern, “RSA-OAEP is secure under the RSA assumption, ” J. Cryptol., vol.17, no.2, pp.81-104, 2004.","DOI":"10.1007\/s00145-002-0204-y"},{"key":"11","unstructured":"[11] R. Gennaro and V. Shoup, “A note on an encryption scheme of Kurosawa and Desmedt, ” Technical Report 2004\/194, IACR ePrint archive, 2004."},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] K. Kurosawa and Y. Desmedt, “A new paradigm of hybrid encryption scheme, ” CRYPTO'04, LNCS 3152, pp.426-442, Springer-Verlag, 2004.","DOI":"10.1007\/978-3-540-28628-8_26"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] K. Kurosawa, T. Itoh, and M. Takeuchi, “Public key cryptosystem using a reciprocal number with the same intractability as factoring a large number, ” Proc. CRYPTOLOGIA, XII, pp.225-233, 1988.","DOI":"10.1080\/0161-118891862972"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] K. Kurosawa, W. Ogata, T. Matsuo, and S. Makishima, “IND-CCA public key schemes equivalent to factoring n=pq, ” Proc. PKC'01, LNCS 1992, pp.36-47, Springer-Verlag, 2001.","DOI":"10.1007\/3-540-44586-2_3"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] C. Rackoff and D. Simon, “Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack, ” Proc. CRYPTO'91, LNCS 576, pp.433-444, Springer-Verlag, 1992.","DOI":"10.1007\/3-540-46766-1_35"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] V. Shoup, “OAEP reconsidered, ” Proc. CRYPTO'01, LNCS 2139, pp.239-259, Springer-Verlag, 2001.","DOI":"10.1007\/3-540-44647-8_15"},{"key":"17","unstructured":"[17] V. Shoup, ISO 18033-2: An emerging standard for public-key encryption, (committee draft). Available at http:\/\/shoup.net\/iso\/,June2004."}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.jstage.jst.go.jp\/article\/transfun\/E92.A\/1\/E92.A_1_42\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T05:32:50Z","timestamp":1619415170000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.jstage.jst.go.jp\/article\/transfun\/E92.A\/1\/E92.A_1_42\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"references-count":17,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.e92.a.42","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"value":"0916-8508","type":"print"},{"value":"1745-1337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}