{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T17:08:38Z","timestamp":1760202518516},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540306849"},{"type":"electronic","value":"9783540322672"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11593447_30","type":"book-chapter","created":{"date-parts":[[2005,11,15]],"date-time":"2005-11-15T01:37:16Z","timestamp":1132018636000},"page":"549-565","source":"Crossref","is-referenced-by-count":60,"title":["Modular Security Proofs for Key Agreement Protocols"],"prefix":"10.1007","author":[{"given":"Caroline","family":"Kudla","sequence":"first","affiliation":[]},{"given":"Kenneth G.","family":"Paterson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-540-30580-4_5","volume-title":"Public Key Cryptography - PKC 2005","author":"M. Abdalla","year":"2005","unstructured":"Abdalla, M., Chevassut, O., Pointcheval, D.: One-time verifier-based encrypted key exchange. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol.\u00a03386, pp. 47\u201364. Springer, Heidelberg (2005)"},{"key":"30_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/978-3-540-40974-8_27","volume-title":"Cryptography and Coding","author":"S.S. Al-Riyami","year":"2003","unstructured":"Al-Riyami, S.S., Paterson, K.G.: Authenticated three party key agreement protocols from pairings. In: Paterson, K.G. (ed.) Cryptography and Coding 2003. LNCS, vol.\u00a02898, pp. 332\u2013359. Springer, Heidelberg (2003)"},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"Barreto, P.S.L.M., McCullagh, N.: A new two-party identity-based authenticated key agreement. Cryptology ePrint Archive, Report 2004\/122 (2005), http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-540-30574-3_18"},{"key":"30_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1007\/978-3-540-30574-3_18","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"P.S.L.M. Barreto","year":"2005","unstructured":"Barreto, P.S.L.M., McCullagh, N.: A new two-party identity-based authenticated key agreement. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol.\u00a03376, pp. 262\u2013274. Springer, Heidelberg (2005)"},{"key":"30_CR5","first-page":"419","volume-title":"Proceedings of the 30th Annual Symposium on the Theory of Computing","author":"M. Bellare","year":"1998","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: A modular approach to the design and analysis of authentication and key exchange protocols. In: Proceedings of the 30th Annual Symposium on the Theory of Computing, pp. 419\u2013428. ACM, New York (1998)"},{"key":"30_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-45539-6_11","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 139\u2013155. Springer, Heidelberg (2000)"},{"key":"30_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1007\/3-540-48329-2_21","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"M. Bellare","year":"1994","unstructured":"Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 232\u2013249. Springer, Heidelberg (1994)"},{"key":"30_CR8","first-page":"57","volume-title":"Proceedings of the 27th Annual ACM Symposium on Theory of Computing STOC","author":"M. Bellare","year":"1995","unstructured":"Bellare, M., Rogaway, P.: Provably secure session key distribution: The three party case. In: Proceedings of the 27th Annual ACM Symposium on Theory of Computing STOC, pp. 57\u201366. ACM, New York (1995)"},{"key":"30_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1007\/BFb0024447","volume-title":"Cryptography and Coding","author":"S. Blake-Wilson","year":"1997","unstructured":"Blake-Wilson, S., Johnson, D., Menezes, A.: Key agreement protocols and their security analysis. In: Darnell, M.J. (ed.) Cryptography and Coding 1997. LNCS, vol.\u00a01355, pp. 30\u201345. Springer, Heidelberg (1997)"},{"key":"30_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/11554868_9","volume-title":"Progress in Cryptology \u2013 Mycrypt 2005","author":"C. Boyd","year":"2005","unstructured":"Boyd, C., Choo, K.-K.R., Hitchcock, Y.: On session key construction in provably-secure key establishment protocols. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol.\u00a03715, pp. 116\u2013131. Springer, Heidelberg (2005), http:\/\/eprint.iacr.org\/2005\/206"},{"key":"30_CR11","series-title":"Lecture Notes in Computer Science","first-page":"388","volume-title":"Applied Cryptography and Network Security","author":"C. Boyd","year":"2004","unstructured":"Boyd, C., Mao, W., Paterson, K.: Key agreement using statically keyed authenticators. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol.\u00a03089, pp. 388\u2013401. Springer, Heidelberg (2004)"},{"key":"30_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/978-3-540-30556-9_1","volume-title":"Progress in Cryptology - INDOCRYPT 2004","author":"C. Boyd","year":"2004","unstructured":"Boyd, C., Gonz\u00e1lez Nieto, J.M., Hitchcock, Y.: Tripartite key exchange in the Canetti-Krawczyk proof model. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol.\u00a03348, pp. 388\u2013401. Springer, Heidelberg (2004)"},{"key":"30_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/978-3-540-24582-7_29","volume-title":"Progress in Cryptology - INDOCRYPT 2003","author":"C. Boyd","year":"2003","unstructured":"Boyd, C., Gonz\u00e1lez Nieto, J.M., Hitchcock, Y., Montague, P., Tin, Y.S.T.: A password-based authenticator: Security proof and applications. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol.\u00a02904, pp. 388\u2013401. Springer, Heidelberg (2003)"},{"key":"30_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/3-540-45067-X_15","volume-title":"Information Security and Privacy","author":"C. Boyd","year":"2003","unstructured":"Boyd, C., Gonz\u00e1lez Nieto, J.M., Tin, Y.S.T.: Provably secure mobile key exchange: Applying the Canetti-Krawczyk approach. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol.\u00a02727, pp. 166\u2013179. Springer, Heidelberg (2003)"},{"key":"30_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/3-540-44987-6_28","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"R. Canetti","year":"2001","unstructured":"Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 453\u2013474. Springer, Heidelberg (2001)"},{"key":"30_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/3-540-46035-7_22","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"R. Canetti","year":"2002","unstructured":"Canetti, R., Krawczyk, H.: Universally composable notions of key exchange and secure channels. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 337\u2013351. Springer, Heidelberg (2002)"},{"key":"30_CR17","unstructured":"Chen, L., Kudla, C.: Identity based authenticated key agreement from pairings. Cryptology ePrint Archive, Report 2002\/184 (2002), http:\/\/eprint.iacr.org\/"},{"key":"30_CR18","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/CSFW.2003.1212715","volume-title":"IEEE Computer Security Foundations Workshop \u2013 CSFW-16 2003","author":"L. Chen","year":"2003","unstructured":"Chen, L., Kudla, C.: Identity based authenticated key agreement from pairings. In: IEEE Computer Security Foundations Workshop \u2013 CSFW-16 2003, pp. 219\u2013233. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"30_CR19","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/BF00124891","volume":"2","author":"W. Diffie","year":"1992","unstructured":"Diffie, W., van Oorschot, P.C., Weiner, M.J.: Authentication and authenticated key exchange. Designs, Codes and Cryptography\u00a02, 107\u2013125 (1992)","journal-title":"Designs, Codes and Cryptography"},{"key":"30_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/3-540-46088-8_17","volume-title":"Financial Cryptography","author":"M. Jakobsson","year":"2002","unstructured":"Jakobsson, M., Pointcheval, D.: Mutual authentication and key exchange protocol for low power devices. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol.\u00a02339, pp. 178\u2013195. Springer, Heidelberg (2002)"},{"key":"30_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/978-3-540-24852-1_16","volume-title":"Applied Cryptography and Network Security","author":"I.R. Jeong","year":"2004","unstructured":"Jeong, I.R., Katz, J., Lee, D.H.: One-round protocols for two-party authenticated key exchange. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol.\u00a03089, pp. 220\u2013232. Springer, Heidelberg (2004)"},{"key":"30_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/978-3-540-45146-4_7","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"J. Katz","year":"2003","unstructured":"Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 110\u2013125. Springer, Heidelberg (2003)"},{"issue":"2","key":"30_CR23","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1023\/A:1022595222606","volume":"28","author":"L. Law","year":"2003","unstructured":"Law, L., Menezes, A., Qu, M., Solinas, J., Vanstone, S.A.: An efficient protocol for authenticated key agreement. Designs, Codes and Cryptography\u00a028(2), 119\u2013134 (2003)","journal-title":"Designs, Codes and Cryptography"},{"issue":"2","key":"30_CR24","first-page":"99","volume":"E69","author":"T. Matsumoto","year":"1986","unstructured":"Matsumoto, T., Takashima, Y., Imai, H.: On seeking smart public-key-distribution systems. Electronics Letters\u00a0E69(2), 99\u2013106 (1986)","journal-title":"Electronics Letters"},{"key":"30_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-44586-2_8","volume-title":"Public Key Cryptography","author":"T. Okamoto","year":"2001","unstructured":"Okamoto, T., Pointcheval, D.: The gap-problems: A new class of problems for the security of cryptographic schemes. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol.\u00a01992, pp. 104\u2013118. Springer, Heidelberg (2001)"},{"key":"30_CR26","unstructured":"Shoup, V.: On formal models for secure key exchange. IBM Technical Report RZ 3120 (1999), http:\/\/shoup.net\/papers"},{"issue":"13","key":"30_CR27","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1049\/el:20020387","volume":"38","author":"N.P. Smart","year":"2002","unstructured":"Smart, N.P.: An identity based authenticated key agreement protocol based on the Weil pairing. Electronics Letters\u00a038(13), 630\u2013632 (2002)","journal-title":"Electronics Letters"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - ASIACRYPT 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11593447_30.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T15:02:43Z","timestamp":1605625363000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11593447_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540306849","9783540322672"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/11593447_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}