{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:58:22Z","timestamp":1725551902969},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540309000"},{"type":"electronic","value":"9783540322931"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11600930_50","type":"book-chapter","created":{"date-parts":[[2005,11,24]],"date-time":"2005-11-24T14:48:12Z","timestamp":1132843692000},"page":"500-509","source":"Crossref","is-referenced-by-count":6,"title":["An Efficient Identity-Based Key Exchange Protocol with KGS Forward Secrecy for Low-Power Devices"],"prefix":"10.1007","author":[{"given":"Robert W.","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Guomin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Duncan S.","family":"Wong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"50_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/3-540-45708-9_23","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"P. Barreto","year":"2002","unstructured":"Barreto, P., Kim, H., Lynn, B., Scott, M.: Efficient algorithms for pairing-based cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 354\u2013368. Springer, Heidelberg (2002)"},{"key":"50_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-540-24654-1_2","volume-title":"Selected Areas in Cryptography","author":"P. Barreto","year":"2004","unstructured":"Barreto, P., Lynn, B., Scott, M.: On the selection of pairing-friendly groups. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol.\u00a03006, pp. 17\u201325. Springer, Heidelberg (2004)"},{"key":"50_CR3","first-page":"419","volume-title":"Proc. 30th ACM Symp. on Theory of Computing","author":"M. Bellare","year":"1998","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: A modular approach to the design and analysis of authentication and key exchange protocols. In: Proc. 30th ACM Symp. on Theory of Computing, pp. 419\u2013428. ACM, New York (1998)"},{"key":"50_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/978-3-540-24676-3_17","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"M. Bellare","year":"2004","unstructured":"Bellare, M., Namprempre, C., Neven, G.: Security proofs for identity-based identification and signature schemes. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 268\u2013286. Springer, Heidelberg (2004), http:\/\/www-cse.ucsd.edu\/users\/mihir"},{"key":"50_CR5","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/168588.168596","volume-title":"First ACM Conference on Computer and Communications Security","author":"M. Bellare","year":"1993","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: First ACM Conference on Computer and Communications Security, Fairfax, pp. 62\u201373. ACM, New York (1993)"},{"key":"50_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"50_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 514\u2013532. Springer, Heidelberg (2001)"},{"key":"50_CR8","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-09527-0","volume-title":"Protocols for Authentication and Key Establishment","author":"C. Boyd","year":"2003","unstructured":"Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Springer, Heidelberg (2003)"},{"key":"50_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1007\/3-540-48658-5_29","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"M. Burmester","year":"1994","unstructured":"Burmester, M.: On the risk of opening distributed keys. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 308\u2013317. Springer, Heidelberg (1994)"},{"key":"50_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/3-540-44987-6_28","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"R. Canetti","year":"2001","unstructured":"Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 453\u2013474. Springer, Heidelberg (2001), http:\/\/eprint.iacr.org\/2001\/040\/"},{"key":"50_CR11","unstructured":"Chen, L., Kudla, C.: Identity based authenticated key agreement protocols from pairings. Cryptology ePrint Archive, Report 2002\/184 (2002), http:\/\/eprint.iacr.org\/"},{"key":"50_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"490","DOI":"10.1007\/3-540-46416-6_42","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"M. Girault","year":"1991","unstructured":"Girault, M.: Self-certified public keys. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 490\u2013497. Springer, Heidelberg (1991)"},{"key":"50_CR13","unstructured":"Girault, M., Paill\u00e8s, J.-C.: An identity-based scheme providing zero-knowledge authentication and authenticated key exchange. In: European Symposium on Research in Computer Security, October 1990, pp. 173\u2013184. AFCET (1990)"},{"key":"50_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/3-540-46885-4_5","volume-title":"Advances in Cryptology - EUROCRYPT \u201989","author":"C. G\u00fcnther","year":"1990","unstructured":"G\u00fcnther, C.: An identity-based key exchange protocol. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol.\u00a0434, pp. 29\u201337. Springer, Heidelberg (1990)"},{"key":"50_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1007\/978-3-540-30574-3_18","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"N. McCullagh","year":"2005","unstructured":"McCullagh, N., Barreto, P.: A new two-party identity-based authenticated key agreement. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol.\u00a03376, pp. 262\u2013274. Springer, Heidelberg (2005)"},{"key":"50_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1007\/3-540-48184-2_15","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"E. Okamoto","year":"1988","unstructured":"Okamoto, E.: Key distribution systems based on identification information. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.\u00a0293, pp. 194\u2013202. Springer, Heidelberg (1988)"},{"issue":"13","key":"50_CR17","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1049\/el:20020387","volume":"38","author":"N. Smart","year":"2002","unstructured":"Smart, N.: Identity-based authenticated key agreement protocol based on Weil pairing. IEE Electronics Letters\u00a038(13), 630\u2013632 (2002)","journal-title":"IEE Electronics Letters"},{"issue":"2","key":"50_CR18","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1049\/el:20030168","volume":"39","author":"X. Yi","year":"2003","unstructured":"Yi, X.: Efficient ID-based key agreement from Weil pairing. IEE Electronics Letters\u00a039(2), 206\u2013208 (2003)","journal-title":"IEE Electronics Letters"},{"key":"50_CR19","doi-asserted-by":"crossref","unstructured":"Zhu, R., Yang, G., Wong, D.: An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices, full paper (2005), http:\/\/www.cs.cityu.edu.hk\/~duncan\/papers\/05zhuetal_idke.pdf","DOI":"10.1007\/11600930_50"}],"container-title":["Lecture Notes in Computer Science","Internet and Network Economics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11600930_50.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,5]],"date-time":"2023-05-05T16:22:40Z","timestamp":1683303760000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11600930_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540309000","9783540322931"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11600930_50","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}