{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T09:34:43Z","timestamp":1758274483646,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540494966"},{"type":"electronic","value":"9783540494973"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11935308_29","type":"book-chapter","created":{"date-parts":[[2006,11,15]],"date-time":"2006-11-15T06:26:42Z","timestamp":1163572002000},"page":"410-419","source":"Crossref","is-referenced-by-count":2,"title":["Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper)"],"prefix":"10.1007","author":[{"given":"Kyung-Ah","family":"Shim","sequence":"first","affiliation":[]},{"given":"Seung-Hyun","family":"Seo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","first-page":"419","volume-title":"Proc. 30th Annual Symposium on the Theory of Computing","author":"M. Bellare","year":"1998","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: A modular approach to the design and analysis of authentication and key exchange protocols. In: Proc. 30th Annual Symposium on the Theory of Computing, pp. 419\u2013428. ACM, New York (1998)"},{"key":"29_CR2","first-page":"57","volume-title":"Proc. 27th Annual Sym. on the Theory of Computing","author":"M. Bellare","year":"1995","unstructured":"Bellare, M., Rogaway, P.: Provably secure session key distribution; the three party case. In: Proc. 27th Annual Sym. on the Theory of Computing, pp. 57\u201366. ACM, New York (1995)"},{"key":"29_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1007\/3-540-48329-2_21","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"M. Bellare","year":"1994","unstructured":"Bellare, M., Rogaway, P.: Entity autentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 232\u2013249. Springer, Heidelberg (1994)"},{"key":"29_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/3-540-49162-7_12","volume-title":"Public Key Cryptography","author":"S. Blake-Wilson","year":"1999","unstructured":"Blake-Wilson, S., Johnson, D., Menezes, A.: Unknown key-share attacks on the station-to-station (STS) protocol. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol.\u00a01560, pp. 154\u2013170. Springer, Heidelberg (1999)"},{"key":"29_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/3-540-48892-8_26","volume-title":"Selected Areas in Cryptography","author":"S. Blake-Wilson","year":"1999","unstructured":"Blake-Wilson, S., Menezes, A.: Authenticated Diffie-Hellman key agreement protocols. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol.\u00a01556, pp. 339\u2013361. Springer, Heidelberg (1999)"},{"key":"29_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"issue":"1","key":"29_CR7","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/j.amc.2003.12.092","volume":"162","author":"Y.J. Choie","year":"2005","unstructured":"Choie, Y.J., Jeong, E., Lee, E.: Efficient identity-based authenticated key agreement protocol from pairings. Applied Mathematics and Computation\u00a0162(1), 179\u2013188 (2005)","journal-title":"Applied Mathematics and Computation"},{"issue":"6","key":"29_CR8","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"29_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1007\/10722028_23","volume-title":"A one round protocol for tripartite Diffie-Hellman, ANTS IV","author":"A. Joux","year":"2000","unstructured":"Joux, A.: A one round protocol for tripartite Diffie-Hellman, ANTS IV. LNCS, vol.\u00a01838, pp. 385\u2013394. Springer, Heidelberg (2000)"},{"key":"29_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/978-3-540-45146-4_7","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"J. Katz","year":"2003","unstructured":"Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 110\u2013125. Springer, Heidelberg (2003)"},{"key":"29_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/11602897_28","volume-title":"Information and Communications Security","author":"K. Kim","year":"2005","unstructured":"Kim, K., Lee, H., Oh, H.: Enhanced ID-based authenticated key agreement protocols for a multiple independent PKG environment. In: Qing, S., Mao, W., L\u00f3pez, J., Wang, G. (eds.) ICICS 2005. LNCS, vol.\u00a03783, pp. 323\u2013335. Springer, Heidelberg (2005)"},{"key":"29_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"672","DOI":"10.1007\/978-3-540-24768-5_72","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2004","author":"K. Kim","year":"2004","unstructured":"Kim, K., Ryu, E., Yoo, K.: ID-based authenticated multiple-key agreement protocol from pairing. In: Lagan\u00e1, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol.\u00a03046, pp. 672\u2013680. Springer, Heidelberg (2004)"},{"key":"29_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1007\/978-3-540-30574-3_18","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"N. McCullagh","year":"2005","unstructured":"McCullagh, N., Barreto, P.S.L.M.: A new two-party identity-based authenticated key agreement. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol.\u00a03376, pp. 262\u2013274. Springer, Heidelberg (2005)"},{"key":"29_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"issue":"13","key":"29_CR15","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1049\/el:20020387","volume":"38","author":"N. Smart","year":"2002","unstructured":"Smart, N.: An ID-based authenticated key agreement protocol based on the Weil pairing. Elec. Lett.\u00a038(13), 630\u2013632 (2002)","journal-title":"Elec. Lett."},{"issue":"8","key":"29_CR16","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1049\/el:20030448","volume":"39","author":"K. Shim","year":"2003","unstructured":"Shim, K.: Efficient one round authenticated tripartite key agreement protocol from Weil pairing. Elec. Lett.\u00a039(8), 653\u2013654 (2003)","journal-title":"Elec. Lett."},{"key":"29_CR17","unstructured":"Sun, H., Hsieh, B.: Security analysis of Shim\u2019s authenticated key agreement protocols from pairings, Cryptogarphy ePrint Archive, Report 2003\/113 (2003), available at: \n                    \n                      http:\/\/eprint.iacr.org\/2003\/113\/"},{"key":"29_CR18","unstructured":"Xie, G.: An ID-based key agreement scheme from pairing, Cryptology ePrint Archive: Report 2005\/093 (2005), available at: \n                    \n                      http:\/\/eprint.iacr.org\/2005\/093"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11935308_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:09:44Z","timestamp":1566763784000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11935308_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540494966","9783540494973"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/11935308_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}