{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T17:40:33Z","timestamp":1773078033899,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540006220","type":"print"},{"value":"9783540364924","type":"electronic"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36492-7_21","type":"book-chapter","created":{"date-parts":[[2007,10,23]],"date-time":"2007-10-23T23:36:10Z","timestamp":1193182570000},"page":"325-338","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["The Group Diffie-Hellman Problems"],"prefix":"10.1007","author":[{"given":"Emmanuel","family":"Bresson","sequence":"first","affiliation":[]},{"given":"Olivier","family":"Chevassut","sequence":"additional","affiliation":[]},{"given":"David","family":"Pointcheval","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"issue":"2","key":"21_CR1","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/S0020-0190(99)00047-2","volume":"70","author":"E. Biham","year":"1999","unstructured":"E. Biham, D. Boneh, and O. Reingold. Breaking generalized Diffie-Hellman modulo a composite is no easier than factoring. In Information Processing Letters (IPL), volume 70(2), pages 83\u201387. Elsevier Science, April 1999.","journal-title":"Information Processing Letters (IPL)"},{"key":"21_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1007\/BFb0024447","volume-title":"Key agreement protocols and their security analysis","author":"S. Blake-Wilson","year":"1997","unstructured":"S. Blake-Wilson, D. Johnson, and A. Menezes. Key agreement protocols and their security analysis. In M. Darnell, editor, Proc. of 6th IMA International Conference on Crypotography and Coding, volume 1355 of LNCS, pages 30\u201345. Springer-Verlag, 1997."},{"key":"21_CR3","series-title":"Lect Notes Comput Sci","first-page":"339","volume-title":"Authenticated Diffie-Hellman key agreement protocols","author":"S. Blake-Wilson","year":"1998","unstructured":"S. Blake-Wilson and A. Menezes. Authenticated Diffie-Hellman key agreement protocols. In H. Meijer and S. Tavares, editors, Proc. of Selected Areas in Cryptography SAC\u2019 98, volume 1556 of LNCS, pages 339\u2013361. Springer-Verlag, August 1998."},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In Proc. of ACM CCS\u2019 93, pages 62\u201373. ACM Press, November 1993.","DOI":"10.1145\/168588.168596"},{"key":"21_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1007\/BFb0054851","volume-title":"The decision Diffie-Hellman problem","author":"D. Boneh","year":"1998","unstructured":"D. Boneh. The decision Diffie-Hellman problem. In J. P. Buhler, editor, Proc. of the 3 rdANTS Symposium, volume 1423 of LNCS, pages 48\u201363, Portland, OR, USA, June 1998. Springer-Verlag."},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"E. Bresson, O. Chevassut, D. Pointcheval, and J.-J. Quisquater. Provably authenticated group Diffie-Hellman key exchange. In P. Samarati, editor, Proc. of ACM CCS\u2019 01, pages 255\u2013264. ACM Press, November 2001.","DOI":"10.1145\/501983.502018"},{"key":"21_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1007\/3-540-45682-1_18","volume-title":"Provably authenticated group Diffie-Hellman key exchange-the dynamic case","author":"E. Bresson","year":"2001","unstructured":"E. Bresson, O. Chevassut, and D. Pointcheval. Provably authenticated group Diffie-Hellman key exchange-the dynamic case. In C. Boyd, editor, Proc. of Asiacrypt\u2019 01, volume 2248 of LNCS, pages 290\u2013309. Springer-Verlag, December 2001. Full Version available at http:\/\/www.di.ens.fr\/users\/pointche ."},{"key":"21_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1007\/3-540-46035-7_21","volume-title":"Dynamic group Diffie-Hellman key exchange under standard assumptions","author":"E. Bresson","year":"2002","unstructured":"E. Bresson, O. Chevassut, and D. Pointcheval. Dynamic group Diffie-Hellman key exchange under standard assumptions. In L. R. Knudsen, editor, Proc. of Eurocrypt\u2019 02, volume 2332 of LNCS, pages 321\u2013336. Springer-Verlag, May 2002. Full Version available at http:\/\/www.di.ens.fr\/users\/pointche ."},{"key":"21_CR9","first-page":"497","volume-title":"Lecture Notes in Computer Science","author":"Emmanuel Bresson","year":"2002","unstructured":"E. Bresson, O. Chevassut, and D. Pointcheval. Group diffie-hellman key exchange secure against dictionary attacks. In Y. Zheng, editor, Proc. of Asiacrypt\u2019 2002. Springer, December 2002. Full Version available at http:\/\/www.di.ens.fr\/users\/pointche ."},{"key":"21_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/BFb0055717","volume-title":"A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack","author":"R. Cramer","year":"1998","unstructured":"R. Cramer and V. Shoup. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In H. Krawczyk, editor, Proc. of Crypto\u2019 98, volume 1462 of LNCS, pages 13\u201325. Springer-Verlag, August 1998."},{"issue":"6","key":"21_CR11","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. E. Hellman. New directions in cryptography. Transactions on Information Theory, IT-22(6):644\u2013654, November 1976.","journal-title":"Transactions on Information Theory"},{"key":"21_CR12","series-title":"Lect Notes Comput Sci","first-page":"10","volume-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","author":"T. ElGamal","year":"1984","unstructured":"T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. In Proc. of Crypto\u2019 84, LNCS 196, pp. 10\u201318."},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"M. Naor and O. Reingold. Number-theoretic constructions of efficient pseudorandom functions. In Proc. of FOCS\u2019 97, pages 458\u2013467. IEEE Computer Society Press, October 1997.","DOI":"10.1109\/SFCS.1997.646134"},{"issue":"2","key":"21_CR14","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. L. Rivest","year":"1978","unstructured":"R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120\u2013126, February 1978.","journal-title":"Communications of the ACM"},{"key":"21_CR15","unstructured":"V. Shoup. On formal models for secure key exchange. Technical Report RZ 3120, IBM Z\u00fcrich Research Lab, November 1999."},{"key":"21_CR16","unstructured":"M. Steiner, B. Pfitzmann, and M. Waidner. A formal model for multi-party group key agreement. PhD Thesis RZ 3383, IBM Research, April 2002."},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"M. Steiner, G. Tsudik, and M. Waidner. Diffie-Hellman key distribution extended to group communication. In Proc. of ACM CCS\u2019 96, pages 31\u201337. ACM Press, March 1996.","DOI":"10.1145\/238168.238182"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36492-7_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T21:09:40Z","timestamp":1737493780000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36492-7_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540006220","9783540364924"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-36492-7_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"17 February 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}