{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:48:13Z","timestamp":1775746093523,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540435532","type":"print"},{"value":"9783540460350","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-46035-7_22","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T12:21:56Z","timestamp":1186834916000},"page":"337-351","source":"Crossref","is-referenced-by-count":532,"title":["Universally Composable Notions of Key Exchange and Secure Channels"],"prefix":"10.1007","author":[{"given":"Ran","family":"Canetti","sequence":"first","affiliation":[]},{"given":"Hugo","family":"Krawczyk","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,4,29]]},"reference":[{"key":"22_CR1","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/BF00196771","volume":"4","author":"D. Beaver","year":"1991","unstructured":"D. Beaver, \u201cSecure Multi-party Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority\u201d, J. Cryptology (1991) 4: 75\u2013122.","journal-title":"J. Cryptology"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"M. Bellare, R. Canetti and H. Krawczyk, \u201cA modular approach to the design and analysis of authentication and key-exchange protocols\u201d, 30th STOC, 1998.","DOI":"10.1145\/276698.276854"},{"key":"22_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1007\/3-540-48329-2_21","volume-title":"Advances in Cryptology,-CRYPTO\u201993","author":"M. Bellare","year":"1994","unstructured":"M. Bellare and P. Rogaway, \u201cEntity authentication and key distribution\u201d, Advances in Cryptology,-CRYPTO\u201993, Lecture Notes in Computer Science Vol. 773, D. Stinson ed, Springer-Verlag, 1994, pp. 232\u2013249."},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway, \u201cProvably secure session key distribution-the three party case,\u201d Annual Symposium on the Theory of Computing (STOC), 1995.","DOI":"10.1145\/225058.225084"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"[B91]_R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva and M. Yung, \u201cSystematic design of two-party authentication protocols,\u201d IEEE Journal on Selected Areas in Communications (special issue on Secure Communications), 11(5):679\u2013693, June 1993. (Preliminary version: Crypto\u201991.)","DOI":"10.1109\/49.223869"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"S. Blake-Wilson, D. Johnson and A. Menezes, \u201cKey exchange protocols and their security analysis,\u201d Proceedings of the sixth IMA International Conference on Cryptography and Coding, 1997.","DOI":"10.1007\/BFb0024447"},{"key":"22_CR7","unstructured":"R. Canetti, \u201cSecurity and Composition of Multiparty Cryptographic Protocols\u201d, Journal of Cryptology, Winter 2000. On-line version at http:\/\/philby.ucsd.edu\/cryptolib\/1998\/98-18.html ."},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"R. Canetti, \u201cUniversally Composable Security: A New paradigm for Cryptographic Protocols\u201d, 42nd FOCS, 2001. Full version available at http:\/\/eprint.iacr.org\/2000\/067 .","DOI":"10.1109\/SFCS.2001.959888"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"R. Canetti and H. Krawczyk, \u201cAnalysis of Key-Exchange Protocols and Their Use for Building Secure Channels\u201d, Eurocrypt 01, 2001. Full version at http:\/\/eprint.iacr.org\/2001 .","DOI":"10.1007\/3-540-44987-6_28"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"R. Canetti and H. Krawczyk, \u201cUniversally Composable Notions of Key Exchange and Secure Channels\u201d, IACR\u2019s Eprint archive, http:\/\/eprint.iacr.org\/2002 .","DOI":"10.1007\/3-540-46035-7_22"},{"key":"22_CR11","unstructured":"R. Canetti and T. Rabin, \u201cUniversal Composition with Join State\u201d, available on the Eprint archive, http:\/\/eprint.iacr.org\/2002 , 2002."},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"W. Diffie and M. Hellman, \u201cNew directions in cryptography,\u201d IEEE Trans. Info. Theory IT-22, November 1976, pp. 644\u2013654.","DOI":"10.1109\/TIT.1976.1055638"},{"key":"22_CR13","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/BF00124891","volume":"2","author":"W. Diffie","year":"1992","unstructured":"W. Diffie, P. van Oorschot and M. Wiener, \u201cAuthentication and authenticated key exchanges\u201d, Designs, Codes and Cryptography, 2, 1992, pp. 107\u2013125.","journal-title":"Designs, Codes and Cryptography"},{"key":"22_CR14","unstructured":"Y. Dodis and S. Micali, \u201cSecure Computation\u201d, CRYPTO\u2019 00, 2000."},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"U. Feige and A. Shamir. Witness Indistinguishability and Witness Hiding Protocols. In 22nd STOC, pages 416\u2013426, 1990.","DOI":"10.1145\/100216.100272"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"O. Goldreich, \u201cFoundations of Cryptography\u201d, Cambridge University Press, 2001. Prelim. version available at http:\/\/philby.ucsd.edu\/cryptolib.html","DOI":"10.1017\/CBO9780511546891"},{"key":"22_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","DOI":"10.1007\/0-387-34799-2","volume-title":"CRYPTO\u2019 90","author":"S. Goldwasser","year":"1990","unstructured":"S. Goldwasser, and L. Levin, \u201cFair Computation of General Functions in Presence of Immoral Majority\u201d, CRYPTO\u2019 90, LNCS 537, Springer-Verlag, 1990."},{"issue":"2","key":"22_CR18","first-page":"270","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"S. Goldwasser and S. Micali, Probabilistic encryption, JCSS, Vol. 28, No 2, April 1984, pp. 270\u2013299.","journal-title":"JCSS"},{"issue":"1","key":"22_CR19","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S. Goldwasser","year":"1989","unstructured":"S. Goldwasser, S. Micali and C. Rackoff, \u201cThe Knowledge Complexity of Interactive Proof Systems\u201d, SIAM Journal on Comput., Vol. 18, No. 1, 1989, pp. 186\u2013208.","journal-title":"SIAM Journal on Comput."},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"S. Goldwasser, S. Micali, and R.L. Rivest. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM J. Comput., April 1988, pages 281\u2013308.","DOI":"10.1137\/0217017"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"A. Menezes, P. Van Oorschot and S. Vanstone, \u201cHandbook of Applied Cryptography,\u201d CRC Press, 1996.","DOI":"10.1201\/9781439821916"},{"key":"22_CR22","unstructured":"S. Micali and P. Rogaway, \u201cSecure Computation\u201d, unpublished manuscript, 1992. Preliminary version in CRYPTO 91."},{"key":"22_CR23","volume-title":"IBM Research Report RZ 3207 (#93253)","author":"B. Pfitzmann","year":"2000","unstructured":"B. Pfitzmann, M. Schunter and M. Waidner, \u201cProvably Secure Certified Mail\u201d, IBM Research Report RZ 3207 (#93253), IBM Research, Zurich, August 2000."},{"key":"22_CR24","unstructured":"V. Shoup, \u201cOn Formal Models for Secure Key Exchange\u201d Theory of Cryptography Library, 1999. Available at: http:\/\/philby.ucsd.edu\/cryptolib\/1999\/99-12.html ."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46035-7_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,13]],"date-time":"2023-05-13T19:18:06Z","timestamp":1684005486000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46035-7_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540435532","9783540460350"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/3-540-46035-7_22","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2002]]}}}