{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:28:33Z","timestamp":1753885713625},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540583332"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48658-5_29","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T20:50:39Z","timestamp":1186692639000},"page":"308-317","source":"Crossref","is-referenced-by-count":31,"title":["On the Risk of Opening Distributed Keys"],"prefix":"10.1007","author":[{"given":"Mike","family":"Burmester","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","doi-asserted-by":"crossref","unstructured":"M. Abadi, M. Tuttle: A semantics for a logic of authentication. In: Proc. ACM Symp. on Principles of Distributed Computing. ACM Press 1991, pp. 201\u2013216","DOI":"10.1145\/112600.112618"},{"key":"29_CR2","doi-asserted-by":"crossref","unstructured":"J.A. Adam: Ways to verify the U.S.-Soviet arms pact. IEEE Spectrum, pp. 30\u201334 (1988)","DOI":"10.1109\/6.4507"},{"key":"29_CR3","series-title":"Lect Notes Comput Sci","volume-title":"Entity authentication","author":"M. Bellare","year":"1990","unstructured":"M. Bellare and P. Rogaway: Entity authentication. To appear in: Crypto\u2019 93, Proceedings, Lecture Notes in Computer Science. Berlin: Springer"},{"issue":"3","key":"29_CR4","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/BF00196726","volume":"4","author":"S. Bengio","year":"1991","unstructured":"S. Bengio, G. Brassard, Y. G. Desmedt, C. Goutier, J-J. Quisquater: Secure implementations of identification systems. Journal of Cryptology 4(3), 175\u2013183 (1991)","journal-title":"Journal of Cryptology"},{"key":"29_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1007\/3-540-46766-1_3","volume-title":"Advances in Cryptology \u2014 Crypto\u2019 91, Proceedings","author":"R. Bird","year":"1992","unstructured":"R. Bird, I. Gopal, A. Herzberg, P. Jansen, S. Kutten, R. Molva, and M. Yung: Systematic design of two-party authentication protocols. In: J. Feigenbaum (ed.): Advances in Cryptology \u2014 Crypto\u2019 91, Proceedings. Lecture Notes in Computer Science 576. Berlin: Springer 1992, pp. 44\u201361"},{"key":"29_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1007\/0-387-34799-2_43","volume-title":"Advances in Cryptology \u2014 Crypto\u2019 88, Proceedings","author":"J. Brandt","year":"1990","unstructured":"J. Brandt, I. Damg\u00e5rd, P. Landrock, and T. Pedersen: Zero-knowledge authentication scheme with secret key exchange. In: S. Goldwasser (ed): Advances in Cryptology \u2014 Crypto\u2019 88, Proceedings. Lecture Notes in Computer Science 403. Berlin: Springer 1990, pp. 583\u2013588"},{"key":"29_CR7","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"M. Burrows, M. Abadi, R. M. Needham: A logic of authentication. ACM Trans. Computer Systems 8, 18\u201336 (1990)","journal-title":"ACM Trans. Computer Systems"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"P-C. Cheng, V. Gligor: On the formal specification and verification of multiparty session protocols. In: Proc. IEEE Sym. on Research in Security and Privacy. IEEE Press 1990, pp. 216\u2013233","DOI":"10.1109\/RISP.1990.63853"},{"key":"29_CR9","unstructured":"COMSET. Ripe Integrity Primitives. Final Report of RACE Integrity Primitives Evaluation (R1040). June 1992, pp. 191\u2013201"},{"key":"29_CR10","unstructured":"G.I. Davida: Chosen signature cryptanalysis of the RSA (MIT) public key cryptosystem. Tech. Report TR-CS-82-2, University of Wisconsin-Milwaukee, October 1982."},{"issue":"4","key":"29_CR11","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1145\/358027.358052","volume":"27","author":"D.E.R. Denning","year":"1984","unstructured":"D.E.R. Denning: Digital signatures with RSA and other public-key cryptosystems. Comm. ACM 27(4), 388\u2013392 (1984)","journal-title":"Comm. ACM"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Y. Desmedt, M. Burmester: Towards practical \u2018proven secure\u2019 authenticated key distribution. In: Proceedings 1st ACM Conference on Computer and Communication Security, Fairfax, Virginia. ACM Press, November 1993, pp. 228\u2013231","DOI":"10.1145\/168588.168616"},{"issue":"6","key":"29_CR13","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie, M.E. Hellman: New directions in cryptography. IEEE Trans. Inform. Theory, IT-22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"29_CR14","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/BF00124891","volume":"2","author":"W. Diffie","year":"1992","unstructured":"W. Diffie, P.C. van Oorschot, M.J. Wiener: Authentication and authenticated key exchanges. Designs, Codes and Cryptography 2, 107\u2013125 (1992)","journal-title":"Designs, Codes and Cryptography"},{"key":"29_CR15","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"T. ElGamal: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory 31, 469\u2013472 (1985)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"1","key":"29_CR16","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/BF00196790","volume":"3","author":"K. Gaarder","year":"1991","unstructured":"K. Gaarder, E. Snekkens: Applying a formal analysis technique to the CCITT X.509 strong two-way authentication protocol. J. Cryptology 3(1), 81\u201398 (1991)","journal-title":"J. Cryptology"},{"key":"29_CR17","unstructured":"V. Gligor, R. Kailar, S. Stubblebine, L. Gong: Logics for cryptographic protocols \u2014 virtues and limitations. In: Proc. IEEE 1991 Computer Security Foundations Workshop. Franconia, New Hampshire 1991"},{"key":"29_CR18","doi-asserted-by":"crossref","unstructured":"L. Gong, R. Needham, R. Yalom: Reasoning about belief in cryptographic protocols. In: Proc. 1990 IEEE Symp. on Security and Privacy, Oakland, California. IEEE Press 1990, pp. 234\u2013248","DOI":"10.1109\/RISP.1990.63854"},{"key":"29_CR19","unstructured":"K.C. Goss: Cryptographic method and apparatus for public key exchange with authentication. U.S. Patent 4,956,863, Granted Sept 11, 1990."},{"key":"29_CR20","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/3-540-46885-4_5","volume-title":"Advances in Cryptology, Eurocrypt\u2019 89","author":"C.G. G\u00fcnther","year":"1990","unstructured":"C.G. G\u00fcnther: An identity-based key exchange protocol. In: J-J. Quisquater, J. Vandewalle (eds.): Advances in Cryptology, Eurocrypt\u2019 89. Lecture Notes in Computer Science 434. Berlin: Springer 1990, pp. 29\u201337"},{"issue":"2","key":"29_CR21","first-page":"99","volume":"E69","author":"T. Matsumoto","year":"1986","unstructured":"T. Matsumoto, Y. Takashima, H. Imai: On seeking smart public key distribution systems. The Transactions of the IECE of Japan E69(2), 99\u2013106 (1986)","journal-title":"The Transactions of the IECE of Japan"},{"issue":"5","key":"29_CR22","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1109\/5.4444","volume":"76","author":"J.H. Moore","year":"1988","unstructured":"J.H. Moore: Protocol failures in cryptosystems. Proc. IEEE 76(5), 594\u2013602 (1988)","journal-title":"Proc. IEEE"},{"key":"29_CR23","doi-asserted-by":"crossref","unstructured":"K. Nyberg, R. Rueppel: A new signature scheme based on the DSA giving message recovery. In: Proceedings 1st ACM Conference on Computer and Communication Security, Fairfax, Virginia. ACM Press 1993, pp. 58\u201361","DOI":"10.1145\/168588.168595"},{"issue":"1","key":"29_CR24","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1049\/el:19940052","volume":"30","author":"K. Nyberg","year":"1994","unstructured":"K. Nyberg, R. Rueppel. Weaknesses in some recent key agreement protocols. Electronics Letters, 30(1), 26\u201327 (1994)","journal-title":"Electronics Letters"},{"issue":"4","key":"29_CR25","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1145\/358027.358053","volume":"27","author":"R. L. Rivest","year":"1984","unstructured":"R. L. Rivest, A. Shamir: How to expose an eavesdropper. Comm. ACM 27(4), pp. 393\u2013395 (1984)","journal-title":"Comm. ACM"},{"key":"29_CR26","first-page":"615","volume-title":"Contemporary Cryptology","author":"G.J. Simmons","year":"1992","unstructured":"G.J. Simmons: How to ensure that data acquired to verify treaty compliance are trustworthy. In: G.J. Simmons (ed.): Contemporary Cryptology. New York: IEEE Press 1992, pp. 615\u2013630."},{"key":"29_CR27","doi-asserted-by":"crossref","unstructured":"P.C. van Oorschot: Extending cryptographic logics of belief to key agreement protocols. In: Proc. 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia. ACM Press 1993, pp. 232\u2013243","DOI":"10.1145\/168588.168617"},{"key":"29_CR28","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1007\/3-540-38424-3_19","volume-title":"Advances in Cryptology \u2014 Crypto\u2019 90, Proceedings","author":"Y. Yacobi","year":"1991","unstructured":"Y. Yacobi: A key distribution paradox. In: A.J. Menezes, S.A. Vanstone (eds.): Advances in Cryptology \u2014 Crypto\u2019 90, Proceedings. Lecture Notes in Computer Science 537. Berlin: Springer 1991, pp. 268\u2013273"},{"key":"29_CR29","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/0-387-34805-0_32","volume-title":"Advances in Cryptology \u2014 Crypto\u2019 89, Proceedings","author":"Y. Yacobi","year":"1990","unstructured":"Y. Yacobi, Z. Shmuely: On key distribution systems. In: G. Brassard (ed.): Advances in Cryptology \u2014 Crypto\u2019 89, Proceedings. Lecture Notes in Computer Science 435. Berlin: Springer 1990, pp. 344\u2013355"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201994"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48658-5_29.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:16:14Z","timestamp":1605647774000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48658-5_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540583332"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/3-540-48658-5_29","relation":{},"subject":[]}}