{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:09:28Z","timestamp":1743070168021,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031209734"},{"type":"electronic","value":"9783031209741"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-20974-1_11","type":"book-chapter","created":{"date-parts":[[2022,11,10]],"date-time":"2022-11-10T08:06:38Z","timestamp":1668067598000},"page":"225-244","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["How to\u00a0Design Authenticated Key Exchange for\u00a0Wearable Devices: Cryptanalysis of\u00a0AKE for\u00a0Health Monitoring and\u00a0Countermeasures via\u00a0Distinct SMs with\u00a0Key Split and\u00a0Refresh"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5326-3627","authenticated-orcid":false,"given":"\u0141ukasz","family":"Krzywiecki","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6327-3565","authenticated-orcid":false,"given":"Hannes","family":"Salin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,10]]},"reference":[{"key":"11_CR1","doi-asserted-by":"publisher","unstructured":"Alwen, J., Dodis, Y., Wichs, D.: Leakage-resilient public-key cryptography in the bounded-retrieval model. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 36\u201354. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03356-8_3","DOI":"10.1007\/978-3-642-03356-8_3"},{"key":"11_CR2","unstructured":"Apple: Apple Platform Security Spring 2020 (2020). https:\/\/manuals.info.apple.com\/MANUALS\/1000\/MA1902\/en_US\/apple-platform-security-guide.pdf"},{"key":"11_CR3","doi-asserted-by":"publisher","unstructured":"Brakerski, Z., Kalai, Y.T., Katz, J., Vaikuntanathan, V.: Overcoming the hole in the bucket: public-key cryptography resilient to continual memory leakage. In: 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, pp. 501\u2013510 (2010). https:\/\/doi.org\/10.1109\/FOCS.2010.55","DOI":"10.1109\/FOCS.2010.55"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Butun, I., Sari, A., \u00d6sterberg, P.: Hardware security of fog end-devices for the internet of things. Sensors 20, 5729 (2020)","DOI":"10.3390\/s20205729"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/978-3-642-00468-1_12","volume-title":"Public Key Cryptography \u2013 PKC 2009","author":"J Camenisch","year":"2009","unstructured":"Camenisch, J., Kohlweiss, M., Rial, A., Sheedy, C.: Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 196\u2013214. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-00468-1_12"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Canetti, R., Krawczyk, H.: Security analysis of IKE\u2019s signature-based key-exchange protocol. Cryptology ePrint Archive, Report 2002\/120 (2002)","DOI":"10.1007\/3-540-45708-9_10"},{"key":"11_CR7","doi-asserted-by":"publisher","unstructured":"Dodis, Y., Haralambiev, K., Lopez-Alt, A., Wichs, D.: Cryptography against continuous memory attacks. In: 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, pp. 511\u2013520 (2010). https:\/\/doi.org\/10.1109\/FOCS.2010.56","DOI":"10.1109\/FOCS.2010.56"},{"key":"11_CR8","doi-asserted-by":"publisher","unstructured":"Ferreira, L.C., Dahab, R.: Blinded-key signatures: securing private keys embedded in mobile agents. In: Proceedings of the 2002 ACM Symposium on Applied Computing, SAC 2002, pp. 82\u201386. Association for Computing Machinery, New York (2002). https:\/\/doi.org\/10.1145\/508791.508808","DOI":"10.1145\/508791.508808"},{"key":"11_CR9","unstructured":"Google: Android Enterprise Security White Paper (2020). https:\/\/static.googleusercontent.com\/media\/www.android.com\/sv\/\/static\/2016\/pdfs\/enterprise\/Android_Enterprise_Security_White_Paper_2019.pdf"},{"key":"11_CR10","doi-asserted-by":"publisher","unstructured":"Green, M.D., Miers, I.: Forward secure asynchronous messaging from puncturable encryption. In: 2015 IEEE Symposium on Security and Privacy, pp. 305\u2013320 (2015). https:\/\/doi.org\/10.1109\/SP.2015.26","DOI":"10.1109\/SP.2015.26"},{"key":"11_CR11","doi-asserted-by":"publisher","unstructured":"Hanzlik, L., Kluczniak, K., Krzywiecki, L., Kutylowski, M.: Mutual chip authentication. In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 \/ 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13\/12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, 16\u201318 July 2013, pp. 1683\u20131689. IEEE (2013). https:\/\/doi.org\/10.1109\/TrustCom.2013.209","DOI":"10.1109\/TrustCom.2013.209"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-642-53997-8_8","volume-title":"Public Key Infrastructures, Services and Applications","author":"L Hanzlik","year":"2014","unstructured":"Hanzlik, L., Kluczniak, K., Kuty\u0142owski, M., Krzywiecki, \u0141: Mutual restricted identification. In: Katsikas, S., Agudo, I. (eds.) EuroPKI 2013. LNCS, vol. 8341, pp. 119\u2013133. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-53997-8_8"},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-642-24316-5_28","volume-title":"Provable Security","author":"H Huang","year":"2011","unstructured":"Huang, H.: Strongly secure one round authenticated key exchange protocol with perfect forward security. In: Boyen, X., Chen, X. (eds.) ProvSec 2011. LNCS, vol. 6980, pp. 389\u2013397. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-24316-5_28"},{"key":"11_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1007\/978-3-642-17373-8_34","volume-title":"Advances in Cryptology - ASIACRYPT 2010","author":"E Kiltz","year":"2010","unstructured":"Kiltz, E., Pietrzak, K.: Leakage resilient ElGamal encryption. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 595\u2013612. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17373-8_34"},{"key":"11_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1007\/978-3-540-45146-4_24","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"H Krawczyk","year":"2003","unstructured":"Krawczyk, H.: SIGMA: the \u201cSIGn-and-MAc\u2019\u2019 approach to authenticated Diffie-Hellman and its use in the IKE protocols. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 400\u2013425. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45146-4_24"},{"key":"11_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1007\/11535218_33","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"H Krawczyk","year":"2005","unstructured":"Krawczyk, H.: HMQV: a high-performance secure Diffie-Hellman protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546\u2013566. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11535218_33"},{"key":"11_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1007\/978-3-319-12475-9_25","volume-title":"Provable Security","author":"\u0141 Krzywiecki","year":"2014","unstructured":"Krzywiecki, \u0141: Deniable version of SIGMA key exchange protocol resilient to ephemeral key leakage. In: Chow, S.S.M., Liu, J.K., Hui, L.C.K., Yiu, S.M. (eds.) ProvSec 2014. LNCS, vol. 8782, pp. 334\u2013341. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-12475-9_25"},{"key":"11_CR18","doi-asserted-by":"publisher","unstructured":"Krzywiecki, L., Kluczniak, K., Koziel, P., Panwar, N.: Privacy-oriented dependency via deniable SIGMA protocol. Comput. Secur. 79, 53\u201367 (2018). https:\/\/doi.org\/10.1016\/j.cose.2018.08.002","DOI":"10.1016\/j.cose.2018.08.002"},{"key":"11_CR19","unstructured":"LaMacchia, B.A., Lauter, K.E., Mityagin, A.: Stronger security of authenticated key exchange, vol. 2006, p. 73 (2006). http:\/\/eprint.iacr.org\/2006\/073"},{"key":"11_CR20","unstructured":"Lauter, K.E., Mityagin, A.: Security analysis of KEA authenticated key exchange protocol, vol. 2005, p. 265 (2005). http:\/\/eprint.iacr.org\/2005\/265"},{"issue":"5","key":"11_CR21","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MPUL.2016.2592260","volume":"7","author":"D Metcalf","year":"2016","unstructured":"Metcalf, D., Milliard, S.T.J., Gomez, M., Schwartz, M.: Wearables and the internet of things for health: wearable, interconnected devices promise more efficient and comprehensive health care. IEEE Pulse 7(5), 35\u201339 (2016). https:\/\/doi.org\/10.1109\/MPUL.2016.2592260","journal-title":"IEEE Pulse"},{"key":"11_CR22","unstructured":"Nicolosi, A., Krohn, M.N., Dodis, Y., Mazi\u00e8res, D.: Proactive two-party signatures for user authentication. In: NDSS. The Internet Society (2003)"},{"key":"11_CR23","doi-asserted-by":"publisher","unstructured":"Papa, A., Mital, M., Pisano, P., Del Giudice, M.: E-health and wellbeing monitoring using smart healthcare devices: an empirical investigation. Technol. Forecast. Soc. Change 153, 119226 (2020). https:\/\/doi.org\/10.1016\/j.techfore.2018.02.018. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0040162517312696","DOI":"10.1016\/j.techfore.2018.02.018"},{"key":"11_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02617-1","volume-title":"Advances in Information Security and Assurance","year":"2009","unstructured":"Park, J.H., Chen, H.-H., Atiquzzaman, M., Lee, C., Kim, T., Yeo, S.-S. (eds.): ISA 2009. LNCS, vol. 5576. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-02617-1"},{"key":"11_CR25","doi-asserted-by":"publisher","unstructured":"Qu, Y., Zheng, G., Ma, H., Wang, X., Ji, B., Wu, H.: A survey of routing protocols in WBAN for healthcare applications. Sensors (Basel, Switzerland) 19(7), 1638 (2019). https:\/\/doi.org\/10.3390\/s19071638. https:\/\/pubmed.ncbi.nlm.nih.gov\/30959817","DOI":"10.3390\/s19071638"},{"issue":"2","key":"11_CR26","doi-asserted-by":"publisher","first-page":"2017","DOI":"10.1109\/JSYST.2017.2685524","volume":"12","author":"O Ruan","year":"2018","unstructured":"Ruan, O., Zhang, Y., Zhang, M., Zhou, J., Harn, L.: After-the-fact leakage-resilient identity-based authenticated key exchange. IEEE Syst. J. 12(2), 2017\u20132026 (2018). https:\/\/doi.org\/10.1109\/JSYST.2017.2685524","journal-title":"IEEE Syst. J."},{"key":"11_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-3-642-15317-4_15","volume-title":"Security and Cryptography for Networks","author":"AP Sarr","year":"2010","unstructured":"Sarr, A.P., Elbaz-Vincent, P., Bajard, J.-C.: A new security model for authenticated key agreement. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 219\u2013234. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15317-4_15"},{"key":"11_CR28","doi-asserted-by":"publisher","unstructured":"Selvi, S.S.D., Paul, A., Rangan, C.P., Dirisala, S., Basu, S.: Splitting and aggregating signatures in cryptocurrency protocols. In: 2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON), pp. 100\u2013108 (2019). https:\/\/doi.org\/10.1109\/DAPPCON.2019.00021","DOI":"10.1109\/DAPPCON.2019.00021"},{"key":"11_CR29","doi-asserted-by":"publisher","unstructured":"Shuai, M., Liu, B., Yu, N., Xiong, L., Wang, C.: Efficient and privacy-preserving authentication scheme for wireless body area networks. J. Inf. Secur. Appl. 52, 102499 (2020). https:\/\/doi.org\/10.1016\/j.jisa.2020.102499. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S2214212619305903","DOI":"10.1016\/j.jisa.2020.102499"},{"issue":"3","key":"11_CR30","doi-asserted-by":"publisher","first-page":"42","DOI":"10.3390\/jsan8030042","volume":"8","author":"S Sidhu","year":"2019","unstructured":"Sidhu, S., Mohd, B.J., Hayajneh, T.: Hardware security in IoT devices with emphasis on hardware Trojans. J. Sens. Actuator Netw. 8(3), 42 (2019)","journal-title":"J. Sens. Actuator Netw."},{"issue":"4","key":"11_CR31","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0195487","volume":"13","author":"H Tahir","year":"2018","unstructured":"Tahir, H., Tahir, R., McDonald-Maier, K.: On the security of consumer wearable devices in the Internet of Things. PLoS ONE 13(4), e0195487 (2018)","journal-title":"PLoS ONE"},{"issue":"15","key":"11_CR32","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1016\/j.ipl.2011.05.009","volume":"111","author":"Q Tang","year":"2011","unstructured":"Tang, Q., Chen, L.: Extended KCI attack against two-party key establishment protocols. Inf. Process. Lett. 111(15), 744\u2013747 (2011)","journal-title":"Inf. Process. Lett."},{"issue":"3","key":"11_CR33","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/s10623-007-9159-1","volume":"46","author":"B Ustaoglu","year":"2008","unstructured":"Ustaoglu, B.: Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS. Des. Codes Cryptography 46(3), 329\u2013342 (2008)","journal-title":"Des. Codes Cryptography"},{"key":"11_CR34","doi-asserted-by":"publisher","unstructured":"Zeng, W., Zhang, J.: Leakage-resilient and lightweight authenticated key exchange for E-health. In: 2020 6th International Conference on Information Management (ICIM), pp. 162\u2013166 (2020). https:\/\/doi.org\/10.1109\/ICIM49319.2020.244691","DOI":"10.1109\/ICIM49319.2020.244691"}],"container-title":["Lecture Notes in Computer Science","Cryptology and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-20974-1_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,29]],"date-time":"2022-12-29T20:04:05Z","timestamp":1672344245000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-20974-1_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031209734","9783031209741"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-20974-1_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"10 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CANS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dubai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cans2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cans2022.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"54","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}