{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:45:41Z","timestamp":1742913941994,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031209734"},{"type":"electronic","value":"9783031209741"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-20974-1_20","type":"book-chapter","created":{"date-parts":[[2022,11,10]],"date-time":"2022-11-10T08:06:38Z","timestamp":1668067598000},"page":"371-390","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Post-Quantum Electronic Identity: Adapting OpenID Connect and OAuth 2.0 to the Post-Quantum Era"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4492-163X","authenticated-orcid":false,"given":"Frederico","family":"Schardong","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7668-7505","authenticated-orcid":false,"given":"Alexandre Augusto","family":"Giron","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8735-0852","authenticated-orcid":false,"given":"Fernanda Larisa","family":"M\u00fcller","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9611-5694","authenticated-orcid":false,"given":"Ricardo","family":"Cust\u00f3dio","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,10]]},"reference":[{"key":"20_CR1","doi-asserted-by":"publisher","unstructured":"Alkhulaifi, A., El-Alfy, E.S.M.: Exploring lattice-based post-quantum signature for JWT authentication: review and case study. In: 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring), pp. 1\u20135 (2020). https:\/\/doi.org\/10.1109\/VTC2020-Spring48590.2020.9129505","DOI":"10.1109\/VTC2020-Spring48590.2020.9129505"},{"key":"20_CR2","unstructured":"Aumasson, J.P., et al.: Sphincs+: submission to the NIST post-quantum project (2021). https:\/\/sphincs.org\/data\/sphincs+-r3.1-specification.pdf"},{"key":"20_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/978-3-540-73408-6_18","volume-title":"Public Key Infrastructure","author":"D Berbecaru","year":"2007","unstructured":"Berbecaru, D., Lioy, A.: On the robustness of applications based on the SSL and TLS security protocols. In: Lopez, J., Samarati, P., Ferrer, J.L. (eds.) EuroPKI 2007. LNCS, vol. 4582, pp. 248\u2013264. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-73408-6_18"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Bertocci, V.: JSON Web Token (JWT) Profile for OAuth 2.0 Access Tokens. RFC 9068 (2021)","DOI":"10.17487\/RFC9068"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the 28th ACM Symposium on Theory of Computing, pp. 212\u2013219 (1996)","DOI":"10.1145\/237814.237866"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Hardt, D.: The OAuth 2.0 Authorization Framework. RFC 6749 (2012)","DOI":"10.17487\/rfc6749"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Howe, J., Prest, T., Apon, D.: Sok: How (not) to design and implement post-quantum cryptography. Cryptology ePrint Archive, report 2021\/462 (2021). https:\/\/ia.cr\/2021\/462","DOI":"10.1007\/978-3-030-75539-3_19"},{"key":"20_CR8","unstructured":"(IANA), I.A.N.A.: Transport layer security (TLS) parameters (2022)"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Johansson, L.: An IANA Registry for Level of Assurance (LoA) Profiles. RFC 6711 (2012)","DOI":"10.17487\/rfc6711"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Jones, M.: JSON Web Algorithms (JWA). RFC 7518 (2015)","DOI":"10.17487\/RFC7518"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Jones, M.: JSON Web Key (JWK). RFC 7517 (2015)","DOI":"10.17487\/RFC7517"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Jones, M., Bradley, J., Sakimura, N.: JSON Web Signature (JWS). RFC 7515 (2015)","DOI":"10.17487\/RFC7515"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Jones, M., Bradley, J., Sakimura, N.: JSON Web Token (JWT). RFC 7519 (2015)","DOI":"10.17487\/RFC7519"},{"key":"20_CR14","unstructured":"Jones, M., De Medeiros, B., Agarwal, N., Sakimura, N., Bradley, J.: Openid connect RP-initiated logout 1.0. The OpenID Foundation, p. S3 (2022)"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Jones, M., Hildebrand, J.: JSON Web Encryption (JWE). RFC 7516 (2015)","DOI":"10.17487\/RFC7516"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Jones, M., Sakimura, N., Bradley, J.: OAuth 2.0 Authorization Server Metadata. RFC 8414 (2018)","DOI":"10.17487\/RFC8414"},{"key":"20_CR17","unstructured":"Keele, S., et al.: Guidelines for performing systematic literature reviews in software engineering. Technical report (2007)"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Laurie, B., Langley, A., Kasper, E., Messeri, E., Stradling, R.: Certificate Transparency Version 2.0. RFC 9162 (2021)","DOI":"10.17487\/RFC9162"},{"key":"20_CR19","unstructured":"Lodderstedt, T., Bradley, J., Labunets, A., Fett, D.: OAuth 2.0 Security Best Current Practice. Internet-Draft 20, Internet Engineering Task Force (2022)"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Lodderstedt, T., McGloin, M., Hunt, P.: OAuth 2.0 Threat Model and Security Considerations. RFC 6819 (2013)","DOI":"10.17487\/rfc6819"},{"key":"20_CR21","unstructured":"NIST: Post-quantum cryptography (2016). https:\/\/csrc.nist.gov\/Projects\/Post-Quantum-Cryptography. Accessed 26 June 2021"},{"key":"20_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-030-44223-1_5","volume-title":"Post-Quantum Cryptography","author":"C Paquin","year":"2020","unstructured":"Paquin, C., Stebila, D., Tamvada, G.: Benchmarking post-quantum cryptography in TLS. In: Ding, J., Tillich, J.-P. (eds.) PQCrypto 2020. LNCS, vol. 12100, pp. 72\u201391. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-44223-1_5"},{"key":"20_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.infsof.2015.03.007","volume":"64","author":"K Petersen","year":"2015","unstructured":"Petersen, K., Vakkalanka, S., Kuzniarz, L.: Guidelines for conducting systematic mapping studies in software engineering: an update. Inf. Softw. Technol. 64, 1\u201318 (2015)","journal-title":"Inf. Softw. Technol."},{"key":"20_CR24","doi-asserted-by":"publisher","unstructured":"Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446, August 2018. https:\/\/doi.org\/10.17487\/RFC8446","DOI":"10.17487\/RFC8446"},{"key":"20_CR25","doi-asserted-by":"crossref","unstructured":"Sakimura, N., Bradley, J., Agarwal, N.: Proof Key for Code Exchange by OAuth Public Clients. RFC 7636 (2015)","DOI":"10.17487\/RFC7636"},{"key":"20_CR26","unstructured":"Sakimura, N., Bradley, J., Jones, M.: OpenID connect dynamic client registration. The OpenID Foundation, p. S3 (2014)"},{"key":"20_CR27","unstructured":"Sakimura, N., Bradley, J., Jones, M., De Medeiros, B., Mortimore, C.: OpenID connect core 1.0. The OpenID Foundation, p. S3 (2014)"},{"key":"20_CR28","unstructured":"Sakimura, N., Bradley, J., Jones, M., Jay, E.: OpenID connect discovery. The OpenID Foundation, p. S3 (2014)"},{"key":"20_CR29","doi-asserted-by":"crossref","unstructured":"Schwabe, P., Stebila, D., Wiggers, T.: Post-Quantum TLS Without Handshake Signatures, pp. 1461\u20131480. Association for Computing Machinery, New York, NY, USA (2020). https:\/\/doi.org\/10.1145\/3372297.3423350","DOI":"10.1145\/3372297.3423350"},{"key":"20_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-88418-5_1","volume-title":"Computer Security \u2013 ESORICS 2021","author":"P Schwabe","year":"2021","unstructured":"Schwabe, P., Stebila, D., Wiggers, T.: More efficient post-quantum KEMTLS with pre-distributed public keys. In: Bertino, E., Shulman, H., Waidner, M. (eds.) ESORICS 2021. LNCS, vol. 12972, pp. 3\u201322. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-88418-5_1"},{"key":"20_CR31","doi-asserted-by":"publisher","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science, pp. 124\u2013134. IEEE, Santa Fe, NM, USA (1994). https:\/\/doi.org\/10.1109\/SFCS.1994.365700","DOI":"10.1109\/SFCS.1994.365700"},{"key":"20_CR32","doi-asserted-by":"crossref","unstructured":"Sikeridis, D., Kampanakis, P., Devetsikiotis, M.: Assessing the overhead of post-quantum cryptography in TLS 1.3 and SSH. In: Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies, pp. 149\u2013156. Association for Computing Machinery, New York, NY, USA (2020)","DOI":"10.1145\/3386367.3431305"},{"key":"20_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/978-3-319-69453-5_2","volume-title":"Selected Areas in Cryptography \u2013 SAC 2016","author":"D Stebila","year":"2017","unstructured":"Stebila, D., Mosca, M.: Post-quantum key exchange for the internet and the open quantum safe project. In: Avanzi, R., Heys, H. (eds.) SAC 2016. LNCS, vol. 10532, pp. 14\u201337. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-69453-5_2"}],"container-title":["Lecture Notes in Computer Science","Cryptology and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-20974-1_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,29]],"date-time":"2022-12-29T20:04:49Z","timestamp":1672344289000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-20974-1_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031209734","9783031209741"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-20974-1_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"10 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CANS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dubai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cans2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cans2022.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"54","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}