{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,27]],"date-time":"2025-04-27T21:40:05Z","timestamp":1745790005346,"version":"3.40.4"},"publisher-location":"Cham","reference-count":49,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031911002","type":"print"},{"value":"9783031911019","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-91101-9_9","type":"book-chapter","created":{"date-parts":[[2025,4,27]],"date-time":"2025-04-27T21:14:24Z","timestamp":1745788464000},"page":"242-271","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Formal Analysis of\u00a0Multi-device Group Messaging in\u00a0WhatsApp"],"prefix":"10.1007","author":[{"given":"Martin R.","family":"Albrecht","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3234-6527","authenticated-orcid":false,"given":"Benjamin","family":"Dowling","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7140-442X","authenticated-orcid":false,"given":"Daniel","family":"Jones","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,28]]},"reference":[{"key":"9_CR1","doi-asserted-by":"publisher","unstructured":"Albrecht, M.R., Celi, S., Dowling, B., Jones, D.: Practically-exploitable cryptographic vulnerabilities in Matrix. In: Ristenpart, T., Traynor, P. (eds.) 44th IEEE Symposium on Security and Privacy (2023). https:\/\/doi.org\/10.1109\/SP46215.2023.10351027","DOI":"10.1109\/SP46215.2023.10351027"},{"key":"9_CR2","doi-asserted-by":"publisher","unstructured":"Albrecht, M.R., Dowling, B., Jones, D.: Device-oriented group messaging: a formal cryptographic analysis of matrix\u2019 core. In: 2024 IEEE Symposium on Security and Privacy, pp. 2666\u20131685. IEEE Computer Society Press (2024). https:\/\/doi.org\/10.1109\/SP54263.2024.00075","DOI":"10.1109\/SP54263.2024.00075"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-030-17653-2_5","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2019","author":"J Alwen","year":"2019","unstructured":"Alwen, J., Coretti, S., Dodis, Y.: The Double Ratchet: security notions, proofs, and modularization for the signal protocol. In: Ishai, Y., Rijmen, V. (eds.) EUROCRYPT 2019. LNCS, vol. 11476, pp. 129\u2013158. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17653-2_5"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/978-3-030-56784-2_9","volume-title":"Advances in Cryptology \u2013 CRYPTO 2020","author":"J Alwen","year":"2020","unstructured":"Alwen, J., Coretti, S., Dodis, Y., Tselekounis, Y.: Security analysis and improvements for the IETF MLS standard for group messaging. In: Micciancio, D., Ristenpart, T. (eds.) CRYPTO 2020. LNCS, vol. 12170, pp. 248\u2013277. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-56784-2_9"},{"key":"9_CR5","doi-asserted-by":"publisher","unstructured":"Alwen, J., Coretti, S., Dodis, Y., Tselekounis, Y.: Modular design of secure group messaging protocols and the security of MLS. In: Vigna, G., Shi, E. (eds.) ACM CCS 2021, pp. 1463\u20131483. ACM Press (2021)https:\/\/doi.org\/10.1145\/3460120.3484820","DOI":"10.1145\/3460120.3484820"},{"key":"9_CR6","doi-asserted-by":"publisher","unstructured":"Balb\u00e1s, D., Collins, D., Gajland, P.: WhatsUpp with sender keys? Analysis, improvements and security proofs. In: Guo, J., Steinfeld, R. (eds.) ASIACRYPT\u00a02023, Part\u00a0V. LNCS, vol. 14442, pp. 307\u2013341. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-8733-7_10","DOI":"10.1007\/978-981-99-8733-7_10"},{"key":"9_CR7","doi-asserted-by":"publisher","unstructured":"Balb\u00e1s, D., Collins, D., Gajland, P.: Analysis and improvements of the sender keys protocol for group messaging (2022). https:\/\/doi.org\/10.22429\/Euc2022.028","DOI":"10.22429\/Euc2022.028"},{"key":"9_CR8","doi-asserted-by":"publisher","unstructured":"Barooti, K., Collins, D., Colombo, S., Huguenin-Dumittan, L., Vaudenay, S.: On active attack detection in messaging with immediate decryption. In: Handschuh, H., Lysyanskaya, A. (eds.) CRYPTO\u00a02023, Part\u00a0IV. LNCS, vol. 14084, pp. 362\u2013395. Springer, Cham (2023).https:\/\/doi.org\/10.1007\/978-3-031-38551-3_12","DOI":"10.1007\/978-3-031-38551-3_12"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1007\/11818175_36","volume-title":"Advances in Cryptology - CRYPTO 2006","author":"M Bellare","year":"2006","unstructured":"Bellare, M.: New proofs for NMAC and HMAC: security without collision-resistance. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 602\u2013619. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11818175_36"},{"key":"9_CR10","doi-asserted-by":"publisher","unstructured":"Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: 38th FOCS, pp. 394\u2013403. IEEE Computer Society Press (1997). https:\/\/doi.org\/10.1109\/SFCS.1997.646128","DOI":"10.1109\/SFCS.1997.646128"},{"key":"9_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/3-540-69053-0_13","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201997","author":"M Bellare","year":"1997","unstructured":"Bellare, M., Micciancio, D.: A new paradigm for collision-free hashing: incrementality at reduced cost. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 163\u2013192. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/3-540-69053-0_13"},{"issue":"4","key":"9_CR12","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/s00145-008-9026-x","volume":"21","author":"M Bellare","year":"2008","unstructured":"Bellare, M., Namprempre, C.: Authenticated encryption: relations among notions and analysis of the generic composition paradigm. J. Cryptol. 21(4), 469\u2013491 (2008). https:\/\/doi.org\/10.1007\/s00145-008-9026-x","journal-title":"J. Cryptol."},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/3-540-44448-3_24","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 2000","author":"M Bellare","year":"2000","unstructured":"Bellare, M., Rogaway, P.: Encode-then-encipher encryption: how to exploit nonces or redundancy in plaintexts for efficient cryptography. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 317\u2013330. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-44448-3_24"},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/11745853_14","volume-title":"Public Key Cryptography - PKC 2006","author":"DJ Bernstein","year":"2006","unstructured":"Bernstein, D.J.: Curve25519: new Diffie-Hellman speed records. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 207\u2013228. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11745853_14"},{"key":"9_CR15","doi-asserted-by":"publisher","unstructured":"Bienstock, A., Fairoze, J., Garg, S., Mukherjee, P., Raghuraman, S.: A more complete analysis of the signal double ratchet algorithm. In: Dodis, Y., Shrimpton, T. (eds.) CRYPTO\u00a02022, Part\u00a0I. LNCS, vol. 13507, pp. 784\u2013813. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-15802-5_27","DOI":"10.1007\/978-3-031-15802-5_27"},{"key":"9_CR16","unstructured":"Blazy, O., Boureanu, I., Lafourcade, P., Onete, C., Robert, L.: How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment. In: Calandrino, J.A., Troncoso, C. (eds.) USENIX Security 2023, pp. 5917\u20135934. USENIX Association (2023)"},{"key":"9_CR17","doi-asserted-by":"publisher","unstructured":"Caforio, A., Durak, F.B., Vaudenay, S.: Beyond security and efficiency: on-demand ratcheting with security awareness. In: Garay, J. (ed.) PKC\u00a02021, Part\u00a0II. LNCS, vol. 12711, pp. 649\u2013677. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-75248-4_23","DOI":"10.1007\/978-3-030-75248-4_23"},{"key":"9_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-030-57878-7_9","volume-title":"Applied Cryptography and Network Security","author":"S Campion","year":"2020","unstructured":"Campion, S., Devigne, J., Duguey, C., Fouque, P.-A.: Multi-device for signal. In: Conti, M., Zhou, J., Casalicchio, E., Spognardi, A. (eds.) ACNS 2020. LNCS, vol. 12147, pp. 167\u2013187. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-57878-7_9"},{"issue":"4","key":"9_CR19","doi-asserted-by":"publisher","first-page":"1914","DOI":"10.1007\/s00145-020-09360-1","volume":"33","author":"K Cohn-Gordon","year":"2020","unstructured":"Cohn-Gordon, K., Cremers, C., Dowling, B., Garratt, L., Stebila, D.: A formal security analysis of the signal messaging protocol. J. Cryptol. 33(4), 1914\u20131983 (2020). https:\/\/doi.org\/10.1007\/s00145-020-09360-1","journal-title":"J. Cryptol."},{"key":"9_CR20","doi-asserted-by":"publisher","unstructured":"Cohn-Gordon, K., Cremers, C., Garratt, L., Millican, J., Milner, K.: On ends-to-ends encryption: asynchronous group messaging with strong security guarantees. In: Lie, D., Mannan, M., Backes, M., Wang, X. (eds.) ACM CCS 2018, pp. 1802\u20131819. ACM Press (2018). https:\/\/doi.org\/10.1145\/3243734.3243747","DOI":"10.1145\/3243734.3243747"},{"key":"9_CR21","doi-asserted-by":"publisher","unstructured":"Cohn-Gordon, K., Cremers, C.J.F., Garratt, L.: On post-compromise security. In: Hicks, M., K\u00f6pf, B. (eds.) CSF 2016 Computer Security Foundations Symposium, pp. 164\u2013178. IEEE Computer Society Press (2016). https:\/\/doi.org\/10.1109\/CSF.2016.19","DOI":"10.1109\/CSF.2016.19"},{"key":"9_CR22","doi-asserted-by":"publisher","unstructured":"Cremers, C., Fairoze, J., Kiesl, B., Naska, A.: Clone detection in secure messaging: Improving post-compromise security in practice. In: Ligatti, J., Ou, X., Katz, J., Vigna, G. (eds.) ACM CCS 2020, pp. 1481\u20131495. ACM Press (2020). https:\/\/doi.org\/10.1145\/3372297.3423354","DOI":"10.1145\/3372297.3423354"},{"key":"9_CR23","unstructured":"Cremers, C., Hale, B., Kohbrok, K.: The complexities of healing in secure group messaging: why cross-group effects matter. In: Bailey, M., Greenstadt, R. (eds.) USENIX Security 2021, pp. 1847\u20131864. USENIX Association (2021)"},{"key":"9_CR24","unstructured":"Cremers, C., Jacomme, C., Naska, A.: Formal analysis of session-handling in secure messaging: lifting security from sessions to conversations. In: Calandrino, J.A., Troncoso, C. (eds.) USENIX Security 2023, pp. 1235\u20131252. USENIX Association (2023)"},{"key":"9_CR25","doi-asserted-by":"publisher","unstructured":"Davies, G.T., et al.: Security analysis of the WhatsApp end-to-end encrypted backup protocol. In: Handschuh, H., Lysyanskaya, A. (eds.) CRYPTO\u00a02023, Part\u00a0IV. LNCS, vol. 14084, pp. 330\u2013361. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-38551-3_11","DOI":"10.1007\/978-3-031-38551-3_11"},{"key":"9_CR26","unstructured":"Dimeo, A., Gohla, F., Go\u00dfen, D., Lockenvitz, N.: SoK: multi-device secure instant messaging. Cryptology ePrint Archive, Report 2021\/498 (2021). https:\/\/eprint.iacr.org\/2021\/498"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Katz, J., Lindell, Y.: Introduction to Modern Cryptography, Second Edition. CRC Press (2014)","DOI":"10.1201\/b17668"},{"key":"9_CR28","doi-asserted-by":"crossref","unstructured":"Krawczyk, H., Bellare, M., Canetti, R.: RFC 2104: HMAC: keyed-hashing for message authentication (1997). https:\/\/datatracker.ietf.org\/doc\/html\/rfc2104","DOI":"10.17487\/rfc2104"},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"Krawczyk, H., Eronen, P.: RFC 5869: HMAC-based extract-and-expand key derivation function (HKDF) (2010). https:\/\/datatracker.ietf.org\/doc\/html\/rfc5869","DOI":"10.17487\/rfc5869"},{"key":"9_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1007\/978-3-642-14623-7_34","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"H Krawczyk","year":"2010","unstructured":"Krawczyk, H.: Cryptographic extraction and key derivation: the HKDF scheme. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 631\u2013648. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14623-7_34"},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed-hashing for message authentication. IETF Internet Request for Comments 2104 (1997)","DOI":"10.17487\/rfc2104"},{"key":"9_CR32","unstructured":"Lawlor, S., Lewi, K.: Deploying key transparency at WhatsApp (2023). https:\/\/engineering.fb.com\/2023\/04\/13\/security\/whatsapp-key- transparency\/"},{"key":"9_CR33","unstructured":"Lewi, K., Kim, W., Maykov, I., Weis, S.: Securing update propagation with homomorphic hashing. Cryptology ePrint Archive, Report 2019\/227 (2019). https:\/\/eprint.iacr.org\/2019\/227"},{"key":"9_CR34","doi-asserted-by":"crossref","unstructured":"Malvai, H., et al.: Parakeet: practical key transparency for end-to-end encrypted messaging. In: NDSS\u00a02023. The Internet Society (2023)","DOI":"10.14722\/ndss.2023.24545"},{"key":"9_CR35","unstructured":"Marlinspike, M.: Private group messaging (2014). https:\/\/signal.org\/blog\/private-groups\/"},{"key":"9_CR36","unstructured":"Marlinspike, M.: The double ratchet algorithm, revision 1 (2016). https:\/\/signal.org\/docs\/specifications\/doubleratchet\/"},{"key":"9_CR37","unstructured":"Marlinspike, M.: The X3DH key agreement protocol, revision 1 (2016). https:\/\/signal.org\/docs\/specifications\/x3dh\/"},{"key":"9_CR38","unstructured":"Marlinspike, M.: The sesame algorithm: session management for asynchronous message encryption, revision 2 (2017). https:\/\/signal.org\/docs\/specifications\/sesame\/"},{"key":"9_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-44586-2_8","volume-title":"Public Key Cryptography","author":"T Okamoto","year":"2001","unstructured":"Okamoto, T., Pointcheval, D.: The gap-problems: a new class of problems for the security of cryptographic schemes. In: Kim, K. (ed.) PKC 2001. LNCS, vol. 1992, pp. 104\u2013118. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44586-2_8"},{"key":"9_CR40","unstructured":"Perrin, T.: The XEdDSA and VXEdDSA signature schemes, revision 1 (2016). https:\/\/signal.org\/docs\/specifications\/xeddsa\/"},{"key":"9_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-030-75539-3_7","volume-title":"Topics in Cryptology \u2013 CT-RSA 2021","author":"B Poettering","year":"2021","unstructured":"Poettering, B., R\u00f6sler, P., Schwenk, J., Stebila, D.: SoK: game-based security models for group key exchange. In: Paterson, K.G. (ed.) CT-RSA 2021. LNCS, vol. 12704, pp. 148\u2013176. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-75539-3_7"},{"key":"9_CR42","doi-asserted-by":"publisher","unstructured":"Rogaway, P.: Authenticated-encryption with associated-data. In: Atluri, V. (ed.) ACM CCS 2002, pp. 98\u2013107. ACM Press (2002). https:\/\/doi.org\/10.1145\/586110.586125","DOI":"10.1145\/586110.586125"},{"key":"9_CR43","doi-asserted-by":"publisher","unstructured":"R\u00f6sler, P., Mainka, C., Schwenk, J.: More is less: on the end-to-end security of group chats in signal, WhatsApp, and Threema. In: 2018 IEEE European Symposium on Security and Privacy, pp. 415\u2013429. IEEE Computer Society Press (2018). https:\/\/doi.org\/10.1109\/EuroSP.2018.00036","DOI":"10.1109\/EuroSP.2018.00036"},{"key":"9_CR44","doi-asserted-by":"crossref","unstructured":"Saint-Andre, P.: RFC 6120: extensible messaging and presence protocol (XMPP): core (2011). https:\/\/datatracker.ietf.org\/doc\/html\/rfc6120","DOI":"10.17487\/rfc6120"},{"key":"9_CR45","doi-asserted-by":"crossref","unstructured":"Saint-Andre, P.: RFC 6120: extensible messaging and presence protocol (XMPP): instant messaging and presence (2011). https:\/\/datatracker.ietf.org\/doc\/html\/rfc6121","DOI":"10.17487\/rfc6121"},{"key":"9_CR46","unstructured":"National Institute of Standards and Technology: Secure hash standard, NIST FIPS PUB 180\u20132., Department of Commerce, U.S (2002)"},{"key":"9_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/11535218_19","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"S Vaudenay","year":"2005","unstructured":"Vaudenay, S.: Secure communications over insecure channels based on short authenticated strings. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 309\u2013326. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11535218_19"},{"key":"9_CR48","unstructured":"WhatsApp LLC: WhatsApp encryption overview, version 6 (2023). https:\/\/whatsapp.com\/security\/WhatsApp-Security- Whitepaper.pdf"},{"key":"9_CR49","unstructured":"WhatsApp LLC: WhatsApp key transparency overview (2023). https:\/\/www.whatsapp.com\/security\/WhatsApp-Key-Transparency- Whitepaper.pdf"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 EUROCRYPT 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-91101-9_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,27]],"date-time":"2025-04-27T21:14:29Z","timestamp":1745788469000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-91101-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031911002","9783031911019"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-91101-9_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"28 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EUROCRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Annual International Conference on the Theory and Applications of Cryptographic Techniques","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Madrid","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 May 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 May 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"44","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eurocrypt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eurocrypt.iacr.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}