{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:32:45Z","timestamp":1760239965757,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032079008","type":"print"},{"value":"9783032079015","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T00:00:00Z","timestamp":1760227200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T00:00:00Z","timestamp":1760227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-07901-5_13","type":"book-chapter","created":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:30:06Z","timestamp":1760185806000},"page":"253-273","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Fine-Grained, Privacy-Augmenting LI-Compliance in\u00a0the\u00a0LAKE Standard"],"prefix":"10.1007","author":[{"given":"Pascal","family":"Lafourcade","sequence":"first","affiliation":[]},{"given":"Elsa","family":"L\u00f3pez P\u00e9rez","sequence":"additional","affiliation":[]},{"given":"Charles","family":"Olivier-Anclin","sequence":"additional","affiliation":[]},{"given":"Cristina","family":"Onete","sequence":"additional","affiliation":[]},{"given":"Cl\u00e9ment","family":"Papon","sequence":"additional","affiliation":[]},{"given":"Mali\u0161a","family":"Vu\u010dini\u0107","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,12]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Abelson, H., et al.: Keys under doormats. Comms. ACM 58(10), 24\u201326 (2015)","DOI":"10.1145\/2814825"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Arfaoui, G., et al.: How to (legally) keep secrets from mobile operators. In: Proceedings of ESORICS, pp. 23\u201343 (2021)","DOI":"10.1007\/978-3-030-88418-5_2"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rivest, R.L.: Translucent cryptography - an alternative to key escrow, and its implementation via fractional oblivious transfer. J. Cryptol. 12(2), 117\u2013139 (1999)","DOI":"10.1007\/PL00003819"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Boeira, F., Asplund, M., Barcellos, M.: Provable non-frameability for 5G lawful interception. In: Proceedings of WiSec, pp. 109 \u2013 120 (2023)","DOI":"10.1145\/3558482.3581780"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Bultel, X., Onete, C.: Pairing-free secure-channel establishment in mobile networks with fine-grained lawful interception. In: Proceedings of ACM SAC, pp. 968\u2013970 (2022)","DOI":"10.1145\/3477314.3507202"},{"key":"13_CR6","unstructured":"Global\u00a0Encryption Coalition. Joint statement on the dangers of the may 2024 council of the EU comrpomise proposal on EU CSAM (2024)"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Cottier, B., Pointcheval, D.: Security analysis of the edhoc protocol (2022)","DOI":"10.1007\/978-3-031-30122-3_1"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Cottier, B., Pointcheval, D.: Security analysis of improved edhoc protocol. In: Foundations and Practice of Security (2023)","DOI":"10.1007\/978-3-031-30122-3_1"},{"key":"13_CR9","unstructured":"EU Council. Resolution on security through encryption and security despite encryption (2020)"},{"key":"13_CR10","unstructured":"FairTrials. Short update: Police in germany defend the use of contact tracing for criminal investigations (2020)"},{"key":"13_CR11","unstructured":"Franceschi-Bicchierai, L.:The 10 biggest revelations from edward snowden\u2019s leaks (2014)"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"G\u00fcnther, F., Mukendi, M.L.T.: Careful with mac-then-sign: A computational analysis of the edhoc lightweight authenticated key exchange protocol. In: IEEE (EuroS &P), pp. 773\u2013796 (2023)","DOI":"10.1109\/EuroSP57164.2023.00051"},{"issue":"7","key":"13_CR13","doi-asserted-by":"publisher","first-page":"11381","DOI":"10.1109\/JIOT.2023.3329703","volume":"11","author":"X He","year":"2024","unstructured":"He, X., Li, L., Peng, H.: A key escrow-free kp-abe scheme and its application in standalone authentication in iot. IEEE Internet Things J. 11(7), 11381\u201311394 (2024)","journal-title":"IEEE Internet Things J."},{"key":"13_CR14","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1049\/cds2.12110","volume":"16","author":"X Hu","year":"2022","unstructured":"Hu, X., Li, X., Zheng, X., Liu, Y., Xiong, X.: A high speed processor for elliptic curve cryptography over nist prime field. IET Circ. Dev. Syst. 16, 350\u2013359 (2022)","journal-title":"IET Circ. Dev. Syst."},{"key":"13_CR15","doi-asserted-by":"publisher","first-page":"32","DOI":"10.3390\/info15010032","volume":"15","author":"Meijuan Huang","year":"2024","unstructured":"Huang, Meijuan, Liu, Yutian, Yang, Bo., Zhao, Yanqi, Zhang, Mingrui: Efficient revocable attribute-based encryption with data integrity and key escrow-free. Information 15, 32 (2024)","journal-title":"Information"},{"key":"13_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110518","volume":"249","author":"I Huso","year":"2024","unstructured":"Huso, I., Olivieri, M., Galgano, L., Rashid, A., Piro, G., Boggia, G.: Design and implementation of a looking-forward lawful interception architecture for future mobile communication systems. Comput. Netw. 249, 110518 (2024)","journal-title":"Comput. Netw."},{"key":"13_CR17","first-page":"5881","volume":"23","author":"C Jacomme","year":"2023","unstructured":"Jacomme, C., Klein, E., Kremer, S., Racouchot, M.: A comprehensive, formal and automated analysis of the EDHOC protocol. USENIX Sec. 23, 5881\u20135898 (2023)","journal-title":"USENIX Sec."},{"key":"13_CR18","unstructured":"Januzelli, J., Xu, J.: A complete characterization of one-more assumptions in the algebraic group model. Cryptology ePrint Archive, Paper 2024\/1954 (2024)"},{"key":"13_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1007\/978-3-540-45146-4_24","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"H Krawczyk","year":"2003","unstructured":"Krawczyk, H.: SIGMA: the \u201cSIGn-and-MAc\u2019\u2019 approach to authenticated diffie-hellman and its use in the IKE protocols. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 400\u2013425. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45146-4_24"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Krawczyk, H., Eronen, P.: HMAC-based Extract-and-Expand Key Derivation Function (HKDF). RFC 5869 (May 2010)","DOI":"10.17487\/rfc5869"},{"key":"13_CR21","unstructured":"Lafourcade, P., et al.:Fine-grained, privacy-augmenting li-compliance in the lake standard (full version) (2025). https:\/\/hal.science\/hal-05126079"},{"key":"13_CR22","unstructured":"L\u00f3pez P\u00e9rez, E., Watteyne, T., Marin-Lopez, R., Onete, C., Vu\u010dini\u0107, M.: Pre-shared key authentication with edhoc: The security-performance tradeoff. awaiting for publication (2025)"},{"key":"13_CR23","unstructured":"L\u00f3pez P\u00e9rez, E., Selander, I.G., Mattsson, J.P., Watteyne, T., Vu\u010dini\u0107, M.: An overview of security analysis, Edhoc is a new security handshake standard (2024)"},{"key":"13_CR24","unstructured":"379 scientists and researchers\u00a0from 36\u00a0countries. Open letter on the position of scientists and researchers on the updated version of the EU\u2019s proposed Child Sexual Abuse Regulation (2024)"},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"Selander, G.., Preuss Mattsson, J., Palombini, F.: Ephemeral Diffie-Hellman over COSE (EDHOC). RFC 9528 (2024)","DOI":"10.17487\/RFC9528"},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Ungaro, G., Ricchitelli, F., Huso, I., Piro, G., Boggia, G.: Design and implementation of a lawful interception architecture for b5g systems based on key escrow. In: IEEE CSCN, pp. 207\u2013207 (2022)","DOI":"10.1109\/CSCN57023.2022.10050895"},{"key":"13_CR27","doi-asserted-by":"crossref","unstructured":"Wright, C., Varia, M.: Crypto crumple zones: enabling limited access without mass surveillance. In: Proceedings of EuroS &P, pp. 288\u2013306 (2018)","DOI":"10.1109\/EuroSP.2018.00028"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-07901-5_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:30:12Z","timestamp":1760185812000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-07901-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,12]]},"ISBN":["9783032079008","9783032079015"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-07901-5_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,12]]},"assertion":[{"value":"12 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toulouse","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.esorics2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}