{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T03:10:04Z","timestamp":1746414604419,"version":"3.40.4"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319116976"},{"type":"electronic","value":"9783319116983"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11698-3_33","type":"book-chapter","created":{"date-parts":[[2014,10,9]],"date-time":"2014-10-09T05:18:13Z","timestamp":1412831893000},"page":"435-447","source":"Crossref","is-referenced-by-count":3,"title":["eCK Secure Single Round ID-Based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy"],"prefix":"10.1007","author":[{"given":"Tapas","family":"Pandit","sequence":"first","affiliation":[]},{"given":"Rana","family":"Barua","sequence":"additional","affiliation":[]},{"given":"Somanath","family":"Tripathy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","doi-asserted-by":"crossref","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: A modular approach to the design and analysis of authentication and key exchange protocols. In: ACM Symposium on Theory of Computing, pp. 419\u2013428 (1998)","DOI":"10.1145\/276698.276854"},{"key":"33_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/3-540-46035-7_22","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"R. Canetti","year":"2002","unstructured":"Canetti, R., Krawczyk, H.: Universally Composable Notions of Key Exchange and Secure Channels. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 337\u2013351. Springer, Heidelberg (2002)"},{"issue":"6","key":"33_CR3","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inform. Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"33_CR4","doi-asserted-by":"crossref","unstructured":"Huang, H., Cao, Z.: An ID-based Authenticated Key Exchange Protocol Based on Bilinear Diffie-Hellman Problem. Cryptology ePrint Archive, Report 2008\/224 (2008)","DOI":"10.1145\/1533057.1533101"},{"key":"33_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/10722028_23","volume-title":"Algorithmic Number Theory","author":"A. Joux","year":"2000","unstructured":"Joux, A.: A one round protocol for tripartite Diffie-Hellman. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol.\u00a01838, pp. 385\u2013394. Springer, Heidelberg (2000)"},{"key":"33_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-75670-5_1","volume-title":"Provable Security","author":"B. LaMacchia","year":"2007","unstructured":"LaMacchia, B., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol.\u00a04784, pp. 1\u201316. Springer, Heidelberg (2007)"},{"key":"33_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"issue":"13","key":"33_CR8","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1049\/el:20020387","volume":"38","author":"N.P. Smart","year":"2002","unstructured":"Smart, N.P.: Identity-based authenticated key agreement protocol based on Weil pairing. Electronics Lett.\u00a038(13), 630\u2013632 (2002)","journal-title":"Electronics Lett."},{"issue":"2","key":"33_CR9","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.compeleceng.2011.03.001","volume":"37","author":"L. Ni","year":"2011","unstructured":"Ni, L., Chen, G., Li, J., Hao, Y.: Strongly secure identity-based authenticated key agreement protocols. Comput. Electr. Eng.\u00a037(2), 205\u2013217 (2011)","journal-title":"Comput. Electr. Eng."},{"issue":"3","key":"33_CR10","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1016\/j.ins.2008.09.020","volume":"179","author":"S. Wang","year":"2009","unstructured":"Wang, S., Cao, Z., Choo, K.R., Wang, L.: An improved identity-based key agreement protocol and its security proof. Inf. Sci.\u00a0179(3), 307\u2013318 (2009)","journal-title":"Inf. Sci."},{"key":"33_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-540-75496-1_14","volume-title":"Information Security","author":"S.S.M. Chow","year":"2007","unstructured":"Chow, S.S.M., Choo, K.-K.R.: Strongly-secure identity-based key agreement and anonymous extension. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol.\u00a04779, pp. 203\u2013220. Springer, Heidelberg (2007)"},{"issue":"4","key":"33_CR12","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s10207-006-0011-9","volume":"6","author":"L. Chen","year":"2007","unstructured":"Chen, L., Cheng, Z., Smart, N.P.: Identity-based key agreement protocols from pairings. Int. J. Info. Secur.\u00a06(4), 213\u2013241 (2007)","journal-title":"Int. J. Info. Secur."},{"key":"33_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1007\/978-3-540-30574-3_18","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"N. McCullagh","year":"2005","unstructured":"McCullagh, N., Barreto, P.S.L.M.: A new two-party identity-based authenticated key agreement. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol.\u00a03376, pp. 262\u2013274. Springer, Heidelberg (2005)"},{"key":"33_CR14","doi-asserted-by":"crossref","unstructured":"Chen, L., Kudla, C.: Identity based authenticated key agreement protocols from pairings. In: Proceedings of the 16th IEEE Computer Security Foundations Workshop, pp. 219\u2013233. IEEE Computer Society Press (2003)","DOI":"10.1109\/CSFW.2003.1212715"},{"key":"33_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"33_CR16","unstructured":"Wang, Y.: Efficient identity-based and authenticated key agreement protocol. Cryptology ePrint archive, report 2005\/108, http:\/\/eprint.iacr.org\/2005\/108"},{"key":"33_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/978-3-642-17455-1_12","volume-title":"Pairing-Based Cryptography - Pairing 2010","author":"A. Fujioka","year":"2010","unstructured":"Fujioka, A., Suzuki, K., Ustao\u011flu, B.: Ephemeral Key Leakage Resilient and Efficient ID-AKEs That Can Share Identities, Private and Master Keys. In: Joye, M., Miyaji, A., Otsuka, A. (eds.) Pairing 2010. LNCS, vol.\u00a06487, pp. 187\u2013205. Springer, Heidelberg (2010)"},{"key":"33_CR18","doi-asserted-by":"crossref","unstructured":"Fujioka, A., Hoshino, F., Kobayashi, T., Suzuki, K., Ustaoglu, B., Yoneyama, K.: id-eCK Secure ID-Based Authenticated Key Exchange on Symmetric and Asymmetric Pairing. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences\u00a0E96\u2013A(6), 1139\u20131155","DOI":"10.1587\/transfun.E96.A.1139"},{"key":"33_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/978-3-540-24660-2_9","volume-title":"Topics in Cryptology \u2013 CT-RSA 2004","author":"B. Libert","year":"2004","unstructured":"Libert, B., Quisquater, J.J.: Identity based undeniable signatures. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol.\u00a02964, pp. 112\u2013125. Springer, Heidelberg (2004)"},{"key":"33_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-642-24316-5_28","volume-title":"Provable Security","author":"H. Huang","year":"2011","unstructured":"Huang, H.: Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security. In: Boyen, X., Chen, X. (eds.) ProvSec 2011. LNCS, vol.\u00a06980, pp. 389\u2013397. Springer, Heidelberg (2011)"},{"key":"33_CR21","unstructured":"Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing. In: Symposium on Cryptography and Information Security, Okinawa, Japan (2000)"},{"key":"33_CR22","unstructured":"Cremers, C., Feltz, M.: One-round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability. Cryptology ePrint Archive, Report 2011\/300 (2011)"},{"key":"33_CR23","doi-asserted-by":"crossref","unstructured":"Cremers, C.: Examining Indistinguishability-Based Security Models for Key Exchange Protocols: The case of CK, CK-HMQV, and eCK. In: Proceedings of the ASIACCS, pp. 80\u201391 (2011)","DOI":"10.1145\/1966913.1966925"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11698-3_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T02:37:19Z","timestamp":1746412639000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11698-3_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319116976","9783319116983"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11698-3_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}