{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T23:40:08Z","timestamp":1746402008524,"version":"3.40.4"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319124742"},{"type":"electronic","value":"9783319124759"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12475-9_25","type":"book-chapter","created":{"date-parts":[[2014,10,1]],"date-time":"2014-10-01T09:25:19Z","timestamp":1412155519000},"page":"334-341","source":"Crossref","is-referenced-by-count":1,"title":["Deniable Version of SIGMA Key Exchange Protocol Resilient to Ephemeral Key Leakage"],"prefix":"10.1007","author":[{"given":"\u0141ukasz","family":"Krzywiecki","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","unstructured":"Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol. RFC 2401 (Proposed Standard,) Obsoleted by RFC 4301, updated by RFC 3168 (November 1998)"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Harkins, D., Carrel, D.: The Internet Key Exchange (IKE). RFC 2409 (Proposed Standard), Obsoleted by RFC 4306, updated by RFC 4109 (November 1998)","DOI":"10.17487\/rfc2409"},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"Raimondo, M.D., Gennaro, R., Krawczyk, H.: Deniable authentication and key exchange. In: Juels, A., Wright, R.N., di Vimercati, S.D.C. (eds.) ACM Conference on Computer and Communications Security, pp. 400\u2013409. ACM (2006)","DOI":"10.1145\/1180405.1180454"},{"key":"25_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/3-540-44987-6_28","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"R. Canetti","year":"2001","unstructured":"Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 453\u2013474. Springer, Heidelberg (2001)"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Krawczyk, H.: Skeme: a versatile secure key exchange mechanism for internet. In: Ellis, J.T., Neuman, B.C., Balenson, D.M. (eds.) NDSS, pp. 114\u2013127. IEEE Computer Society (1996)","DOI":"10.1109\/NDSS.1996.492418"},{"key":"25_CR6","first-page":"120","volume":"2002","author":"R. Canetti","year":"2002","unstructured":"Canetti, R., Krawczyk, H.: Security analysis of ike\u2019s signature-based key-exchange protocol. IACR Cryptology ePrint Archive\u00a02002, 120 (2002)","journal-title":"IACR Cryptology ePrint Archive"},{"key":"25_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/978-3-540-24582-7_20","volume-title":"Progress in Cryptology - INDOCRYPT 2003","author":"J. Herranz","year":"2003","unstructured":"Herranz, J., S\u00e1ez, G.: Forking lemmas for ring signature schemes. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol.\u00a02904, pp. 266\u2013279. Springer, Heidelberg (2003)"},{"key":"25_CR8","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1145\/276698.276853","volume-title":"Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, STOC 1998","author":"C. Dwork","year":"1998","unstructured":"Dwork, C., Naor, M., Sahai, A.: Concurrent zero-knowledge. In: Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, STOC 1998, pp. 409\u2013418. ACM, New York (1998)"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Kumar, S., Agrawal, S., Venkatesan, R., Lokam, S.V., Rangan, C.P.: Forcing out a confession - threshold discernible ring signatures. In: Katsikas, S.K., Samarati, P. (eds.) SECRYPT, pp. 379\u2013388. SciTePress (2010)","DOI":"10.5220\/0002984203790388"},{"key":"25_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-75670-5_1","volume-title":"Provable Security","author":"B. LaMacchia","year":"2007","unstructured":"LaMacchia, B., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol.\u00a04784, pp. 1\u201316. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Provable Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12475-9_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T23:13:40Z","timestamp":1746400420000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-12475-9_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319124742","9783319124759"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12475-9_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}