{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T19:57:30Z","timestamp":1760299050365,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319140537"},{"type":"electronic","value":"9783319140544"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-14054-4_6","type":"book-chapter","created":{"date-parts":[[2014,12,10]],"date-time":"2014-12-10T03:39:19Z","timestamp":1418182759000},"page":"79-92","source":"Crossref","is-referenced-by-count":4,"title":["Blinded Diffie-Hellman"],"prefix":"10.1007","author":[{"given":"Duncan","family":"Garrett","sequence":"first","affiliation":[]},{"given":"Michael","family":"Ward","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/3-540-48892-8_26","volume-title":"Selected Areas in Cryptography","author":"S. Blake-Wilson","year":"1999","unstructured":"Blake-Wilson, S., Menezes, A.: Authenticated Diffie-Hellman key agreement protocols. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol.\u00a01556, pp. 339\u2013361. Springer, Heidelberg (1999)"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1007\/BFb0024447","volume-title":"Cryptography and Coding","author":"S. Blake-Wilson","year":"1997","unstructured":"Blake-Wilson, S., Johnson, D., Menezes, A.: Key agreement protocols and their security analysis. In: Darnell, M. (ed.) Cryptography and Coding 1997. LNCS, vol.\u00a01355, pp. 30\u201345. Springer, Heidelberg (1997)"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Brzuska, C., Smart, N.P., Warinschi, B., Watson, G.: An Analysis of the EMV Channel Establishment Protocol. In: ACM CCS 2013, pp. 373\u2013386. ACM (2013)","DOI":"10.1145\/2508859.2516748"},{"issue":"Special Issue A","key":"6_CR4","first-page":"148","volume":"17","author":"S. Blackburn","year":"2014","unstructured":"Blackburn, S., Scott, S.: The discrete logarithm problem for exponents of bounded height. J. Computation and Mathematics\u00a017(Special Issue A), 148\u2013156 (2014)","journal-title":"J. Computation and Mathematics"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/3-540-44987-6_28","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"R. Canetti","year":"2001","unstructured":"Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 453\u2013474. Springer, Heidelberg (2001)"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Dagdelen, O., Fischlin, M., Gagliardoni, T., Marson, G.A., Mittelbach, A., Onete, C.: A Cryptographic Analysis of OPACITY (2013), \n                      http:\/\/www.iacr.org\/2013\/234","DOI":"10.1007\/978-3-642-40203-6_20"},{"key":"6_CR7","unstructured":"EMVCo: EMV ECC Key Establishment Protocols. Draft, 1st edn. (2012), \n                      http:\/\/www.emvco.com\/specifications.aspx?id=243"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Goldberg, G., Stebila, S., Ustaoglu, B.: Anonymity and one-way authentication. In: Key Exchange Protocols. Designs, Codes and Cryptography, vol.\u00a067(2), pp. 245\u2013269 (May 2013)","DOI":"10.1007\/s10623-011-9604-z"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/11593447_30","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"C. Kudla","year":"2005","unstructured":"Kudla, C., Paterson, K.G.: Modular security proofs for key agreement protocols. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol.\u00a03788, pp. 549\u2013565. Springer, Heidelberg (2005)"},{"key":"6_CR10","unstructured":"Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer (2004) ISBN 0-387-95273-X"},{"key":"6_CR11","unstructured":"Law, L., Menezes, A., Qu, M., Solinas, J., Vanstone, S.: An efficient protocol for authenti-cated key agreement, Dept. C & Q, Univ. of Waterloo, CORR 98-05 (1998)"},{"key":"6_CR12","unstructured":"Menezes, A., Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press (1997)"},{"key":"6_CR13","unstructured":"IEEE P1363: A standard for RSA, Diffie-Hellman, and Elliptic-Curve cryptography (1999)"},{"key":"6_CR14","unstructured":"IETF RFC 2631, Diffie-Hellman Key Agreement Method (June 1999)"},{"key":"6_CR15","unstructured":"IETF RFC 4492, Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) (2006)"},{"key":"6_CR16","unstructured":"Certicom Research, Standards for Efficient Cryptography (2000)"},{"key":"6_CR17","unstructured":"NIST Special Publication 800-38B, Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication (May 2005)"},{"key":"6_CR18","unstructured":"NIST Special Publication 800-56A, Recommendation for Pair-Wise Key Estab-lishment Schemes Using Discrete Logarithm Cryptography (Revised) (March 2007)"},{"key":"6_CR19","unstructured":"NIST Special Publication 800-56C, Recommendation for Key Derivation through Extraction-then-Expansion (November 2011)"},{"key":"6_CR20","unstructured":"NIST Special Publication 800-108, Recommendation for Key Derivation using Pseudorandom Functions (Revised) (October 2009)"},{"key":"6_CR21","unstructured":"ANSI X9.63, Public Key Cryptography for the Financial Services Industry Key Agreement and Key Transport Using Elliptic Curve Cryptography (2011)"},{"key":"6_CR22","unstructured":"ISO\/IEC 9797-1: Information technology \u2014 Security techniques \u2014 Message authentication codes \u2014 Part 1: Mechanisms using a block cipher (2011)"},{"key":"6_CR23","unstructured":"ISO\/IEC 11770-3: Information technology \u2014 Security techniques \u2014 Key management \u2014 Part 3: Mechanisms using asymmetric techniques (2008)"},{"key":"6_CR24","unstructured":"ISO\/IEC CD 11770-6. Information technology \u2014 Security techniques \u2014 Key management \u2014 Part 6: Key derivation"},{"key":"6_CR25","unstructured":"ISO\/IEC 14888-3: Information technology \u2014 Security techniques \u2014 Digital signatures with appendix \u2014 Part 3: Discrete logarithm based mechanisms (2006)"},{"key":"6_CR26","unstructured":"ISO\/IEC 15946-1: Information technology \u2014 Security techniques \u2014 Cryptographic techniques based on elliptic curves (2008)"},{"key":"6_CR27","unstructured":"ISO\/IEC 18033-2: Information technology \u2014 Security techniques \u2014 Encryption algorithms \u2014 Part 2: Asymmetric ciphers (2006)"},{"key":"6_CR28","unstructured":"ISO\/IEC CD 18370-1. Information technology \u2014 Security techniques \u2014 Blind digital signatures \u2014 Part 1: General"},{"key":"6_CR29","unstructured":"ISO\/IEC 19772: Information technology \u2014 Security techniques \u2014 Authenticated Encryption (2009)"},{"key":"6_CR30","unstructured":"ISO\/IEC 20008-1: Information technology \u2014 Security techniques \u2014 Anonymous digital signatures \u2014 Part 1: General (2013)"},{"key":"6_CR31","unstructured":"ISO\/IEC 20009-1: Information technology \u2014 Security techniques \u2014 Anonymous entity authentication \u2014 Part 1: General (2013)"}],"container-title":["Lecture Notes in Computer Science","Security Standardisation Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-14054-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T12:37:42Z","timestamp":1676637462000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-14054-4_6"}},"subtitle":["Preventing Eavesdroppers from Tracking Payments"],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319140537","9783319140544"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-14054-4_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}