{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T23:48:25Z","timestamp":1725839305266},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319260587"},{"type":"electronic","value":"9783319260594"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26059-4_8","type":"book-chapter","created":{"date-parts":[[2015,11,27]],"date-time":"2015-11-27T11:59:56Z","timestamp":1448625596000},"page":"149-166","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction"],"prefix":"10.1007","author":[{"given":"Suvradip","family":"Chakraborty","sequence":"first","affiliation":[]},{"given":"Goutam","family":"Paul","sequence":"additional","affiliation":[]},{"given":"C. Pandu","family":"Rangan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,28]]},"reference":[{"issue":"6","key":"8_CR1","doi-asserted-by":"crossref","first-page":"817","DOI":"10.3233\/JCS-130472","volume":"21","author":"D Basin","year":"2013","unstructured":"Basin, D., Cremers, C., Meier, S.: Provably repairing the iso\/iec 9798 standard for entity authentication. J. Comput. Secur. 21(6), 817\u2013846 (2013)","journal-title":"J. Comput. Secur."},{"key":"8_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1007\/3-540-46766-1_3","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"RS Bird","year":"1992","unstructured":"Bird, R.S., Gopal, I., Herzberg, A., Janson, P., Kutten, S., Molva, R., Yung, M.: Systematic design of two-party authentication protocols. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 44\u201361. Springer, Heidelberg (1992)"},{"issue":"19","key":"8_CR3","doi-asserted-by":"publisher","first-page":"3995","DOI":"10.1016\/j.ins.2007.03.024","volume":"177","author":"JK Byun","year":"2007","unstructured":"Byun, J.K., Lee, D.H., Lim, J.I.: Ec2c-paka: An efficient client-to-client password-authenticated key agreement. Inf. Sci. 177(19), 3995\u20134013 (2007)","journal-title":"Inf. Sci."},{"issue":"6","key":"8_CR4","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1049\/ip-e.1990.0054","volume":"137","author":"C Boyd","year":"1990","unstructured":"Boyd, C.: Hidden assumptions in cryptographic protocols. IEE Proc. E (Comput. Digital Tech.) 137(6), 433\u2013436 (1990)","journal-title":"IEE Proc. E (Comput. Digital Tech.)"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/3-540-48329-2_21","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"M Bellare","year":"1994","unstructured":"Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232\u2013249. Springer, Heidelberg (1994)"},{"issue":"4","key":"8_CR6","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/TDSC.2007.70226","volume":"4","author":"H-Y Chien","year":"2007","unstructured":"Chien, H.-Y.: Sasi: A new ultralightweight rfid authentication protocol providing strong authentication and strong integrity. IEEE Trans. Dependable Secure Comput. 4(4), 337\u2013340 (2007)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"8_CR7","unstructured":"Clark, J.A., Jacob, J.L.: A survey of authentication protocol literature: Version 1.0. (1997)"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/3-540-44987-6_28","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"R Canetti","year":"2001","unstructured":"Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453\u2013474. Springer, Heidelberg (2001)"},{"issue":"2","key":"8_CR9","first-page":"397","volume":"36","author":"T Cao","year":"2008","unstructured":"Cao, T., Lei, H.: Privacy-enhancing authenticated key agreement protocols based on elliptic curve cryptosystem. Acta Electronica Sinica 36(2), 397 (2008)","journal-title":"Acta Electronica Sinica"},{"issue":"4","key":"8_CR10","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/s11767-006-0259-2","volume":"25","author":"H Cheng","year":"2008","unstructured":"Cheng, H., Yang, G.: Ekaes: An efficient key agreement and encryption scheme for wireless sensor networks. J. Electron. (China) 25(4), 495\u2013502 (2008)","journal-title":"J. Electron. (China)"},{"issue":"6","key":"8_CR11","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-642-29011-4_22","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2012","author":"Y Dodis","year":"2012","unstructured":"Dodis, Y., Kiltz, E., Pietrzak, K., Wichs, D.: Message authentication, revisited. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 355\u2013374. Springer, Heidelberg (2012)"},{"issue":"2","key":"8_CR13","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/BF00124891","volume":"2","author":"W Diffie","year":"1992","unstructured":"Diffie, W., Van Oorschot, P.C., Wiener, M.J.: Authentication and authenticated key exchanges. Des. Codes Crypt. 2(2), 107\u2013125 (1992)","journal-title":"Des. Codes Crypt."},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Gong, L., Needham, R., Yahalom, R.: Reasoning about belief in cryptographic protocols. In: Proceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 234\u2013248. IEEE (1990)","DOI":"10.1109\/RISP.1990.63854"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/3-540-46885-4_5","volume-title":"Advances in Cryptology - EUROCRYPT \u201989","author":"CG G\u00fcnther","year":"1990","unstructured":"G\u00fcnther, C.G.: An identity-based key-exchange protocol. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 29\u201337. Springer, Heidelberg (1990)"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/978-3-540-24852-1_16","volume-title":"Applied Cryptography and Network Security","author":"IR Jeong","year":"2004","unstructured":"Jeong, I.R., Katz, J., Lee, D.-H.: One-round protocols for two-party authenticated key exchange. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 220\u2013232. Springer, Heidelberg (2004)"},{"key":"8_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1007\/11535218_33","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"H Krawczyk","year":"2005","unstructured":"Krawczyk, H.: HMQV: a high-performance secure Diffie-Hellman protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546\u2013566. Springer, Heidelberg (2005)"},{"issue":"6","key":"8_CR18","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1016\/j.csi.2007.04.002","volume":"29","author":"L Rongxing","year":"2007","unstructured":"Rongxing, L., Cao, Z., Zhu, H.: An enhanced authenticated key agreement protocol for wireless mobile communication. Comput. Stand. Interfaces 29(6), 647\u2013652 (2007)","journal-title":"Comput. Stand. Interfaces"},{"key":"8_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-75670-5_1","volume-title":"Provable Security","author":"BA LaMacchia","year":"2007","unstructured":"LaMacchia, B.A., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 1\u201316. Springer, Heidelberg (2007)"},{"issue":"2","key":"8_CR20","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1023\/A:1022595222606","volume":"28","author":"L Law","year":"2003","unstructured":"Law, L., Menezes, A., Minghua, Q., Solinas, J., Vanstone, S.: An efficient protocol for authenticated key agreement. Des. Codes Crypt. 28(2), 119\u2013134 (2003)","journal-title":"Des. Codes Crypt."},{"key":"8_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-540-70500-0_5","volume-title":"Information Security and Privacy","author":"A Menezes","year":"2008","unstructured":"Menezes, A., Ustaoglu, B.: Comparing the pre- and post-specified peer models for key agreement. In: Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. LNCS, vol. 5107, pp. 53\u201368. Springer, Heidelberg (2008)"},{"issue":"12","key":"8_CR22","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"RM Needham","year":"1978","unstructured":"Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Commun. ACM 21(12), 993\u2013999 (1978)","journal-title":"Commun. ACM"},{"issue":"1","key":"8_CR23","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1145\/24592.24594","volume":"21","author":"D Otway","year":"1987","unstructured":"Otway, D., Rees, O.: Efficient and timely mutual authentication. ACM SIGOPS Operating Syst. Rev. 21(1), 8\u201310 (1987)","journal-title":"ACM SIGOPS Operating Syst. Rev."},{"issue":"5","key":"8_CR24","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/2.53351","volume":"23","author":"M Satyanarayanan","year":"1990","unstructured":"Satyanarayanan, M.: Scalable, secure, and highly available distributed file access. Computer 23(5), 9\u201318 (1990)","journal-title":"Computer"},{"key":"8_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-3-642-15317-4_15","volume-title":"Security and Cryptography for Networks","author":"AP Sarr","year":"2010","unstructured":"Sarr, A.P., Elbaz-Vincent, P., Bajard, J.-C.: A new security model for authenticated key agreement. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 219\u2013234. Springer, Heidelberg (2010)"},{"key":"8_CR26","unstructured":"Shoup, V.: On formal models for secure key exchange. Citeseer (1999)"},{"issue":"3","key":"8_CR27","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/s10623-007-9159-1","volume":"46","author":"B Ustaoglu","year":"2008","unstructured":"Ustaoglu, B.: Obtaining a secure and efficient key agreement protocol from (h) mqv and naxos. Des. Codes Crypt. 46(3), 329\u2013342 (2008)","journal-title":"Des. Codes Crypt."}],"container-title":["Lecture Notes in Computer Science","Provable Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26059-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T14:32:55Z","timestamp":1559313175000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26059-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319260587","9783319260594"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26059-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"28 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}