{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T04:15:40Z","timestamp":1749701740457,"version":"3.41.0"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319490991"},{"type":"electronic","value":"9783319491004"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49100-4_9","type":"book-chapter","created":{"date-parts":[[2016,11,1]],"date-time":"2016-11-01T14:41:42Z","timestamp":1478011302000},"page":"205-226","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Attribute-Based Access Control Architectures with the eIDAS Protocols"],"prefix":"10.1007","author":[{"given":"Frank","family":"Morgner","sequence":"first","affiliation":[]},{"given":"Paul","family":"Bastian","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Fischlin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,2]]},"reference":[{"key":"9_CR1","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI): Advanced Security Mechanism for Machine Readable Travel Documents \u2013 Extended Access Control (EAC), Password Authenticated Connection Establishment (PACE), and Restricted Identification (RI). BSI-TR-03110, Version 2.0 (2008)"},{"key":"9_CR2","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI): Technical Guideline TR-03110-2: Advanced Security Mechanisms for Machine Readable Travel Documents and eIDAS Token, Part 2, Protocols for electronic IDentification, Authentication and trust Services (eIDAS). BSI-TR-03110, Version 2.20 (2015)"},{"key":"9_CR3","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI): Technical Guideline TR-03110-3: Advanced Security Mechanisms for Machine Readable Travel Documents and eIDAS Token, Part 3, Common Specifications. BSI-TR-03110, Version 2.20 (2015)"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 2001","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514\u2013532. Springer, Heidelberg (2001). doi: 10.1007\/3-540-45682-1_30"},{"key":"9_CR5","unstructured":"Morgner, F.: Transaktionsabsicherung mit der Online-Ausweisfunktion. Kryptographische Bindung von Transaktionsdaten an den Personalausweis. Presentation, CeBit 2014, March 2014"},{"key":"9_CR6","unstructured":"Bastian, P.: Physical Access Control Systems Using Asymmetric Cryptography, Master-Arbeit, Humboldt-Universit\u00e4t zu Berlin (2015)"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Bellare, M., Anand Desai, E., Jokipii, P.R.: A concrete security treatment of symmetric encryption. In: FOCS, pp. 394\u2013403. IEEE (1997)","DOI":"10.1109\/SFCS.1997.646128"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/3-540-48329-2_21","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 93","author":"M Bellare","year":"1994","unstructured":"Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232\u2013249. Springer, Heidelberg (1994). doi: 10.1007\/3-540-48329-2_21"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-642-32946-3_25","volume-title":"Financial Cryptography and Data Security","author":"J Bender","year":"2012","unstructured":"Bender, J., Dagdelen, \u00d6., Fischlin, M., K\u00fcgler, D.: The PACE $$|$$ | AA protocol for machine readable travel documents, and its security. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 344\u2013358. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-32946-3_25"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/978-3-642-33383-5_7","volume-title":"Information Security","author":"J Bender","year":"2012","unstructured":"Bender, J., Dagdelen, \u00d6., Fischlin, M., K\u00fcgler, D.: Domain-specific pseudonymous signatures for the German identity card. In: Gollmann, D., Freiling, F.C. (eds.) ISC 2012. LNCS, vol. 7483, pp. 104\u2013119. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-33383-5_7"},{"key":"9_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-642-04474-8_3","volume-title":"Information Security","author":"J Bender","year":"2009","unstructured":"Bender, J., Fischlin, M., K\u00fcgler, D.: Security analysis of the PACE key-agreement protocol. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 33\u201348. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-04474-8_3"},{"key":"9_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-319-03491-1_2","volume-title":"Trusted Systems","author":"J Bender","year":"2013","unstructured":"Bender, J., Fischlin, M., K\u00fcgler, D.: The PACE $$|$$ | CA protocol for machine readable travel documents. In: Bloem, R., Lipp, P. (eds.) INTRUST 2013. LNCS, vol. 8292, pp. 17\u201335. Springer, Heidelberg (2013). doi: 10.1007\/978-3-319-03491-1_2"},{"key":"9_CR13","unstructured":"Brzuska, C.: On the Foundations of Key Exchange. Dissertation, Technische Universit\u00e4t Darmstadt (2013). http:\/\/tuprints.ulb.tu-darmstadt.de\/id\/eprint\/3414"},{"issue":"4","key":"9_CR14","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/s10207-013-0192-y","volume":"12","author":"C Brzuska","year":"2013","unstructured":"Brzuska, C., Fischlin, M., Smart, N.P., Warinschi, B., Williams, S.C.: Less is more: relaxed yet composable security notions for key exchange. Int. J. Inf. Sec. 12(4), 267\u2013297 (2013)","journal-title":"Int. J. Inf. Sec."},{"key":"9_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-642-28368-0_15","volume-title":"Cryptography and Security: From Theory to Applications","author":"J-S Coron","year":"2012","unstructured":"Coron, J.-S., Gouget, A., Icart, T., Paillier, P.: Supplemental access control (PACE v2): security analysis of PACE integrated mapping. In: Naccache, D. (ed.) Cryptography and Security: From Theory to Applications. LNCS, vol. 6805, pp. 207\u2013232. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-28368-0_15"},{"key":"9_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/978-3-642-18178-8_6","volume-title":"Information Security","author":"\u00d6 Dagdelen","year":"2011","unstructured":"Dagdelen, \u00d6., Fischlin, M.: Security analysis of the extended access control protocol for machine readable travel documents. In: Burmester, M., Tsudik, G., Magliveras, S., Ili\u0107, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 54\u201368. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-18178-8_6"},{"issue":"3","key":"9_CR17","first-page":"419","volume":"21","author":"L Hanzlik","year":"2015","unstructured":"Hanzlik, L., Kutylowski, M.: Restricted identification secure in the extended Canetti-Krawczyk model. J. UCS 21(3), 419\u2013439 (2015)","journal-title":"J. UCS"},{"key":"9_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-642-38033-4_16","volume-title":"Information Security Practice and Experience","author":"L Hanzlik","year":"2013","unstructured":"Hanzlik, L., Krzywiecki, \u0141., Kuty\u0142owski, M.: Simplified PACE $$|$$ | AA protocol. In: Deng, R.H., Feng, T. (eds.) ISPEC 2013. LNCS, vol. 7863, pp. 218\u2013232. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-38033-4_16"},{"key":"9_CR19","unstructured":"International Civil Aviation Organization: Doc 9303, Machine Readable Travel Documents, Part 11, Security Mechanisms for MRTDs, 7th edn. (2015)"},{"key":"9_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-642-32009-5_17","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"T Jager","year":"2012","unstructured":"Jager, T., Kohlar, F., Sch\u00e4ge, S., Schwenk, J.: On the security of TLS-DHE in the standard model. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 273\u2013293. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-32009-5_17"},{"key":"9_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-642-32298-3_15","volume-title":"Trusted Systems","author":"M Kuty\u0142owski","year":"2012","unstructured":"Kuty\u0142owski, M., Krzywiecki, \u0141., Kubiak, P., Koza, M.: Restricted identification scheme and Diffie-Hellman linking problem. In: Chen, L., Yung, M., Zhu, L. (eds.) INTRUST 2011. LNCS, vol. 7222, pp. 221\u2013238. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-32298-3_15"},{"key":"9_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-45931-8_1","volume-title":"Information Security Theory and Practice","author":"F Morgner","year":"2016","unstructured":"Morgner, F., Bastian, P., Fischlin, M.: Securing transactions with the eIDAS protocols. In: Foresti, S., Lopez, J. (eds.) WISTP 2016. LNCS, vol. 9895, pp. 3\u201318. Springer, Heidelberg (2016). doi: 10.1007\/978-3-319-45931-8_1"},{"key":"9_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1007\/978-3-642-25385-0_20","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2011","author":"KG Paterson","year":"2011","unstructured":"Paterson, K.G., Ristenpart, T., Shrimpton, T.: Tag size Does matter: attacks and proofs for the TLS record protocol. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 372\u2013389. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-25385-0_20"},{"key":"9_CR24","unstructured":"Rogaway, P.: Evaluation of some blockcipher modes of operation. Cryptography Research and Evaluation Committees (CRYPTREC) for the Government of Japan, February 2011"}],"container-title":["Lecture Notes in Computer Science","Security Standardisation Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49100-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T23:03:58Z","timestamp":1749683038000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49100-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319490991","9783319491004"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49100-4_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"2 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Research in Security Standardisation","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gaithersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 December 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ssr2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/csrc.nist.gov\/groups\/ST\/ssr2016\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}