{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T09:05:42Z","timestamp":1743066342536,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319611754"},{"type":"electronic","value":"9783319611761"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-61176-1_25","type":"book-chapter","created":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T01:54:25Z","timestamp":1498010065000},"page":"453-472","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Fallout of Key Compromise in a Proxy-Mediated Key Agreement Protocol"],"prefix":"10.1007","author":[{"given":"David","family":"Nu\u00f1ez","sequence":"first","affiliation":[]},{"given":"Isaac","family":"Agudo","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Lopez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,22]]},"reference":[{"key":"25_CR1","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The Keccak SHA-3 submission. NIST (Round 3) 6(7), 16 (2011, to be submitted)"},{"key":"25_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1007\/978-3-642-40041-4_23","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"D Boneh","year":"2013","unstructured":"Boneh, D., Lewi, K., Montgomery, H., Raghunathan, A.: Key homomorphic PRFs and their applications. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8042, pp. 410\u2013428. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-40041-4_23"},{"key":"25_CR3","volume-title":"Protocols for Authentication and Key Establishment","author":"C Boyd","year":"2013","unstructured":"Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Springer, Heidelberg (2013)"},{"key":"25_CR4","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-540-88653-2_17","volume-title":"E-business and Telecommunications","author":"K Chalkias","year":"2008","unstructured":"Chalkias, K., Baldimtsi, F., Hristu-Varsakelis, D., Stephanides, G.: Two types of key-compromise impersonation attacks against one-pass key establishment protocols. In: Filipe, J., Obaidat, M.S. (eds.) ICETE 2007. CCIS, vol. 23, pp. 227\u2013238. Springer, Heidelberg (2008). doi:10.1007\/978-3-540-88653-2_17"},{"issue":"2","key":"25_CR5","first-page":"119","volume":"1","author":"DL Cook","year":"2006","unstructured":"Cook, D.L., Keromytis, A.D.: Conversion functions for symmetric key ciphers. J. Inf. Assur. Secur. 1(2), 119\u2013128 (2006)","journal-title":"J. Inf. Assur. Secur."},{"issue":"8","key":"25_CR6","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1145\/358722.358740","volume":"24","author":"DE Denning","year":"1981","unstructured":"Denning, D.E., Sacco, G.M.: Timestamps in key distribution protocols. Commun. ACM 24(8), 533\u2013536 (1981)","journal-title":"Commun. ACM"},{"issue":"6","key":"25_CR7","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theor. 22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Inf. Theor."},{"issue":"2","key":"25_CR8","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theor. 29(2), 198\u2013208 (1983)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"25_CR9","unstructured":"Duong, T., Rizzo, J.: Flickr\u2019s API signature forgery vulnerability (2009)"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Garrison, W.C., Shull, A., Myers, S., Lee, A.J.: On the practicality of cryptographically enforcing dynamic access control policies in the cloud. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 819\u2013838, May 2016","DOI":"10.1109\/SP.2016.54"},{"key":"25_CR11","unstructured":"Krawczyk, D.H., Eronen, P.: HMAC-based extract-and-expand key derivation function (HKDF). RFC. 5869, October 2015"},{"issue":"3","key":"25_CR12","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1109\/TDSC.2016.2577022","volume":"14","author":"Z Liu","year":"2016","unstructured":"Liu, Z., Huang, X., Hu, Z., Khan, M.K., Seo, H., Zhou, L.: On emerging family of elliptic curves to secure internet of things: ECC comes of age. IEEE Trans. Dependable Secur. Comput. 14(3), 237\u2013248 (2016). doi:10.1109\/TDSC.2016.2577022. ISSN: 1545-5971","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"25_CR13","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"AJ Menezes","year":"1996","unstructured":"Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"issue":"12","key":"25_CR14","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"RM Needham","year":"1978","unstructured":"Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Commun. ACM 21(12), 993\u2013999 (1978)","journal-title":"Commun. ACM"},{"issue":"9","key":"25_CR15","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/35.312841","volume":"32","author":"BC Neuman","year":"1994","unstructured":"Neuman, B.C., Ts\u2019o, T.: Kerberos: an authentication service for computer networks. IEEE Commun. Mag. 32(9), 33\u201338 (1994)","journal-title":"IEEE Commun. Mag."},{"key":"25_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/978-3-319-45741-3_18","volume-title":"Computer Security \u2013 ESORICS 2016","author":"KT Nguyen","year":"2016","unstructured":"Nguyen, K.T., Oualha, N., Laurent, M.: Authenticated key agreement mediated by a proxy re-encryptor for the internet of things. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9879, pp. 339\u2013358. Springer, Cham (2016). doi:10.1007\/978-3-319-45741-3_18"},{"key":"25_CR17","doi-asserted-by":"crossref","unstructured":"Nu\u00f1ez, D., Agudo, I., Lopez, J.: A parametric family of attack models for proxy re-encryption. In: Proceedings of the 28th IEEE Computer Security Foundations Symposium, CSF 2015, pp. 290\u2013301. IEEE Computer Society (2015)","DOI":"10.1109\/CSF.2015.27"},{"key":"25_CR18","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.jnca.2017.03.005","volume":"87","author":"D Nu\u00f1ez","year":"2017","unstructured":"Nu\u00f1ez, D., Agudo, I., Lopez, J.: Proxy re-encryption: analysis of constructions and its application to secure access delegation. J. Netw. Comput. Appl. 87, 193\u2013209 (2017)","journal-title":"J. Netw. Comput. Appl."},{"key":"25_CR19","unstructured":"Sakazaki, H., Anzai, K., Hosoya, J.: Study of re-encryption scheme based on symmetric-key cryptography. In: 31st Symposium on Cryptography and Information Security (SCIS 2014) (2014)"},{"key":"25_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/11774716_19","volume-title":"Public Key Infrastructure","author":"MA Strangio","year":"2006","unstructured":"Strangio, M.A.: On the resilience of key agreement protocols to key compromise impersonation. In: Atzeni, A.S., Lioy, A. (eds.) EuroPKI 2006. LNCS, vol. 4043, pp. 233\u2013247. Springer, Heidelberg (2006). doi:10.1007\/11774716_19"},{"key":"25_CR21","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/978-3-642-25327-0_23","volume-title":"Informatics Engineering and Information Science","author":"A Syalim","year":"2011","unstructured":"Syalim, A., Nishide, T., Sakurai, K.: Realizing proxy re-encryption in the symmetric world. In: Abd Manaf, A., Zeki, A., Zamani, M., Chuprat, S., El-Qawasmeh, E. (eds.) ICIEIS 2011. CCIS, vol. 251, pp. 259\u2013274. Springer, Heidelberg (2011). doi:10.1007\/978-3-642-25327-0_23"},{"issue":"5","key":"25_CR22","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/141809.141812","volume":"22","author":"G Tsudik","year":"1992","unstructured":"Tsudik, G.: Message authentication with one-way hash functions. ACM SIGCOMM Comput. Commun. Rev. 22(5), 29\u201338 (1992)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"25_CR23","first-page":"67","volume":"25","author":"D Watanabe","year":"2017","unstructured":"Watanabe, D., Sakazaki, H., Miyazaki, K.: Representative system and security message transmission using re-encryption scheme based on symmetric-key cryptography. J. Inf. Process. 25, 67\u201374 (2017)","journal-title":"J. Inf. Process."},{"key":"25_CR24","unstructured":"Wikipedia: SpongeBob SquarePants \u2013 Wikipedia, the free encyclopedia (2016). https:\/\/en.wikipedia.org\/wiki\/SpongeBob_SquarePants. Accessed 18 Oct 2016"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXXI"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61176-1_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T15:51:06Z","timestamp":1710345066000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-61176-1_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319611754","9783319611761"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61176-1_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"22 June 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DBSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Annual Conference on Data and Applications Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Philadelphia","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dbsec2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dbsec2017.ittc.ku.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}