{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:28:57Z","timestamp":1725902937374},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319615417"},{"type":"electronic","value":"9783319615424"}],"license":[{"start":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T00:00:00Z","timestamp":1499212800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-61542-4_40","type":"book-chapter","created":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T08:02:27Z","timestamp":1499155347000},"page":"423-434","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Provably Secure Password-Based Authenticated Key Agreement"],"prefix":"10.1007","author":[{"given":"Hanqiu","family":"Xu","sequence":"first","affiliation":[]},{"given":"Qingping","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Ou","family":"Ruan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,5]]},"reference":[{"key":"40_CR1","doi-asserted-by":"crossref","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theor. 22(6), 644\u2013654 (1976)","DOI":"10.1109\/TIT.1976.1055638"},{"issue":"5","key":"40_CR2","doi-asserted-by":"crossref","first-page":"832","DOI":"10.1007\/s11390-008-9178-z","volume":"23","author":"HB Tian","year":"2008","unstructured":"Tian, H.B., Susilo, W., Ming, Y., et al.: A provable secure ID-based explicit authenticated key agreement protocol without random oracles. J. Comput. Sci. Technol. 23(5), 832\u2013842 (2008)","journal-title":"J. Comput. Sci. Technol."},{"key":"40_CR3","first-page":"247","volume":"8303","author":"M Dheerendra","year":"2013","unstructured":"Dheerendra, M., Sourav, M.: Cryptanalysis of pairing-free identity-based authenticated key agreement protocols. Inf. Syst. Secur. 8303, 247\u2013254 (2013)","journal-title":"Inf. Syst. Secur."},{"issue":"2","key":"40_CR4","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1049\/iet-ifs.2012.0206","volume":"8","author":"JS Leu","year":"2014","unstructured":"Leu, J.S., Hsieh, W.B.: Efficient and secure dynamic id-based remote user authentication scheme for distributed systems using smart cards. IET Inf. Secur. 8(2), 104\u2013113 (2014)","journal-title":"IET Inf. Secur."},{"issue":"3","key":"40_CR5","doi-asserted-by":"crossref","first-page":"534","DOI":"10.1002\/dac.2685","volume":"28","author":"ZW Tan","year":"2015","unstructured":"Tan, Z.W.: An efficient pairing-free identity-based authenticated group key agreement protocol. Int. J. Commun. Syst. 28(3), 534\u2013545 (2015)","journal-title":"Int. J. Commun. Syst."},{"key":"40_CR6","doi-asserted-by":"crossref","unstructured":"Bellovin, S.M., Merritt, M.: Encrypted key exchange: password-based protocols secure against dictionary attacks. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 72\u201384 (1992)","DOI":"10.1109\/RISP.1992.213269"},{"key":"40_CR7","doi-asserted-by":"crossref","unstructured":"Bellovin, S.M., Merritt, M.: Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise. In: Proceedings of the 1st ACM Conference on Computer and Communication Security, pp. 244\u2013250 (1993)","DOI":"10.1145\/168588.168618"},{"issue":"3","key":"40_CR8","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1145\/206826.206834","volume":"29","author":"M Steiner","year":"1995","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: Refinement and extension of encrypted key exchange. ACM SIGOPS Oper. Syst. Rev. 29(3), 22\u201330 (1995)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"issue":"5","key":"40_CR9","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/242896.242897","volume":"26","author":"DP Jablon","year":"1996","unstructured":"Jablon, D.P.: Strong password-only authenticated key exchange. SIGCOMM Comput. Commun. Rev. 26(5), 5\u201326 (1996)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"40_CR10","doi-asserted-by":"crossref","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Proceedings of EUROCRYPT 2000, pp. 139\u2013155 (2000)","DOI":"10.1007\/3-540-45539-6_11"},{"key":"40_CR11","doi-asserted-by":"crossref","unstructured":"MacKenzie, P.D., Patel, S., Swaminathan, R.: Password-authenticated key exchange based on RSA. In: Proceedings of ASIACRYPT 2000, pp. 599\u2013613 (2000)","DOI":"10.1007\/3-540-44448-3_46"},{"issue":"4","key":"40_CR12","doi-asserted-by":"crossref","first-page":"714","DOI":"10.1007\/s00145-012-9133-6","volume":"26","author":"J Katz","year":"2013","unstructured":"Katz, J., Vaikuntanathan, V.: Round-optimal password-based authenticated key exchange. J. Cryptol. 26(4), 714\u2013743 (2013)","journal-title":"J. Cryptol."},{"key":"40_CR13","doi-asserted-by":"crossref","unstructured":"Zhou, H.H., Wang, T., Zheng, M.H.: Provably secure two-party password-based key agreement protocol. In: Proceedings of HumanCom and EMC 2011, pp. 213\u2013221 (2011)","DOI":"10.1007\/978-94-007-2105-0_21"},{"key":"40_CR14","doi-asserted-by":"crossref","unstructured":"Law, L., Menezes, A., Qu, M.H., Solinas, J., Vanstone, S.: An efficient protocol for authenticated key agreement. Des. Codes Crypt. 28(2), 119\u2013134 (2003)","DOI":"10.1023\/A:1022595222606"},{"issue":"12","key":"40_CR15","doi-asserted-by":"crossref","first-page":"2954","DOI":"10.1002\/cpe.3198","volume":"27","author":"MH Zheng","year":"2015","unstructured":"Zheng, M.H., Zhou, H.H., Chen, J.: An efficient protocol for two-party explicit authenticated key agreement. Concurrency Comput. Pract. Exp. 27(12), 2954\u20132963 (2015)","journal-title":"Concurrency Comput. Pract. Exp."},{"key":"40_CR16","unstructured":"Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, New York (2004)"},{"issue":"19","key":"40_CR17","doi-asserted-by":"crossref","first-page":"3995","DOI":"10.1016\/j.ins.2007.03.024","volume":"177","author":"JW Byun","year":"2007","unstructured":"Byun, J.W., Lee, D.H., Lim, J.I.: EC2C-PAKA: an efficient client-to-client password-authenticated key agreement. Inf. Sci. 177(19), 3995\u20134013 (2007)","journal-title":"Inf. Sci."},{"issue":"5","key":"40_CR18","doi-asserted-by":"crossref","first-page":"948","DOI":"10.1016\/j.csi.2008.09.021","volume":"31","author":"MH Zheng","year":"2009","unstructured":"Zheng, M.H., Zhou, H.H., Cui, G.H.: Efficient and provably secure password-based group key agreement protocol. Comput. Stand. Interfaces 31(5), 948\u2013953 (2009)","journal-title":"Comput. Stand. Interfaces"},{"key":"40_CR19","doi-asserted-by":"crossref","unstructured":"Susilo, W., Baek, J.: On the security of the identity-based encryption based on DHIES from ASIACCS 2010 (short paper). In: Proceedings of the 6th International Symposium on ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011), pp. 376\u2013380 (2011)","DOI":"10.1145\/1966913.1966962"},{"key":"40_CR20","doi-asserted-by":"crossref","unstructured":"Boneh, D., Franklin, M.: Identity-Based encryption from the weil pairing. In: Proceedings of CRYPTO 2001, pp. 231\u2013229 (2001)","DOI":"10.1007\/3-540-44647-8_13"}],"container-title":["Advances in Intelligent Systems and Computing","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61542-4_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,28]],"date-time":"2019-09-28T10:55:29Z","timestamp":1569668129000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61542-4_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,5]]},"ISBN":["9783319615417","9783319615424"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61542-4_40","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,7,5]]}}}