{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T16:10:39Z","timestamp":1769011839179,"version":"3.49.0"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319710747","type":"print"},{"value":"9783319710754","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71075-4_15","type":"book-chapter","created":{"date-parts":[[2017,11,28]],"date-time":"2017-11-28T12:37:18Z","timestamp":1511872638000},"page":"123-136","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Key Exchange with the Help of a Public Ledger"],"prefix":"10.1007","author":[{"given":"Thanh","family":"Bui","sequence":"first","affiliation":[]},{"given":"Tuomas","family":"Aura","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,29]]},"reference":[{"key":"15_CR1","unstructured":"Blockstack, December 2016. https:\/\/blockstack.org"},{"key":"15_CR2","unstructured":"Comodo fraud incident, January 2017. https:\/\/www.comodo.com\/Comodo-Fraud-Incident-2011-03-23.html"},{"key":"15_CR3","unstructured":"DigiNotar SSL certificate hack amounts to cyberwar, says expert, January 2017. https:\/\/www.theguardian.com\/technology\/2011\/sep\/05\/diginotar-certificate-hack-cyberwar"},{"key":"15_CR4","unstructured":"Yahoo hack: 1bn accounts compromised by biggest data breach in history, January 2017. https:\/\/www.theguardian.com\/technology\/2016\/dec\/14\/yahoo-hack-security-of-one-billion-accounts-breached"},{"key":"15_CR5","unstructured":"Alliance, Z., et al.: Zigbee Specification (2006)"},{"key":"15_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/3-540-44810-1_22","volume-title":"Security Protocols","author":"T Aura","year":"2001","unstructured":"Aura, T., Nikander, P., Leiwo, J.: DOS-resistant authentication with client puzzles. In: Christianson, B., Malcolm, J.A., Crispo, B., Roe, M. (eds.) Security Protocols 2000. LNCS, vol. 2133, pp. 170\u2013177. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44810-1_22"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Barrdear, J., Kumhof, M.: The macroeconomics of central bank issued digital currencies (2016)","DOI":"10.2139\/ssrn.2811208"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Basin, D., Cremers, C., Kim, T.H.J., Perrig, A., Sasse, R., Szalachowski, P.: ARPKI: attack resilient public-key infrastructure. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 382\u2013393. ACM (2014)","DOI":"10.1145\/2660267.2660298"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Bellovin, S.M., Merritt, M.: Encrypted key exchange: password-based protocols secure against dictionary attacks. In: Proceedings of the Computer Society Symposium on Research in Security and Privacy, pp. 72\u201384. IEEE (1992)","DOI":"10.1109\/RISP.1992.213269"},{"key":"15_CR10","unstructured":"Blossom, E.: The VP1 protocol for voice privacy devices version 1.2 (1999)"},{"key":"15_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/3-540-45539-6_12","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2000","author":"V Boyko","year":"2000","unstructured":"Boyko, V., MacKenzie, P., Patel, S.: Provably secure password-authenticated key exchange using Diffie-Hellman. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 156\u2013171. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-45539-6_12"},{"key":"15_CR12","unstructured":"Bui, T., Aura, T.: Application of public ledgers to revocation in distributed access control. https:\/\/arxiv.org\/abs\/1608.06592"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Chase, M., Meiklejohn, S.: Transparency overlays and applications. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 168\u2013179. ACM (2016)","DOI":"10.1145\/2976749.2978404"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Dierks, T.: The transport layer security (TLS) protocol version 1.2. RFC 5246 (2008)","DOI":"10.17487\/rfc5246"},{"issue":"2","key":"15_CR15","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/BF00124891","volume":"2","author":"W Diffie","year":"1992","unstructured":"Diffie, W., Van Oorschot, P.C., Wiener, M.J.: Authentication and authenticated key exchanges. Des. Codes Crypt. 2(2), 107\u2013125 (1992)","journal-title":"Des. Codes Crypt."},{"key":"15_CR16","unstructured":"Electronic Frontier Foundation: National security letters, July 2015. https:\/\/www.eff.org\/issues\/national-security-letters"},{"issue":"1","key":"15_CR17","first-page":"29","volume":"7","author":"C Gehrmann","year":"2004","unstructured":"Gehrmann, C., Mitchell, C.J., Nyberg, K.: Manual authentication for wireless devices. RSA Cryptobytes 7(1), 29\u201337 (2004)","journal-title":"RSA Cryptobytes"},{"key":"15_CR18","unstructured":"Gellman, B.: The FBI\u2019s secret scrutiny, July 2015. http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2005\/11\/05\/AR2005110501366.html"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Gupta, P., Shmatikov, V.: Security analysis of voice-over-IP protocols. In: Proceedings of the Computer Security Foundations Symposium, pp. 49\u201363. IEEE (2007)","DOI":"10.1109\/CSF.2007.31"},{"key":"15_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-642-17697-5_10","volume-title":"Transactions on Computational Science XI","author":"F Hao","year":"2010","unstructured":"Hao, F., Ryan, P.: J-PAKE: authenticated key exchange without PKI. In: Gavrilova, M.L., Tan, C.J.K., Moreno, E.D. (eds.) Transactions on Computational Science XI. LNCS, vol. 6480, pp. 192\u2013206. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17697-5_10"},{"key":"15_CR21","unstructured":"IEEE Standards 802.11 WG, Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications"},{"key":"15_CR22","unstructured":"IEEE Standards 802.15 1\u20132005, Part 15.1: Wireless medium access control (MAC) and physical layer (PHY) specifications for wireless personal area networks (WPANs) (2005)"},{"issue":"5","key":"15_CR23","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/242896.242897","volume":"26","author":"DP Jablon","year":"1996","unstructured":"Jablon, D.P.: Strong password-only authenticated key exchange. ACM SIGCOMM Comput. Commun. Rev. 26(5), 5\u201326 (1996)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"15_CR24","unstructured":"Kalodner, H., Carlsten, M., Ellenbogen, P., Bonneau, J., Narayanan, A.: An empirical study of Namecoin and lessons for decentralized namespace design. In: Proceedings of the Workshop on the Economics of Information Security (WEIS) (2015)"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Kim, T.H.J., Huang, L.S., Perring, A., Jackson, C., Gligor, V.: Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 679\u2013690 (2013)","DOI":"10.1145\/2488388.2488448"},{"key":"15_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/11935070_6","volume-title":"Cryptology and Network Security","author":"S Laur","year":"2006","unstructured":"Laur, S., Nyberg, K.: Efficient mutual data authentication using manually authenticated strings. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, vol. 4301, pp. 90\u2013107. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11935070_6"},{"key":"15_CR27","doi-asserted-by":"crossref","unstructured":"Laurie, B., Langley, A., Kasper, E.: Certificate transparency. RFC 6962, IETF (2013)","DOI":"10.17487\/rfc6962"},{"key":"15_CR28","unstructured":"Lichtblau, E.: Judge tells Apple to help unlock iPhone used by San Bernardino Gunman, July 2015. http:\/\/www.nytimes.com\/2016\/02\/17\/us\/judge-tells-apple-to-help-unlock-san-bernardino-gunmans-iphone.html"},{"key":"15_CR29","unstructured":"Melara, M.S., Blankstein, A., Bonneau, J., Felten, E.W., Freedman, M.J.: CONIKS: Bringing key transparency to end users. In: Proceedings of the USENIX Security Symposium, pp. 383\u2013398 (2015)"},{"key":"15_CR30","unstructured":"Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008)"},{"key":"15_CR31","unstructured":"O\u2019leary, D., D\u2019agostino, V., Re, S.R., Burney, J., Hoffman, A.: Method and system for processing internet payments using the electronic funds transfer network, US Patent Application number 13\/789,826 (2013)"},{"issue":"5","key":"15_CR32","first-page":"673","volume":"14","author":"M Petraschek","year":"2008","unstructured":"Petraschek, M., Hoeher, T., Jung, O., Hlavacs, H., Gansterer, W.N.: Security and usability aspects of man-in-the-middle attacks on ZRTP. J. Univ. Comput. Sci. 14(5), 673\u2013692 (2008)","journal-title":"J. Univ. Comput. Sci."},{"key":"15_CR33","doi-asserted-by":"crossref","unstructured":"Ryan, M.D.: Enhanced certificate transparency and end-to-end encrypted mail. In: Proceedings of the Network and Distributed System Security Symposium (2014)","DOI":"10.14722\/ndss.2014.23379"},{"key":"15_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47\u201353. Springer, Heidelberg (1985). https:\/\/doi.org\/10.1007\/3-540-39568-7_5"},{"key":"15_CR35","unstructured":"Shin, L.: Canada has been experimenting with a digital fiat currency called CAD-COIN (2016), March 2017"},{"key":"15_CR36","doi-asserted-by":"crossref","unstructured":"Szalachowski, P., Chuat, L., Perrig, A.: PKI Safety Net (PKISN): addressing the too-big-to-be-revoked problem of the TLS ecosystem. In: 1st IEEE European Symposium on Security and Privacy (2016)","DOI":"10.1109\/EuroSP.2016.38"},{"key":"15_CR37","doi-asserted-by":"crossref","unstructured":"Szalachowski, P., Matsumoto, S., Perrig, A.: PoliCert: secure and flexible TLS certificate management. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 406\u2013417. ACM (2014)","DOI":"10.1145\/2660267.2660355"},{"key":"15_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/11535218_19","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"S Vaudenay","year":"2005","unstructured":"Vaudenay, S.: Secure communications over insecure channels based on short authenticated strings. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 309\u2013326. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11535218_19"},{"key":"15_CR39","unstructured":"Wood, G.: Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper (2014)"},{"key":"15_CR40","unstructured":"Wu, T.D.: The secure remote password protocol. In: Proceedings of the Internet Society Symposium on Network and Distributed System Security, vol. 98, pp. 97\u2013111 (1998)"},{"key":"15_CR41","unstructured":"Yu, J., Ryan, M., Cremers, C.: DECIM: detecting endpoint compromise in messaging. Technical report (2015)"},{"key":"15_CR42","doi-asserted-by":"crossref","unstructured":"Zimmermann, P., Johnston, A., Callas, J.: ZRTP: media path key agreement for unicast secure RTP. RFC 6189 (2011)","DOI":"10.17487\/rfc6189"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71075-4_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,6]],"date-time":"2019-10-06T20:42:16Z","timestamp":1570394536000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71075-4_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319710747","9783319710754"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71075-4_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}