{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:02:52Z","timestamp":1771700572968,"version":"3.50.1"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319710747","type":"print"},{"value":"9783319710754","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71075-4_31","type":"book-chapter","created":{"date-parts":[[2017,11,28]],"date-time":"2017-11-28T12:37:18Z","timestamp":1511872638000},"page":"278-297","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Auditable PAKEs: Approaching Fair Exchange Without a TTP"],"prefix":"10.1007","author":[{"given":"A. W.","family":"Roscoe","sequence":"first","affiliation":[]},{"given":"Peter Y. A.","family":"Ryan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,29]]},"reference":[{"issue":"4","key":"31_CR1","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1109\/49.839935","volume":"18","author":"N Asokan","year":"2000","unstructured":"Asokan, N., Shoup, V., Waidner, M.: Optimistic fair exchange of digital signatures. IEEE J. Sel. Areas Commun. 18(4), 593\u2013610 (2000). https:\/\/doi.org\/10.1109\/49.839935","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Bellovin, S.M., Merritt, M.: Encrypted key exchange: password-based protocols secure against dictionary attacks. In: IEEE Symposium on Research in Security and Privacy, pp. 72\u201384 (1992)","DOI":"10.1109\/RISP.1992.213269"},{"key":"31_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/3-540-45539-6_12","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2000","author":"V Boyko","year":"2000","unstructured":"Boyko, V., MacKenzie, P., Patel, S.: Provably secure password-authenticated key exchange using Diffie-Hellman. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 156\u2013171. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-45539-6_12 . http:\/\/dl.acm.org\/citation.cfm?id=1756169.1756186"},{"key":"31_CR4","doi-asserted-by":"crossref","unstructured":"Chen, L.: Nist special publication 800\u201356C recommendation for key derivation through extraction-then-expansion (2011)","DOI":"10.6028\/NIST.SP.800-56c"},{"key":"31_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-642-22137-8_23","volume-title":"Security Protocols XVI","author":"F Hao","year":"2011","unstructured":"Hao, F., Ryan, P.Y.A.: Password authenticated key exchange by juggling. In: Christianson, B., Malcolm, J.A., Matyas, V., Roe, M. (eds.) Security Protocols 2008. LNCS, vol. 6615, pp. 159\u2013171. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22137-8_23 . http:\/\/dl.acm.org\/citation.cfm?id=2022815.2022838"},{"issue":"5","key":"31_CR6","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/242896.242897","volume":"26","author":"DP Jablon","year":"1996","unstructured":"Jablon, D.P.: Strong password-only authenticated key exchange. SIGCOMM Comput. Commun. Rev. 26(5), 5\u201326 (1996). https:\/\/doi.org\/10.1145\/242896.242897","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"31_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1007\/978-3-642-14623-7_34","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"H Krawczyk","year":"2010","unstructured":"Krawczyk, H.: Cryptographic extraction and key derivation: the HKDF scheme. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 631\u2013648. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14623-7_34 . http:\/\/dl.acm.org\/citation.cfm?id=1881412.1881456"},{"key":"31_CR8","unstructured":"Lancrenon, J., Skrobot, M., Tang, Q.: Two more efficient variants of the J-PAKE protocol. Cryptology ePrint Archive, Report 2016\/379 (2016). http:\/\/eprint.iacr.org\/2016\/379"},{"key":"31_CR9","doi-asserted-by":"crossref","first-page":"139","DOI":"10.3233\/JCS-2010-0403","volume":"19","author":"L Nguyen","year":"2011","unstructured":"Nguyen, L., Roscoe, A.: Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey. J. Comput. Secur. 19, 139\u2013201 (2011)","journal-title":"J. Comput. Secur."},{"key":"31_CR10","unstructured":"Pagnia, H., G\u00e4rtner, F.C.: On the impossibility of fair exchange without a trusted third party. Technical report, Citeseer (1999)"},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"Roscoe, A.: Detecting failed attacks on human-interactive security protocols (2016)","DOI":"10.1007\/978-3-319-62033-6_21"},{"key":"31_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/11593447_15","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"D Wikstr\u00f6m","year":"2005","unstructured":"Wikstr\u00f6m, D.: A sender verifiable mix-net and a new proof of a shuffle. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 273\u2013292. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11593447_15"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71075-4_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,6]],"date-time":"2019-10-06T20:43:16Z","timestamp":1570394596000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71075-4_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319710747","9783319710754"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71075-4_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}