{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:16:44Z","timestamp":1725491804237},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540748175"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74819-9_83","type":"book-chapter","created":{"date-parts":[[2007,9,11]],"date-time":"2007-09-11T23:01:10Z","timestamp":1189551670000},"page":"672-679","source":"Crossref","is-referenced-by-count":0,"title":["Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees"],"prefix":"10.1007","author":[{"given":"Junghyun","family":"Nam","sequence":"first","affiliation":[]},{"given":"Juryon","family":"Paik","sequence":"additional","affiliation":[]},{"given":"Youngsook","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Kwak","sequence":"additional","affiliation":[]},{"given":"Ung Mo","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"83_CR1","doi-asserted-by":"crossref","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.-J.: Provably authenticated group Diffie-Hellman key exchange. In: 8th ACM Conference\u00a0on Computer and Communications Security (CCS \u201901), pp. 255\u2013264 (2001)","DOI":"10.1145\/501983.502018"},{"key":"83_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1007\/11593447_34","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"K.-K. Choo","year":"2005","unstructured":"Choo, K.-K., Boyd, C., Hitchcock, Y.: Errors in computational complexity proofs for protocols. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol.\u00a03788, pp. 624\u2013643. Springer, Heidelberg (2005)"},{"key":"83_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1007\/978-3-540-45146-4_7","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"J. Katz","year":"2003","unstructured":"Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 110\u2013125. Springer, Heidelberg (2003)"},{"key":"83_CR4","doi-asserted-by":"crossref","unstructured":"Pereira, O., Quisquater, J.-J.: A security analysis of the Cliques protocols suites. In: 14th IEEE Computer Security Foundations Workshop (CSFW \u201901), pp. 73\u201381 (2001)","DOI":"10.1109\/CSFW.2001.930137"},{"key":"83_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"issue":"6","key":"83_CR6","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1002\/nem.412","volume":"11","author":"W.-H. Yang","year":"2001","unstructured":"Yang, W.-H., Shieh, S.-P.: Secure key agreement for group communications. International Journal of Network Management\u00a011(6), 365\u2013374 (2001)","journal-title":"International Journal of Network Management"}],"container-title":["Lecture Notes in Computer Science","Knowledge-Based Intelligent Information and Engineering Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74819-9_83.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:40:34Z","timestamp":1619520034000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74819-9_83"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540748175"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74819-9_83","relation":{},"subject":[]}}