{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T08:46:27Z","timestamp":1742978787001,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":39,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540770473"},{"type":"electronic","value":"9783540770480"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-77048-0_3","type":"book-chapter","created":{"date-parts":[[2007,11,16]],"date-time":"2007-11-16T15:10:22Z","timestamp":1195225822000},"page":"31-43","source":"Crossref","is-referenced-by-count":8,"title":["nPAKE\u2009+\u2009: A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords"],"prefix":"10.1007","author":[{"given":"Zhiguo","family":"Wan","sequence":"first","affiliation":[]},{"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Bao","sequence":"additional","affiliation":[]},{"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/11935230_22","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2006","author":"M. Abdalla","year":"2006","unstructured":"Abdalla, M., Pointcheval, D., Scalable, A.: A Scalable Password-Based Group Key Exchange Protocol in the Standard Model. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol.\u00a04284, pp. 332\u2013347. Springer, Heidelberg (2006)"},{"issue":"18","key":"3_CR2","doi-asserted-by":"publisher","first-page":"1627","DOI":"10.1016\/S0140-3664(00)00249-8","volume":"23","author":"N. Asokan","year":"2000","unstructured":"Asokan, N., Ginzboorg, P.: Key Agreement in Ad-hoc Networks. Computer Communications\u00a023(18), 1627\u20131637 (2000)","journal-title":"Computer Communications"},{"key":"3_CR3","unstructured":"Bellare, M., Rogaway, P.: The AuthA Protocol for Password-Based Authenticated Key Exchange. In: Contribution to the IEEE P1363 study group (March 2000)"},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44598-6","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure Against Dictionary Attack. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, Springer, Heidelberg (2000)"},{"key":"3_CR5","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/RISP.1992.213269","volume-title":"Proceedings 1992 IEEE Symposium on Research in Security and Privacy","author":"S.M. Bellovin","year":"1992","unstructured":"Bellovin, S.M., Merritt, M.: Encrypted Key Exchange: Password Based Protocols Secure against Dictionary Attacks. In: Proceedings 1992 IEEE Symposium on Research in Security and Privacy, pp. 72\u201384. IEEE Computer Society Press, Los Alamitos (1992)"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Bellovin, S.M., Merritt, M.: Augmented EncryptedKey Exchange: A Password-based Protocol Secure against Dictionary attacks and Password File Compromise. In: Proceedings of CCS 1993, pp. 244\u2013250 (1993)","DOI":"10.1145\/168588.168618"},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/3-540-45539-6_12","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"V. Boyko","year":"2000","unstructured":"Boyko, V., MacKenzie, P.D., Patel, S.: Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 156\u2013171. Springer, Heidelberg (2000)"},{"key":"3_CR8","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"E. Bresson","year":"2002","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, Springer, Heidelberg (2002)"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: Security Proofs for an Efficient Password-Based Key Exchange. In: Proceedings of the 10th ACM Conference on Computer and Communications Security 2003, pp. 241\u2013250 (2003)","DOI":"10.1145\/948109.948142"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - EUROCRYPT 1994","author":"M. Burmester","year":"1995","unstructured":"Burmester, M., Desmedt, Y., Secure, A.: Efficient Conference Key Distribution System (extended abstract). In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, Springer, Heidelberg (1995)"},{"key":"3_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/11496137_6","volume-title":"Applied Cryptography and Network Security","author":"J.W. Byun","year":"2005","unstructured":"Byun, J.W., Lee, D.H.: N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol.\u00a03531, pp. 75\u201390. Springer, Heidelberg (2005)"},{"key":"3_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/11734666_2","volume-title":"Security in Pervasive Computing","author":"J.W. Byun","year":"2006","unstructured":"Byun, J.W., Lee, S.-M., Lee, D.H., Hong, D.: Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol.\u00a03934, pp. 3\u201317. Springer, Heidelberg (2006)"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/3-540-36159-6_12","volume-title":"Information and Communications Security","author":"J.W. Byun","year":"2002","unstructured":"Byun, J.W., Jeong, I.R., Lee, D.H., Park, C.-S.: Password-Authenticated Key Exchange between Clients with Different Passwords. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol.\u00a02513, pp. 134\u2013146. Springer, Heidelberg (2002)"},{"issue":"1","key":"3_CR14","first-page":"23","volume":"3","author":"R. Dutta","year":"2006","unstructured":"Dutta, R., Barua, R.: Password-Based Encrypted Group Key Agreement. International Journal of Network Security\u00a03(1), 23\u201334 (2006)","journal-title":"International Journal of Network Security"},{"key":"3_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1007\/3-540-39200-9_33","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"R. Gennaro","year":"2003","unstructured":"Gennaro, R., Lindell, Y.: A Framework for Password-Based Authenticated Key Exchange. In: Biham, E. (ed.) EUROCRPYT 2003. LNCS, vol.\u00a02656, pp. 524\u2013543. Springer, Heidelberg (2003)"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1007\/3-540-44647-8_24","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"O. Goldreich","year":"2001","unstructured":"Goldreich, O., Lindell, Y.: Session-Key Generation Using Human Passwords Only. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 408\u2013432. Springer, Heidelberg (2001)"},{"issue":"5","key":"3_CR17","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/242896.242897","volume":"26","author":"D. Jablon","year":"1996","unstructured":"Jablon, D.: Strong Password-Only Authenticated Key Exchange. Computer Communication Review, ACM SIGCOMM\u00a026(5), 5\u201326 (1996)","journal-title":"Computer Communication Review, ACM SIGCOMM"},{"key":"3_CR18","first-page":"248","volume-title":"WETICE 1997","author":"D.P. Jablon","year":"1997","unstructured":"Jablon, D.P.: Extended Password Key Exchange Protocols Immune to Dictionary Attacks. In: WETICE 1997, pp. 248\u2013255. IEEE Computer Society, Los Alamitos (June 1997)"},{"key":"3_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/3-540-44987-6_29","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"J. Katz","year":"2001","unstructured":"Katz, J., Ostrovsky, R., Yung, M.: Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 475\u2013494. Springer, Heidelberg (2001)"},{"key":"3_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36413-7_3","volume-title":"Security in Communication Networks","author":"J. Katz","year":"2003","unstructured":"Katz, J., Ostrovsky, R., Yung, M.: Forward Security in Password-Only Key Exchange Protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol.\u00a02576, Springer, Heidelberg (2003)"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Kim, Y., Perrig, A., Tsudik, G.: Simple and Fault-tolerant Key Agreement for Dynamic Collaborative Groups. In: Proceedings of CCS 2000 (2000)","DOI":"10.1145\/352600.352638"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Kim, Y., Perrig, A., Tsudik, G.: Communication-Efficient Group Key Agreement. In: Proceedings of IFIP SEC 2001 (2001)","DOI":"10.1007\/0-306-46998-7_16"},{"key":"3_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-540-30079-3_20","volume-title":"Trust and Privacy in Digital Business","author":"S.-M. Lee","year":"2004","unstructured":"Lee, S.-M., Hwang, J.Y., Lee, D.H.: Efficient Password-Based Group Key Exchange. In: Katsikas, S.K., Lopez, J., Pernul, G. (eds.) TrustBus 2004. LNCS, vol.\u00a03184, pp. 191\u2013199. Springer, Heidelberg (2004)"},{"issue":"4","key":"3_CR24","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/506106.506108","volume":"34","author":"C.-L. Lin","year":"2000","unstructured":"Lin, C.-L., Sun, H.-M., Hwang, T.: Three-party Encrypted Key Exchange: Attacks and A Solution. ACM Operating Systems Review\u00a034(4), 12\u201320 (2000)","journal-title":"ACM Operating Systems Review"},{"issue":"12","key":"3_CR25","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1109\/4234.974498","volume":"5","author":"C.-L. Lin","year":"2001","unstructured":"Lin, C.-L., Sun, H.-M., Hwang, T.: Three-party Encrypted Key Exchange Without Server Public-Keys. IEEE Communications Letters\u00a05(12), 497\u2013499 (2001)","journal-title":"IEEE Communications Letters"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Lucks, S.: Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys. In: Security Protocols Workshop, pp. 79\u201390 (1997)","DOI":"10.1007\/BFb0028161"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"MacKenzie, P.: The PAK suite: Protocols for Password-Authenticated Key Exchange. Submission to IEEE P1363.2, (April 2002)","DOI":"10.1007\/3-540-45708-9_25"},{"key":"3_CR28","unstructured":"McGrew, D., Sherman, A.: Key Establishment in Large Dynamic Groups Using One-way Function Trees. Techinical Report 0755, Network Associates, Inc (1998)"},{"key":"3_CR29","unstructured":"Perrig, A., Song, D., Tygar, D.: ELK, A New Protocol for Efficient Large-Group Key Distribution. In: Proceedings of IEEE Syposium on Security and Privacy (2001)"},{"key":"3_CR30","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - CRYPTO 1988","author":"D. Steer","year":"1990","unstructured":"Steer, D., Strawczynski, L., Diffie, W., Wiener, M.: A Secure Audio Teleconference System. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, Springer, Heidelberg (1990)"},{"issue":"3","key":"3_CR31","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1145\/206826.206834","volume":"29","author":"M. Steiner","year":"1995","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: Refinement and Extension of Encrypted Key Exchange. ACM SIGOPS Operating Systems Review\u00a029(3), 22\u201330 (1995)","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"3_CR32","doi-asserted-by":"crossref","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman Key Distribution Extended to Group Communication. In: Proceedings of CCS 1996 (March 1996)","DOI":"10.1145\/238168.238182"},{"key":"3_CR33","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: Cliques: A New Approach to Group Key Agreement. In: IEEE TPDS (August 2000)"},{"key":"3_CR34","doi-asserted-by":"crossref","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: Key Agreement in Dynamic Peer Groups. In: IEEE Transactions on Parallel and Distributed Systems (August 2000)","DOI":"10.1109\/71.877936"},{"key":"3_CR35","unstructured":"Tang, Q., Chen, L.: Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols. Cryptology ePrint Archive (2005)\/197"},{"key":"3_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11767480_11","volume-title":"Applied Cryptography and Network Security","author":"Q. Tang","year":"2006","unstructured":"Tang, Q., Choo, K.-K.: Secure Password-based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol.\u00a03989, Springer, Heidelberg (2006)"},{"key":"3_CR37","doi-asserted-by":"crossref","unstructured":"Wallner, D.M., Harder, E.J., Agee, R.C.: Key Management for Multicast: Issues and Architectures, Internet Request for Comments 2627, (June 1999)","DOI":"10.17487\/rfc2627"},{"key":"3_CR38","doi-asserted-by":"crossref","unstructured":"Wong, C.K., Gouda, M., Lam, S.: Secure Group Communications Using Key Graphs. In: Proceedings of SIGCOMM 1998 (1998)","DOI":"10.1145\/285237.285260"},{"key":"3_CR39","unstructured":"Wu, T.: The Secure Remote Password Protocol. In: 1998 Internet Society Symposium on Network and Distributed System Security, pp. 97\u2013111 (1998)"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77048-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T13:13:54Z","timestamp":1737551634000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77048-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540770473","9783540770480"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77048-0_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}