{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,8]],"date-time":"2025-02-08T17:10:11Z","timestamp":1739034611997,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642006715"},{"type":"electronic","value":"9783642006722"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00672-2_52","type":"book-chapter","created":{"date-parts":[[2009,3,21]],"date-time":"2009-03-21T17:04:48Z","timestamp":1237655088000},"page":"562-567","source":"Crossref","is-referenced-by-count":2,"title":["Efficient Hybrid Password-Based Authenticated Group Key Exchange"],"prefix":"10.1007","author":[{"given":"Shuhua","family":"Wu","sequence":"first","affiliation":[]},{"given":"Yuefei","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"52_CR1","doi-asserted-by":"crossref","unstructured":"Bellovin, S.M., Merritt, M.: Encrypted key exchange: password-based protocols secure against dictionary attacks. In: Proc. of 1992 IEEE Computer Society Symp. on Research in security and Privacy, pp. 72\u201384 (May 1992)","DOI":"10.1109\/RISP.1992.213269"},{"key":"52_CR2","first-page":"241","volume-title":"ACM CCS 2003","author":"E. Bresson","year":"2003","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: Security proofs for an efficient password-based key exchange. In: ACM CCS 2003, pp. 241\u2013250. ACM Press, New York (2003)"},{"key":"52_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-540-24632-9_11","volume-title":"Public Key Cryptography \u2013 PKC 2004","author":"E. Bresson","year":"2004","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: New security results on encrypted key exchange. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol.\u00a02947, pp. 145\u2013158. Springer, Heidelberg (2004)"},{"key":"52_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-540-30574-3_14","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"M. Abdalla","year":"2005","unstructured":"Abdalla, M., Pointcheval, D.: Simple password-based encrypted key exchange protocols. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol.\u00a03376, pp. 191\u2013208. Springer, Heidelberg (2005)"},{"key":"52_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-540-30580-4_5","volume-title":"Public Key Cryptography - PKC 2005","author":"M. Abdalla","year":"2005","unstructured":"Abdalla, M., Chevassut, O., Pointcheval, D.: One-time verifier-based encrypted key exchange. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol.\u00a03386, pp. 47\u201364. Springer, Heidelberg (2005)"},{"key":"52_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1007\/3-540-36178-2_31","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"E. Bresson","year":"2002","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: Group diffie-hellman key exchange secure against dictionary attacks. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 497\u2013514. Springer, Heidelberg (2002)"},{"issue":"1","key":"52_CR7","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1504\/IJWMC.2007.013791","volume":"2","author":"E. Bresson","year":"2007","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: A Security Solution for IEEE 802.11\u2019s Ad-hoc Mode: Password-Authentication and Group-Diffie-Hellman Key Exchange. International Journal of Wireless and Mobile Computing\u00a02(1), 4\u201313 (2007)","journal-title":"International Journal of Wireless and Mobile Computing"},{"key":"52_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/11745853_28","volume-title":"Public Key Cryptography - PKC 2006","author":"M. Abdalla","year":"2006","unstructured":"Abdalla, M., Bresson, E., Chevassut, O., Pointcheval, D.: Password-based group key exchange in a constant number of rounds. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol.\u00a03958, pp. 427\u2013442. Springer, Heidelberg (2006)"},{"key":"52_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/11935230_22","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2006","author":"M. Abdalla","year":"2006","unstructured":"Abdalla, M., Pointcheval, D.: A scalable password-based group key exchange protocol in the standard model. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol.\u00a04284, pp. 332\u2013347. Springer, Heidelberg (2006)"},{"issue":"1","key":"52_CR10","first-page":"30","volume":"3","author":"R. Dutta","year":"2006","unstructured":"Dutta, R., Barua, R.: Password-based encrypted group key agreement. International Journal of Network Security\u00a03(1), 30\u201341 (2006), http:\/\/isrc.nchu.edu.tw\/ijns","journal-title":"International Journal of Network Security"},{"key":"52_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-540-30539-2_18","volume-title":"Advances in Cryptology - ASIACRYPT 2004","author":"H.-J. Kim","year":"2004","unstructured":"Kim, H.-J., Lee, S.-M., Lee, D.H.: Constant-round authenticated group key exchange for dynamic groups. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol.\u00a03329, pp. 245\u2013259. Springer, Heidelberg (2004)"},{"key":"52_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/BFb0053443","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Burmester","year":"1995","unstructured":"Burmester, M., Desmedt, Y.: A secure and efficient conference key distribution system. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 275\u2013286. Springer, Heidelberg (1995)"},{"issue":"3","key":"52_CR13","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.ipl.2005.01.003","volume":"94","author":"M. Burmester","year":"2005","unstructured":"Burmester, M., Desmedt, Y.: A secure and scalable group key exchange system. Information Processing Letters\u00a094(3), 137\u2013143 (2005)","journal-title":"Information Processing Letters"},{"key":"52_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/11506157_9","volume-title":"Information Security and Privacy","author":"R. Dutta","year":"2005","unstructured":"Dutta, R., Barua, R.: Dynamic Group Key Agreement in\u00a0Tree-Based\u00a0Setting. In: Boyd, C., Gonz\u00e1lez Nieto, J.M. (eds.) ACISP 2005. LNCS, vol.\u00a03574, pp. 101\u2013112. Springer, Heidelberg (2005)"},{"key":"52_CR15","doi-asserted-by":"crossref","unstructured":"Agarwal, D., Chevassut, O., Thompson, M.R., Tsudik, G.: An integrated solution for secure group communication in wide-area networks. In: Proc. of 6th IEEE Symposium on Computers and Communications, pp. 22\u201328. IEEE Computer Society Press, Los Alamitos; also Technical Report LBNL-47158, Lawrence Berkeley National Laboratory","DOI":"10.1109\/ISCC.2001.935350"},{"key":"52_CR16","doi-asserted-by":"crossref","unstructured":"Amir, Y., Kim, Y., Nita-Rotaru, C., Schultz, J., Stanton, J., Tsudik, G.: Secure group communication using robust contributory key agreement. IEEE Transactions on Parallel and Distributed Systems\u00a015(5), 468\u2013480","DOI":"10.1109\/TPDS.2004.1278104"},{"key":"52_CR17","doi-asserted-by":"crossref","unstructured":"Rodeh, O., Birman, K.P., Dolev, D.: The architecture and performance of the security protocols in the ensemble group communication system. ACM Trans. on Information and System Security\u00a04(3), 289\u2013319 (August)","DOI":"10.1145\/501978.501982"},{"key":"52_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/11745853_28","volume-title":"Public Key Cryptography - PKC 2006","author":"M. Abdalla","year":"2006","unstructured":"Abdalla, M., Bresson, E., Chevassut, O., Pointcheval, D.: Password-based group key exchange in a constant number of rounds. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol.\u00a03958, pp. 427\u2013442. Springer, Heidelberg (2006)"},{"issue":"1","key":"52_CR19","first-page":"30","volume":"3","author":"R. Dutta","year":"2006","unstructured":"Dutta, R., Barua, R.: Password-based encrypted group key agreement. International Journal of Network Security\u00a03(1), 30\u201341 (2006), http:\/\/isrc.nchu.edu.tw\/ijns","journal-title":"International Journal of Network Security"},{"key":"52_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-540-30079-3_20","volume-title":"Trust and Privacy in Digital Business","author":"S.-M. Lee","year":"2004","unstructured":"Lee, S.-M., Hwang, J.Y., Lee, D.H.: Efficient password-based group key exchange. In: Katsikas, S.K., L\u00f3pez, J., Pernul, G. (eds.) TrustBus 2004. LNCS, vol.\u00a03184, pp. 191\u2013199. Springer, Heidelberg (2004)"},{"key":"52_CR21","first-page":"62","volume-title":"ACM CCS 1993: 1st Conference on Computer and Communications Security","author":"M. Bellare","year":"1993","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM CCS 1993: 1st Conference on Computer and Communications Security, Fairfax, Virginia, USA, pp. 62\u201373. ACM Press, New York (1993)"},{"key":"52_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-540-30580-4_6","volume-title":"Public Key Cryptography - PKC 2005","author":"M. Abdalla","year":"2005","unstructured":"Abdalla, M., Fouque, P.-A., Pointcheval, D.: Password-based authenticated key exchange in the three-party setting. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol.\u00a03386, pp. 65\u201384. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Advances in Data and Web Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00672-2_52","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,8]],"date-time":"2025-02-08T16:33:49Z","timestamp":1739032429000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00672-2_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642006715","9783642006722"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00672-2_52","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}