{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:57:37Z","timestamp":1725555457813},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642128264"},{"type":"electronic","value":"9783642128271"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12827-1_23","type":"book-chapter","created":{"date-parts":[[2010,5,5]],"date-time":"2010-05-05T15:15:11Z","timestamp":1273072511000},"page":"308-323","source":"Crossref","is-referenced-by-count":7,"title":["A Deniable Group Key Establishment Protocol in the Standard Model"],"prefix":"10.1007","author":[{"given":"Yazhe","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Kunpeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Bao","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/11507840_31","volume-title":"Financial Cryptography and Data Security","author":"M. Abdalla","year":"2005","unstructured":"Abdalla, M., Pointcheval, D.: Interactive Diffie-Hellman Assumptions With Applications to Password-Based Authentication. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol.\u00a03570, pp. 341\u2013356. Springer, Heidelberg (2005)"},{"issue":"2","key":"23_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/996943.996946","volume":"7","author":"W. Aiello","year":"2004","unstructured":"Aiello, W., Bellovin, S.M., Blaze, M., Canetti, M., Ioannidis, J., Keromytis, A.D., Reingold, O.: Just Fast Keying: Key Agreement In A Hostile Internet. ACM Transactions on Information and System Security\u00a07(2), 1\u201330 (2004)","journal-title":"ACM Transactions on Information and System Security"},{"key":"23_CR3","series-title":"Lecture Notes in Computer Science","first-page":"232","volume-title":"CRYPTO 1993","author":"M. Bellare","year":"1999","unstructured":"Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a01440, pp. 232\u2013249. Springer, Heidelberg (1999)"},{"doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Provably-Secure Session Key Distribution: the Three Party Case. In: STOC 1995 (1995)","key":"23_CR4","DOI":"10.1145\/225058.225084"},{"doi-asserted-by":"crossref","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols. In: STOC 1998 (1998)","key":"23_CR5","DOI":"10.1145\/276698.276854"},{"key":"23_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-45539-6_11","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure Against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 139\u2013155. Springer, Heidelberg (2000)"},{"key":"23_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1007\/11958239_20","volume-title":"Progress in Cryptology - VIETCRYPT 2006","author":"J.-M. Bohli","year":"2006","unstructured":"Bohli, J.-M., Steinwandt, R.: Deniable Group Key Agreement. In: Nguy\u00ean, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol.\u00a04341, pp. 298\u2013311. Springer, Heidelberg (2006)"},{"key":"23_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/11751595_39","volume-title":"Computational Science and Its Applications - ICCSA 2006","author":"J.-M. Bohli","year":"2006","unstructured":"Bohli, J.-M.: A framework for robust group key agreement. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Lagan\u00e1, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol.\u00a03982, pp. 355\u2013364. Springer, Heidelberg (2006)"},{"key":"23_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/11542322_31","volume-title":"Security Protocols","author":"C. Boyd","year":"2005","unstructured":"Boyd, C., Mao, W., Paterson, K.G.: Deniable Authenticated Key Establishment for Internet Protocols. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2003. LNCS, vol.\u00a03364, pp. 255\u2013271. Springer, Heidelberg (2005)"},{"key":"23_CR10","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1145\/501983.502018","volume-title":"Proc. of 8th Annual ACM Conference on Computer and Communications Security","author":"E. Bresson","year":"2001","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.-J.: Provably Athenticated Group Diffie-Hellman Key Exchange. In: Proc. of 8th Annual ACM Conference on Computer and Communications Security, pp. 255\u2013264. ACM Press, New York (2001)"},{"key":"23_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/978-3-540-75651-4_20","volume-title":"Advances in Information and Computer Security","author":"E. Bresson","year":"2007","unstructured":"Bresson, E., Manulis, M., Schwenk, J.: On Security Models and Compilers for Group Key Exchange Protocols. In: Miyaji, A., Kikuchi, H., Rannenberg, K. (eds.) IWSEC 2007. LNCS, vol.\u00a04752, pp. 292\u2013307. Springer, Heidelberg (2007)"},{"key":"23_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/978-3-540-73547-2_41","volume-title":"Autonomic and Trusted Computing","author":"E. Bresson","year":"2007","unstructured":"Bresson, E., Manulis, M.: Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.) ATC 2007. LNCS, vol.\u00a04610, pp. 395\u2013409. Springer, Heidelberg (2007)"},{"issue":"3","key":"23_CR13","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1049\/iet-ifs:20070113","volume":"2","author":"E. Bresson","year":"2008","unstructured":"Bresson, E., Manulis, M.: Contributory group key exchange in the presence of malicious participants. IET Inf. Sec.\u00a02(3), 85\u201393 (2008)","journal-title":"IET Inf. Sec."},{"key":"23_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/BFb0053443","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Burmester","year":"1995","unstructured":"Burmester, M., Desmedt, Y.: A Secure and Efficient Conference Key Distribution System. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 275\u2013286. Springer, Heidelberg (1995)"},{"key":"23_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/3-540-44987-6_28","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"R. Canetti","year":"2001","unstructured":"Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 453\u2013474. Springer, Heidelberg (2001)"},{"key":"23_CR16","first-page":"388","volume-title":"19th International Conference on Advanced Information Networking and Applications (AINA 2005)","author":"T. Cao","year":"2005","unstructured":"Cao, T., Lin, D., Xue, R.: An Efficient ID-Based Deniable Authentication Protocol from Pairings. In: 19th International Conference on Advanced Information Networking and Applications (AINA 2005), vol.\u00a01 (AINA papers), pp. 388\u2013391. IEEE, Los Alamitos (2005)"},{"doi-asserted-by":"crossref","unstructured":"Kaufman, C. (ed.): Internet Key Exchange (IKEv2) Protocol. Network Working Group Request for Comments: 4306 (December 2005), http:\/\/www.ietf.org\/rfc\/rfc4306.txt","key":"23_CR17","DOI":"10.17487\/rfc4306"},{"key":"23_CR18","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transactions on Information Theory\u00a022, 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"doi-asserted-by":"crossref","unstructured":"Feige, U., Fiat, A., Shamir, A.: Zero-Knowledge Proofs of Identity. In: Proceeding of STOC 1987, pp. 210\u2013217 (1987);","key":"#cr-split#-23_CR19.1","DOI":"10.1145\/28395.28419"},{"doi-asserted-by":"crossref","unstructured":"J. Cryptology\u00a01, 77\u201395 (1988)","key":"#cr-split#-23_CR19.2","DOI":"10.1007\/BF02351717"},{"key":"23_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1007\/978-3-642-00468-1_11","volume-title":"PKC 2009","author":"H. Ghodosi","year":"2009","unstructured":"Ghodosi, H., Pieprzyk, J.: Multi-Party Computation with Omnipresent Adversary. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol.\u00a05443, pp. 180\u2013195. Springer, Heidelberg (2009)"},{"key":"23_CR21","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546891","volume-title":"Foundations of Cryptography: Basic Tools.","author":"D. Goldreich","year":"2001","unstructured":"Goldreich, D.: Foundations of Cryptography: Basic Tools. Cambridge University Press, Cambridge (2001)"},{"key":"23_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-3-540-78967-3_17","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2008","author":"V. Goyal","year":"2008","unstructured":"Goyal, V., Mohassel, P., Smith, A.: Efficient Two Party and Multi Party Computation Against Covert Adversaries. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol.\u00a04965, pp. 289\u2013306. Springer, Heidelberg (2008)"},{"doi-asserted-by":"crossref","unstructured":"Kanukurthi, B., Reyzin, L.: Key Agreement from Close Secrets over Unsecured Channels. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.\u00a05479, pp. 206\u2013223. Springer, Heidelberg (2009)","key":"23_CR23","DOI":"10.1007\/978-3-642-01001-9_12"},{"key":"23_CR24","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1145\/1102120.1102146","volume-title":"12th ACM Conference on Computer and Communications Security","author":"J. Katz","year":"2005","unstructured":"Katz, J., Shin, J.S.: Modeling insider attacks on group key-exchange protocols. In: 12th ACM Conference on Computer and Communications Security, pp. 180\u2013189. ACM Press, New York (2005)"},{"key":"23_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1007\/978-3-540-45146-4_7","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"J. Katz","year":"2003","unstructured":"Katz, J., Yung, M.: Scalable Protocols for Authenticated Group Key Exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 110\u2013125. Springer, Heidelberg (2003)"},{"key":"23_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-540-30539-2_18","volume-title":"Advances in Cryptology - ASIACRYPT 2004","author":"H.J. Kim","year":"2004","unstructured":"Kim, H.J., Lee, S.U., Lee, D.H.: Constant-Round Authenticated Group Key Exchange for Dynamic Groups. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol.\u00a03329, pp. 245\u2013259. Springer, Heidelberg (2004)"},{"key":"23_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1007\/978-3-540-45146-4_24","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"H. Krawczyk","year":"2003","unstructured":"Krawczyk, H.: SIGMA: The \u2019SIGn-and-MAc\u2019 Approach to Authenticated Diffie-Hellman and Its Use in the IKE Protocols. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 400\u2013425. Springer, Heidelberg (2003)"},{"unstructured":"Mao, W., Paterson, K.G.: On The Plausible Deniability Feature of Internet Protocols, http:\/\/isg.rhul.ac.uk\/~kp\/IKE.ps","key":"23_CR28"},{"key":"23_CR29","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1109\/CIT.2005.109","volume-title":"The Fifth International Conference on Computer and Information Technology (CIT 2005)","author":"H. Qian","year":"2005","unstructured":"Qian, H., Cao, Z., Wang, L., Xue, Q.: Efficient Noninteractive Deniable Authentication Protocols. In: The Fifth International Conference on Computer and Information Technology (CIT 2005), pp. 673\u2013679. IEEE, Los Alamitos (2005)"},{"key":"23_CR30","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1145\/1368310.1368349","volume-title":"ASIACCS","author":"R. Safavi-Naini","year":"2008","unstructured":"Safavi-Naini, R., Jiang, S.: Non-interactive conference key distribution and its applications. In: ASIACCS, pp. 271\u2013282. ACM, New York (2008)"},{"key":"23_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/0-387-34805-0_22","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"C.-P. Schnorr","year":"1990","unstructured":"Schnorr, C.-P.: Efficient Identification and Signatures for Smart Cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 239\u2013252. Springer, Heidelberg (1990)"}],"container-title":["Lecture Notes in Computer Science","Information Security, Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12827-1_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:57:32Z","timestamp":1606168652000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12827-1_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642128264","9783642128271"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12827-1_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}