{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:49:37Z","timestamp":1743072577894,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642217920"},{"type":"electronic","value":"9783642217937"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21793-7_38","type":"book-chapter","created":{"date-parts":[[2011,6,26]],"date-time":"2011-06-26T18:48:21Z","timestamp":1309114101000},"page":"339-348","source":"Crossref","is-referenced-by-count":2,"title":["Server-Aided Password-Authenticated Key Exchange: From 3-Party to Group"],"prefix":"10.1007","author":[{"given":"Junghyun","family":"Nam","sequence":"first","affiliation":[]},{"given":"Juryon","family":"Paik","sequence":"additional","affiliation":[]},{"given":"Jeeyeon","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Youngsook","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"38_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/978-3-540-70936-7_27","volume-title":"Theory of Cryptography","author":"M. Abdalla","year":"2007","unstructured":"Abdalla, M., Bohli, J.-M., Gonz\u00e1lez Vasco, M.I., Steinwandt, R. (Password) authenticated key establishment: From 2-party to group. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol.\u00a04392, pp. 499\u2013514. Springer, Heidelberg (2007)"},{"key":"38_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/11745853_28","volume-title":"Public Key Cryptography - PKC 2006","author":"M. Abdalla","year":"2006","unstructured":"Abdalla, M., Bresson, E., Chevassut, O., Pointcheval, D.: Password-based group key exchange in a constant number of rounds. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol.\u00a03958, pp. 427\u2013442. Springer, Heidelberg (2006)"},{"key":"38_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-540-30580-4_6","volume-title":"Public Key Cryptography - PKC 2005","author":"M. Abdalla","year":"2005","unstructured":"Abdalla, M., Fouque, P.-A., Pointcheval, D.: Password-based authenticated key exchange in the three-party setting. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol.\u00a03386, pp. 65\u201384. Springer, Heidelberg (2005)"},{"key":"38_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/3-540-36288-6_12","volume-title":"Public Key Cryptography - PKC 2003","author":"C. Boyd","year":"2002","unstructured":"Boyd, C., Nieto, J.: Round-optimal contributory conference key agreement. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol.\u00a02567, pp. 161\u2013174. Springer, Heidelberg (2002)"},{"key":"38_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1007\/3-540-36178-2_31","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"E. Bresson","year":"2002","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: Group diffie-hellman key exchange secure against dictionary attacks. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 497\u2013514. Springer, Heidelberg (2002)"},{"key":"38_CR6","doi-asserted-by":"crossref","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.-J.: Provably authenticated group Diffie-Hellman key exchange. In: 8th ACM Conference\u00a0on Computer and Communications Security (CCS 2001), pp. 255\u2013264 (2001)","DOI":"10.1145\/501983.502018"},{"key":"38_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/BFb0053443","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Burmester","year":"1995","unstructured":"Burmester, M., Desmedt, Y.G.: A secure and efficient conference key distribution system. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 275\u2013286. Springer, Heidelberg (1995)"},{"key":"38_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/3-540-62494-5_12","volume-title":"Security Protocols","author":"M. Burmester","year":"1997","unstructured":"Burmester, M., Desmedt, Y.: Efficient and secure conference-key distribution. In: Lomas, M. (ed.) Security Protocols 1996. LNCS, vol.\u00a01189, pp. 119\u2013129. Springer, Heidelberg (1997)"},{"key":"38_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/11496137_6","volume-title":"Applied Cryptography and Network Security","author":"J.W. Byun","year":"2005","unstructured":"Byun, J.W., Lee, D.-H.: N-party encrypted diffie-hellman key exchange using different passwords. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol.\u00a03531, pp. 75\u201390. Springer, Heidelberg (2005)"},{"key":"38_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/11734666_2","volume-title":"Security in Pervasive Computing","author":"J.W. Byun","year":"2006","unstructured":"Byun, J.W., Lee, S.-M., Lee, D.-H., Hong, D.: Constant-round password-based group key generation for multi-layer ad-hoc networks. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol.\u00a03934, pp. 3\u201317. Springer, Heidelberg (2006)"},{"key":"38_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1007\/11593447_34","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"K.-K.R. Choo","year":"2005","unstructured":"Choo, K.-K.R., Boyd, C., Hitchcock, Y.: Errors in computational complexity proofs for protocols. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol.\u00a03788, pp. 624\u2013643. Springer, Heidelberg (2005)"},{"key":"38_CR12","unstructured":"Facebook, http:\/\/www.facebook.com"},{"issue":"5","key":"38_CR13","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1109\/TIT.1982.1056542","volume":"28","author":"I. Ingemarsson","year":"1982","unstructured":"Ingemarsson, I., Tang, D., Wong, C.: A conference key distribution system. IEEE Transactions on Information Theory\u00a028(5), 714\u2013720 (1982)","journal-title":"IEEE Transactions on Information Theory"},{"key":"38_CR14","doi-asserted-by":"crossref","unstructured":"Katz, J., Shin, J.: Modeling insider attacks on group key-exchange protocols. In: 12th ACM Conference on Computer and Communications Security (CCS 2005), pp. 180\u2013189 (2005)","DOI":"10.1145\/1102120.1102146"},{"key":"38_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/978-3-540-45146-4_7","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"J. Katz","year":"2003","unstructured":"Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 110\u2013125. Springer, Heidelberg (2003)"},{"key":"38_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-540-30539-2_18","volume-title":"Advances in Cryptology - ASIACRYPT 2004","author":"H. Kim","year":"2004","unstructured":"Kim, H., Lee, S., Lee, D.: Constant-round authenticated group key exchange for dynamic groups. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol.\u00a03329, pp. 245\u2013259. Springer, Heidelberg (2004)"},{"key":"38_CR17","doi-asserted-by":"crossref","unstructured":"Kim, Y., Perrig, A., Tsudik, G.: Simple and fault-tolerant key agreement for dynamic collaborative groups. In: 7th ACM Conference on Computer and Communications Security (CCS 2000), pp. 235\u2013244 (2000)","DOI":"10.1145\/352600.352638"},{"key":"38_CR18","doi-asserted-by":"crossref","unstructured":"Kim, Y., Perrig, A., Tsudik, G.: Communication-efficient group key agreement. In: IFIP SEC 2001, pp. 229\u2013244 (2001)","DOI":"10.1007\/0-306-46998-7_16"},{"key":"38_CR19","unstructured":"Kwon, J., Jeong, I., Sakurai, K., Lee, D.: Password-authenticated multi-party key exchange with different passwords. Cryptology ePrint Archive, Report 2006\/476 (2006)"},{"key":"38_CR20","doi-asserted-by":"crossref","unstructured":"Mayer, M., Yung, M.: Secure protocol transformation via \u201cExpansion\u201d: From two-party to groups. In: 6th ACM Conference on Computer and Communications Security (CCS 1999), pp. 83\u201392 (1999)","DOI":"10.1145\/319709.319721"},{"key":"38_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-540-72738-5_11","volume-title":"Applied Cryptography and Network Security","author":"J. Nam","year":"2007","unstructured":"Nam, J., Paik, J., Kim, U.-M., Won, D.H.: Constant-round authenticated group key exchange with logarithmic computation complexity. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol.\u00a04521, pp. 158\u2013176. Springer, Heidelberg (2007)"},{"issue":"2","key":"38_CR22","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1109\/LCOMM.2008.071384","volume":"12","author":"J. Nam","year":"2008","unstructured":"Nam, J., Paik, J., Kim, U., Won, D.: Security enhancement to a password-authenticated group key exchange protocol for mobile ad-hoc networks. IEEE Communications Letters\u00a012(2), 127\u2013129 (2008)","journal-title":"IEEE Communications Letters"},{"key":"38_CR23","doi-asserted-by":"crossref","unstructured":"Pereira, O., Quisquater, J.-J.: A security analysis of the Cliques protocols suites. In: 14th IEEE Computer Security Foundations Workshop, pp. 73\u201381 (2001)","DOI":"10.1007\/0-306-46998-7_11"},{"issue":"4","key":"38_CR24","doi-asserted-by":"publisher","first-page":"1143","DOI":"10.1016\/j.ins.2006.07.034","volume":"177","author":"K. Shim","year":"2007","unstructured":"Shim, K., Woo, S.: Cryptanalysis of tripartite and multi-party authenticated key agreement protocols. Information Sciences\u00a0177(4), 1143\u20131151 (2007)","journal-title":"Information Sciences"},{"key":"38_CR25","unstructured":"Twitter, http:\/\/twitter.com"},{"key":"38_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/11941378_10","volume-title":"Progress in Cryptology - INDOCRYPT 2006","author":"W. Wang","year":"2006","unstructured":"Wang, W., Hu, L.: Efficient and provably secure generic construction of three-party password-based authenticated key exchange protocols. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol.\u00a04329, pp. 118\u2013132. Springer, Heidelberg (2006)"},{"key":"38_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-642-04846-3_13","volume-title":"Advances in Information and Computer Security","author":"X. Yi","year":"2009","unstructured":"Yi, X., Tso, R., Okamoto, E.: ID-Based group password-authenticated key exchange. In: Takagi, T., Mambo, M. (eds.) IWSEC 2009. LNCS, vol.\u00a05824, pp. 192\u2013211. Springer, Heidelberg (2009)"}],"container-title":["Lecture Notes in Computer Science","Human Interface and the Management of Information. Interacting with Information"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21793-7_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,26]],"date-time":"2021-11-26T21:36:42Z","timestamp":1637962602000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21793-7_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642217920","9783642217937"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21793-7_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}