{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T20:40:20Z","timestamp":1741293620036,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642223648"},{"type":"electronic","value":"9783642223655"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22365-5_3","type":"book-chapter","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T02:07:06Z","timestamp":1309226826000},"page":"16-24","source":"Crossref","is-referenced-by-count":0,"title":["Vaudenay\u2019s Privacy Model in the Universal Composability Framework: A Case Study"],"prefix":"10.1007","author":[{"given":"Herv\u00e9","family":"Chabanne","sequence":"first","affiliation":[]},{"given":"C\u00e9line","family":"Chevalier","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/3-540-45708-9_11","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"M. Bellare","year":"2002","unstructured":"Bellare, M., Palacio, A.: GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 162\u2013177. Springer, Heidelberg (2002)"},{"key":"3_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-540-89641-8_11","volume-title":"Cryptology and Network Security","author":"J. Bringer","year":"2008","unstructured":"Bringer, J., Chabanne, H., Icart, T.: Cryptanalysis of EC-RAC, a RFID Identification Protocol. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol.\u00a05339, pp. 149\u2013161. Springer, Heidelberg (2008)"},{"key":"3_CR3","first-page":"195","volume-title":"ASIACCS 2009","author":"J. Bringer","year":"2009","unstructured":"Bringer, J., Chabanne, H., Icart, T.: Efficient zero-knowledge identification schemes which respect privacy. In: ASIACCS 2009, pp. 195\u2013205. ACM Press, New York (2009)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Burmester, M., Van Le, T., de Medeiros, B., Tsudik, G.: Universally composable rfid identification and authentication protocols. ACM Trans. Inf. Syst. Secur.\u00a012(4) (2009)","DOI":"10.1145\/1513601.1513603"},{"issue":"1","key":"3_CR5","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s001459910006","volume":"13","author":"R. Canetti","year":"2000","unstructured":"Canetti, R.: Security and composition of multiparty cryptographic protocols. Journal of Cryptology\u00a013(1), 143\u2013202 (2000)","journal-title":"Journal of Cryptology"},{"key":"3_CR6","first-page":"136","volume-title":"42nd FOCS","author":"R. Canetti","year":"2001","unstructured":"Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: 42nd FOCS, pp. 136\u2013145. IEEE Computer Society Press, Los Alamitos (2001)"},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1007\/11426639_24","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"R. Canetti","year":"2005","unstructured":"Canetti, R., Halevi, S., Katz, J., Lindell, Y., MacKenzie, P.D.: Universally Composable Password-Based Key Exchange. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 404\u2013421. Springer, Heidelberg (2005)"},{"key":"3_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-540-45146-4_16","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"R. Canetti","year":"2003","unstructured":"Canetti, R., Rabin, T.: Universal Composition with Joint State. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 265\u2013281. Springer, Heidelberg (2003)"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"490","DOI":"10.1007\/3-540-46416-6_42","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"M. Girault","year":"1991","unstructured":"Girault, M.: Self-certified public keys. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 490\u2013497. Springer, Heidelberg (1991)"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-540-24632-9_13","volume-title":"Public Key Cryptography \u2013 PKC 2004","author":"T. Koshiba","year":"2004","unstructured":"Koshiba, T., Kurosawa, K.: Short Exponent Diffie-Hellman Problems. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol.\u00a02947, pp. 173\u2013186. Springer, Heidelberg (2004)"},{"key":"3_CR11","first-page":"242","volume-title":"ASIACCS 2007","author":"T. Le Van","year":"2007","unstructured":"Van Le, T., Burmester, M., de Medeiros, B.: Universally composable and forward-secure RFID authentication and authenticated key exchange. In: ASIACCS 2007, pp. 242\u2013252. ACM Press, New York (2007)"},{"key":"3_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1007\/11967668_24","volume-title":"Topics in Cryptology \u2013 CT-RSA 2007","author":"M. McLoone","year":"2006","unstructured":"McLoone, M., Robshaw, M.J.B.: Public key cryptography and RFID tags. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol.\u00a04377, pp. 372\u2013384. Springer, Heidelberg (2006)"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Nyamy, D.D., Elrharbi, S., Urien, P., Chabanne, H., Icart, T., P\u00e9pin, C., Bouet, M., De Oliveira Cunha, D., Guyot, V., Krzanik, P., Susini, J.-F.: HIP tags, a new paradigm for the Internet of Things. In: Proceedings of the 1st IFIP Wireless Days Conference \u2013 IFIP 2008, Dubai, United Arab Emirates (November 2008)","DOI":"10.1109\/WD.2008.4812927"},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/BFb0054143","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"G. Poupard","year":"1998","unstructured":"Poupard, G., Stern, J.: Security Analysis of a Practical \u201cOn the Fly\u201d Authentication and Signature Generation. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 422\u2013436. Springer, Heidelberg (1998)"},{"key":"3_CR15","unstructured":"Urien, P., Lee, G.M., Pujolle G.: Hip support for rfids, http:\/\/tools.ietf.org\/html\/draft-irtf-hiprg-rfid-00"},{"key":"3_CR16","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1109\/ICSNC.2008.21","volume-title":"Proceedings of the 3rd International Conference on Systems and Networks Communications \u2013 ICSNC 2008","author":"P. Urien","year":"2008","unstructured":"Urien, P., Nyami, D., Elrharbi, S., Chabanne, H., Icart, T., P\u00e9pin, C., Bouet, M., De Oliveira Cunha, D., Guyot, V., Pujolle, G., Gressier-Soudan, E., Susini, J.-F.: HIP Tags Privacy Architecture. In: Proceedings of the 3rd International Conference on Systems and Networks Communications \u2013 ICSNC 2008, pp. 179\u2013184. IEEE, IEEE Computer Society, Sliema, Malta (2008)"},{"key":"3_CR17","unstructured":"van Deursen, T., Radomirovic, S.: Untraceable rfid protocols are not trivially composable: Attacks on the revision of ec-rac. Cryptology ePrint Archive: Report 2009\/332"},{"key":"3_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/3-540-68339-9_29","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"P.C. Oorschot van","year":"1996","unstructured":"van Oorschot, P.C., Wiener, M.J.: On Diffie-Hellman Key Agreement with Short Exponents. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 332\u2013343. Springer, Heidelberg (1996)"},{"key":"3_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-540-76900-2_5","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"S. Vaudenay","year":"2007","unstructured":"Vaudenay, S.: On privacy models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.\u00a04833, pp. 68\u201387. Springer, Heidelberg (2007)"},{"issue":"11","key":"3_CR20","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1016\/j.tcs.2008.10.027","volume":"410","author":"A.C.-C. Yao","year":"2009","unstructured":"Yao, A.C.-C., Yao, F.F., Zhao, Y.: A note on universal composable zero-knowledge in the common reference string model. Theor. Comput. Sci.\u00a0410(11), 1099\u20131108 (2009)","journal-title":"Theor. Comput. Sci."}],"container-title":["Communications in Computer and Information Science","Secure and Trust Computing, Data Management, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22365-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T19:30:00Z","timestamp":1741289400000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22365-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642223648","9783642223655"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22365-5_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}