{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:26:31Z","timestamp":1743049591143,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642299513"},{"type":"electronic","value":"9783642299520"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29952-0_26","type":"book-chapter","created":{"date-parts":[[2012,5,3]],"date-time":"2012-05-03T06:14:09Z","timestamp":1336025649000},"page":"237-247","source":"Crossref","is-referenced-by-count":0,"title":["Computationally-Fair Group and Identity-Based Key-Exchange"],"prefix":"10.1007","author":[{"given":"Andrew C.","family":"Yao","sequence":"first","affiliation":[]},{"given":"Yunlei","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/11745853_28","volume-title":"Public Key Cryptography - PKC 2006","author":"M. Abdalla","year":"2006","unstructured":"Abdalla, M., Bresson, E., Chevassut, O., Pointcheval, D.: Password-Based Group Key Exchange in a Constant Number of Rounds. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol.\u00a03958, pp. 427\u2013442. Springer, Heidelberg (2006)"},{"key":"26_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1007\/978-3-540-40061-5_29","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"S.S. Al-Riyami","year":"2003","unstructured":"Al-Riyami, S.S., Paterson, K.G.: Certificateless Public Key Cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol.\u00a02894, pp. 452\u2013473. Springer, Heidelberg (2003)"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In: ACM Conference on Computer and Communications Security, pp. 62\u201373 (1993)","DOI":"10.1145\/168588.168596"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Bresson, E., Manulis, M.: Securing Group Key Exchange Against Strong Corruptions. In: ASIACCS 2008, pp. 249\u2013260. ACM (2008)","DOI":"10.1145\/1368310.1368347"},{"issue":"4","key":"26_CR5","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s10207-007-0018-x","volume":"6","author":"J.M. Bohli","year":"2007","unstructured":"Bohli, J.M., Gonzalez Vasco, M.I., Steinwandt, R.: Secure Group Key Establishment Revisited. International Journal of Information Security\u00a06(4), 243\u2013254 (2007)","journal-title":"International Journal of Information Security"},{"key":"26_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"26_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/BFb0053443","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Burmester","year":"1995","unstructured":"Burmester, M., Desmedt, Y.: A Secure and Efficient Conference Key Distribution System. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 275\u2013286. Springer, Heidelberg (1995)"},{"key":"26_CR8","unstructured":"Choudary Gorantla, M., Gangishetti, R., Saxena, A.: A Survey on ID-Based Cryptographic Primitives. Cryptology ePrint Archive, Report No. 2005\/094 (2005)"},{"key":"#cr-split#-26_CR9.1","doi-asserted-by":"crossref","unstructured":"Chen, L., Kudla, C.: Identity Based Key Agreement Protocols From Pairings. In: IEEE Computer Security Foundations Workshop, pp. 219-233 (2002)","DOI":"10.1109\/CSFW.2003.1212715"},{"key":"#cr-split#-26_CR9.2","doi-asserted-by":"crossref","unstructured":"Full version available at: Cryptology ePrint Archive, Report 2002\/184 (2002)","DOI":"10.1007\/s00106-002-0632-x"},{"key":"26_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/11836810_33","volume-title":"Information Security","author":"Y. Desmedt","year":"2006","unstructured":"Desmedt, Y., Pieprzyk, J., Steinfeld, R., Wang, H.: A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders. In: Katsikas, S.K., L\u00f3pez, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol.\u00a04176, pp. 459\u2013475. Springer, Heidelberg (2006)"},{"issue":"6","key":"26_CR11","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transaction on Information Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Transaction on Information Theory"},{"issue":"4","key":"26_CR12","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1007\/s00145-010-9080-z","volume":"24","author":"J.A. Garay","year":"2011","unstructured":"Garay, J.A., MacKenzie, P.D., Prabhakaran, M., Yang, K.: Resource Fairness and Composability of Cryptographic Protocols. Journal of Cryptology\u00a024(4), 615\u2013658 (2011)","journal-title":"Journal of Cryptology"},{"issue":"3","key":"26_CR13","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s00145-005-0319-z","volume":"18","author":"S. Goldwasser","year":"2005","unstructured":"Goldwasser, S., Lindell, Y.: Secure Computation without Agreement. Journal of Cryptology\u00a018(3), 247\u2013287 (2005)","journal-title":"Journal of Cryptology"},{"issue":"1","key":"26_CR14","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1006\/jagm.1997.0913","volume":"27","author":"D.M. Gordon","year":"1998","unstructured":"Gordon, D.M.: A Survey of Fast Exponentiation Methods. Journal of Algorithms\u00a027(1), 129\u2013146 (1998)","journal-title":"Journal of Algorithms"},{"key":"26_CR15","doi-asserted-by":"crossref","unstructured":"Katz, J., Shin, J.: Modeling Insider Attackss on Group Key Exchange. In: ACM CCS 2005, pp. 180\u2013189 (2005)","DOI":"10.1145\/1102120.1102146"},{"key":"26_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/978-3-540-45146-4_7","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"J. Katz","year":"2003","unstructured":"Katz, J., Yung, M.: Scalable Protocols for Authenticated Group Key Exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 110\u2013125. Springer, Heidelberg (2003)"},{"key":"26_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1007\/11535218_33","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"H. Krawczyk","year":"2005","unstructured":"Krawczyk, H.: HMQV: A High-Performance Secure Diffie-Hellman Protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 546\u2013566. Springer, Heidelberg (2005)"},{"key":"26_CR18","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography, pp. 617\u2013619. CRC Press (1995)"},{"issue":"10","key":"26_CR19","doi-asserted-by":"publisher","first-page":"980","DOI":"10.1049\/el:19980686","volume":"34","author":"C.J. Mitchell","year":"1998","unstructured":"Mitchell, C.J., Ward, M., Wilson, P.: Key Control in Key Agreement Protocols. Electronic Letters\u00a034(10), 980\u2013981 (1998)","journal-title":"Electronic Letters"},{"key":"26_CR20","unstructured":"Yao, A.C., Zhao, Y.: Method and Structure for Self-Sealed Joint Proof-of-Knowledge and Diffie-Hellman Key-Exchange Protocols. PCT Patent, No.PCT\/CN2008\/072794 (August 2008); Online available from Global Intellectual Property Office (GIPO)"},{"key":"26_CR21","unstructured":"Yao, A.C., Zhao, Y.: A New Family of Practical Non-Malleable Diffie-Hellman Protocols CoRR abs\/1105.1071 (2011)"}],"container-title":["Lecture Notes in Computer Science","Theory and Applications of Models of Computation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29952-0_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:54:14Z","timestamp":1743044054000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29952-0_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642299513","9783642299520"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29952-0_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}