{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T11:18:29Z","timestamp":1778152709650,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642371189","type":"print"},{"value":"9783642371196","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37119-6_24","type":"book-chapter","created":{"date-parts":[[2013,3,26]],"date-time":"2013-03-26T20:34:59Z","timestamp":1364330099000},"page":"365-373","source":"Crossref","is-referenced-by-count":4,"title":["Scalable Deniable Group Key Establishment"],"prefix":"10.1007","author":[{"given":"Kashi","family":"Neupane","sequence":"first","affiliation":[]},{"given":"Rainer","family":"Steinwandt","sequence":"additional","affiliation":[]},{"given":"Adriana","family":"Su\u00e1rez Corona","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","unstructured":"Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation. Full paper of an extended abstract that appeared in the Proceedings of the 38th Symposium on Foundations of Computer Science. IEEE (August 1997)"},{"key":"24_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/3-540-44448-3_41","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Namprempre, C.: Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 531\u2013545. Springer, Heidelberg (2000)"},{"key":"24_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/11681878_4","volume-title":"Theory of Cryptography","author":"A. Bender","year":"2006","unstructured":"Bender, A., Katz, J., Morselli, R.: Ring Signatures: Stronger Definitions, and Constructions Without Random Oracles. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol.\u00a03876, pp. 60\u201379. Springer, Heidelberg (2006)"},{"key":"24_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1007\/11958239_20","volume-title":"Progress in Cryptology - VIETCRYPT 2006","author":"J.-M. Bohli","year":"2006","unstructured":"Bohli, J.-M., Steinwandt, R.: Deniable Group Key Agreement. In: Nguyen, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol.\u00a04341, pp. 298\u2013311. Springer, Heidelberg (2006)"},{"key":"24_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/BFb0053443","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Burmester","year":"1995","unstructured":"Burmester, M., Desmedt, Y.: A Secure and Efficient Conference Key Distribution System. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 275\u2013286. Springer, Heidelberg (1995)"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Chen, S., Cheng, Q., Ma, C.: A Deniable Group Key Exchange Protocol for Imbalanced Wireless Networks. In: Hu, B., Li, X., Yan, J. (eds.) 5th International Conference on Pervasive Computing and Applications (ICPCA 2010), pp. 1\u20135. IEEE (2010)","DOI":"10.1109\/ICPCA.2010.5871344"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Di Raimondo, M., Gennaro, R., Krawczyk, H.: Deniable Authentication and Key Exchange. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, pp. 400\u2013409. ACM (2006)","DOI":"10.1145\/1180405.1180454"},{"key":"24_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-14423-3_1","volume-title":"Information, Security and Cryptology \u2013 ICISC 2009","author":"M. Choudary Gorantla","year":"2010","unstructured":"Choudary Gorantla, M., Boyd, C., Gonz\u00e1lez Nieto, J.M., Manulis, M.: Generic One Round Group Key Exchange in the Standard Model. In: Lee, D., Hong, S. (eds.) ICISC 2009. LNCS, vol.\u00a05984, pp. 1\u201315. Springer, Heidelberg (2010)"},{"key":"24_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/978-3-540-45146-4_7","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"J. Katz","year":"2003","unstructured":"Katz, J., Yung, M.: Scalable Protocols for Authenticated Group Key Exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 110\u2013125. Springer, Heidelberg (2003)"},{"key":"24_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-540-30598-9_15","volume-title":"Security in Communication Networks","author":"N.P. Smart","year":"2005","unstructured":"Smart, N.P.: Efficient Key Encapsulation to Multiple Parties. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol.\u00a03352, pp. 208\u2013219. Springer, Heidelberg (2005)"},{"key":"24_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/978-3-642-13708-2_20","volume-title":"Applied Cryptography and Network Security","author":"A.C. Yao","year":"2010","unstructured":"Yao, A.C., Zhao, Y.: Deniable Internet Key Exchange. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol.\u00a06123, pp. 329\u2013348. Springer, Heidelberg (2010)"},{"key":"24_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1007\/978-3-642-12827-1_23","volume-title":"Information Security, Practice and Experience","author":"Y. Zhang","year":"2010","unstructured":"Zhang, Y., Wang, K., Li, B.: A Deniable Group Key Establishment Protocol in the Standard Model. In: Kwak, J., Deng, R.H., Won, Y., Wang, G. (eds.) ISPEC 2010. LNCS, vol.\u00a06047, pp. 308\u2013323. Springer, Heidelberg (2010)"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37119-6_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,27]],"date-time":"2019-01-27T18:28:43Z","timestamp":1548613723000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37119-6_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642371189","9783642371196"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37119-6_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}