{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T19:05:59Z","timestamp":1774379159505,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":38,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642386152","type":"print"},{"value":"9783642386169","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38616-9_9","type":"book-chapter","created":{"date-parts":[[2013,6,4]],"date-time":"2013-06-04T07:55:16Z","timestamp":1370332516000},"page":"136-154","source":"Crossref","is-referenced-by-count":34,"title":["Quantum Key Distribution in the Classical Authenticated Key Exchange Framework"],"prefix":"10.1007","author":[{"given":"Michele","family":"Mosca","sequence":"first","affiliation":[]},{"given":"Douglas","family":"Stebila","sequence":"additional","affiliation":[]},{"given":"Berkant","family":"Ustao\u011flu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 232\u2013249. Springer, Heidelberg (1994)","DOI":"10.1007\/3-540-48329-2_21"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 453\u2013474. Springer, Heidelberg (2001)","DOI":"10.1007\/3-540-44987-6_28"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"LaMacchia, B., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol.\u00a04784, pp. 1\u201316. Springer, Heidelberg (2007)","DOI":"10.1007\/978-3-540-75670-5_1"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols (extended abstract). In: Proc. 42nd Annual IEEE Symposium on Foundations of Computer Science (FOCS), pp. 136\u2013145. IEEE Press (2001)","DOI":"10.1109\/SFCS.2001.959888"},{"key":"9_CR5","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proc. IEEE International Conf. on Computers, Systems and Signal Processing, pp. 175\u2013179. IEEE (December 1984)"},{"key":"9_CR6","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"A.K. Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell\u2019s theorem. Physical Review Letters\u00a067, 661\u2013663 (1991)","journal-title":"Physical Review Letters"},{"issue":"4","key":"9_CR7","doi-asserted-by":"crossref","first-page":"2651","DOI":"10.1103\/PhysRevA.54.2651","volume":"54","author":"E. Biham","year":"1996","unstructured":"Biham, E., Huttner, B., Mor, T.: Quantum cryptographic network based on quantum memories. Physical Review A\u00a054(4), 2651\u20132658 (1996)","journal-title":"Physical Review A"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Mayers, D.: Quantum key distribution and string oblivious transfer in noisy channels. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 343\u2013357. Springer, Heidelberg (1996)","DOI":"10.1007\/3-540-68697-5_26"},{"issue":"5410","key":"9_CR9","doi-asserted-by":"crossref","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"H.K. Lo","year":"1999","unstructured":"Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science\u00a0283(5410), 2050\u20132056 (1999)","journal-title":"Science"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Biham, E., Boyer, M., Boykin, P.O., Mor, T., Roychowdhury, V.: A proof of the security of quantum key distribution (extended abstract). In: Proc. 32nd Annual ACM Symposium on the Theory of Computing (STOC), pp. 715\u2013724. ACM Press (2000)","DOI":"10.1145\/335305.335406"},{"issue":"2","key":"9_CR11","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"P. Shor","year":"2000","unstructured":"Shor, P., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Physical Review Letters\u00a085(2), 441\u2013444 (2000)","journal-title":"Physical Review Letters"},{"issue":"4","key":"9_CR12","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1007\/s00453-002-0983-4","volume":"34","author":"H. Inamori","year":"2002","unstructured":"Inamori, H.: Security of practical time-reversed EPR quantum key distribution. Algorithmica\u00a034(4), 340\u2013365 (2002)","journal-title":"Algorithmica"},{"issue":"5","key":"9_CR13","doi-asserted-by":"crossref","first-page":"325","DOI":"10.26421\/QIC4.5-1","volume":"4","author":"D. Gottesman","year":"2004","unstructured":"Gottesman, D., Lo, H.K., L\u00fctkenhaus, N., Preskill, J.: Security of quantum key distribution with imperfect devices. Quantum Information and Computation\u00a04(5), 325\u2013360 (2004)","journal-title":"Quantum Information and Computation"},{"key":"9_CR14","unstructured":"Renner, R.: Security of Quantum Key Distribution. PhD thesis, Swiss Federal Institute of Technology Z\u00fcrich (2005)"},{"key":"9_CR15","unstructured":"Paterson, K.G., Piper, F., Schack, R.: Quantum cryptography: A practical information security perspective. In: Zukowski, M., Kilin, S., Kowalik, J. (eds.) Proc. NATO Advanced Research Workshop on Quantum Communication and Security. NATO Science for Peace and Security Series, Sub-Series D: Information and Communication Security, vol.\u00a011. IOS Press (2007), http:\/\/arxiv.org\/abs\/quant-ph\/0406147"},{"key":"9_CR16","unstructured":"All\u00e9aume, R., Bouda, J., Branciard, C., Debuisschert, T., Dianati, M., Gisin, N., Godfrey, M., Grangier, P., L\u00e4nger, T., Leverrier, A., L\u00fctkenhaus, N., Painchault, P., Peev, M., Poppe, A., Pornin, T., Rarity, J., Renner, R., Ribordy, G., Riguidel, M., Salvail, L., Shields, A., Weinfurter, H., Zeilinger, A.: SECOQC white paper on quantum key distribution and cryptography (January 2007), http:\/\/www.arxiv.org\/abs\/quant-ph\/0701168"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Stebila, D., Mosca, M., L\u00fctkenhaus, N.: The case for quantum key distribution. In: Sergienko, A., Pascazio, S., Villoresi, P. (eds.) QuantumComm 2009. LNICST, vol.\u00a036, pp. 283\u2013296. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-11731-2_35"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Ioannou, L.M., Mosca, M.: A new spin on quantum cryptography: Avoiding trapdoors and embracing public keys. In: Yang, B.-Y. (ed.) PQCrypto 2011. LNCS, vol.\u00a07071, pp. 255\u2013274. Springer, Heidelberg (2011)","DOI":"10.1007\/978-3-642-25405-5_17"},{"key":"9_CR19","unstructured":"Unruh, D.: Everlasting quantum security. Cryptology ePrint Archive, Report 2012\/177 (2012), http:\/\/eprint.iacr.org\/"},{"issue":"2","key":"9_CR20","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/s10623-011-9604-z","volume":"67","author":"I. Goldberg","year":"2013","unstructured":"Goldberg, I., Stebila, D., Ustaoglu, B.: Anonymity and one-way authentication in key exchange protocols. Designs, Codes and Cryptography\u00a067(2), 245\u2013269 (2013)","journal-title":"Designs, Codes and Cryptography"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Cachin, C., Maurer, U.: Unconditional security against memory-bounded adversaries. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01297, pp. 292\u2013306. Springer, Heidelberg (1997)","DOI":"10.1007\/BFb0052243"},{"issue":"4","key":"9_CR22","doi-asserted-by":"crossref","first-page":"594","DOI":"10.1007\/s00145-010-9068-8","volume":"23","author":"J. M\u00fcller-Quade","year":"2010","unstructured":"M\u00fcller-Quade, J., Unruh, D.: Long-term security and universal composability. Journal of Cryptology\u00a023(4), 594\u2013671 (2010)","journal-title":"Journal of Cryptology"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Ustaoglu, B.: Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols. In: Pieprzyk, J., Zhang, F. (eds.) ProvSec 2009. LNCS, vol.\u00a05848, pp. 183\u2013197. Springer, Heidelberg (2009)","DOI":"10.1007\/978-3-642-04642-1_16"},{"issue":"2","key":"9_CR24","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"J.L. Carter","year":"1979","unstructured":"Carter, J.L., Wegman, M.N.: Universal classes of hash functions. Journal of Computer and System Sciences\u00a018(2), 143\u2013154 (1979)","journal-title":"Journal of Computer and System Sciences"},{"issue":"3","key":"9_CR25","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"M.N. Wegman","year":"1981","unstructured":"Wegman, M.N., Carter, J.L.: New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences\u00a022(3), 265\u2013279 (1981)","journal-title":"Journal of Computer and System Sciences"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Ben-Or, M., Horodecki, M., Leung, D.W., Mayers, D., Oppenheim, J.: The universal composable security of quantum key distribution. In: Kilian, J. (ed.) TCC 2005. LNCS, vol.\u00a03378, pp. 386\u2013406. Springer, Heidelberg (2005)","DOI":"10.1007\/978-3-540-30576-7_21"},{"key":"9_CR27","unstructured":"Ben-Or, M., Mayers, D.: General security definition and composability for quantum & classical protocols (2004); arXiv:quant-ph\/0409062."},{"key":"9_CR28","doi-asserted-by":"crossref","unstructured":"Fehr, S., Schaffner, C.: Composing quantum protocols in a classical environment. In: Reingold, O. (ed.) TCC 2009. LNCS, vol.\u00a05444, pp. 350\u2013367. Springer, Heidelberg (2009)","DOI":"10.1007\/978-3-642-00457-5_21"},{"key":"9_CR29","unstructured":"Unruh, D.: Simulatable security for quantum protocols arXiv:quant-ph\/0409125. Extended abstract published as [31]"},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"Unruh, D.: Universally composable quantum multi-party computation (full version) (October 2009); arXiv:0910.2912. Short version published as [31]","DOI":"10.1007\/978-3-642-13190-5_25"},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"Unruh, D.: Universally composable quantum multi-party computation. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol.\u00a06110, pp. 486\u2013505. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-13190-5_25"},{"key":"9_CR32","unstructured":"Aharonov, D., Ben-Or, M., Eban, E.: Interactive proofs for quantum computations. In: Yao, A.C.C. (ed.) Proc. Innovations in Computer Science (ICS 2010), pp. 453\u2013469 (October 2010)"},{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"Cremers, C.: Examining indistinguishability-based security models for key exchange protocols: the case of CK, CK-HMQV, and eCK. In: Proc. 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011), pp. 80\u201391. ACM (2011)","DOI":"10.1145\/1966913.1966925"},{"key":"9_CR34","unstructured":"Mosca, M., Stebila, D., Ustao\u011flu, B.: Quantum key distribution in the classical authenticated key exchange framework. Cryptology ePrint Archive, Report 2012\/361 (2012), http:\/\/eprint.iacr.org\/2012\/361 , http:\/\/arxiv.iacr.org\/2012\/361"},{"key":"9_CR35","doi-asserted-by":"crossref","unstructured":"Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Springer (2003)","DOI":"10.1007\/978-3-662-09527-0"},{"key":"9_CR36","unstructured":"Christandl, M., Renner, R., Ekert, A.: A generic security proof for quantum key distribution (February 2004), http:\/\/arxiv.org\/abs\/quant-ph\/0402131v2"},{"key":"9_CR37","unstructured":"Shoup, V.: Sequences of games: A tool for taming complexity in security proofs, http:\/\/www.shoup.net\/papers\/games.pdf (2006) (first version appeared in 2004)"},{"issue":"2","key":"9_CR38","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1023\/A:1022595222606","volume":"28","author":"L. Law","year":"2003","unstructured":"Law, L., Menezes, A., Qu, M., Solinas, J., Vanstone, S.A.: An efficient protocol for authenticated key agreement. Designs, Codes and Cryptography\u00a028(2), 119\u2013134 (2003)","journal-title":"Designs, Codes and Cryptography"}],"container-title":["Lecture Notes in Computer Science","Post-Quantum Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38616-9_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,23]],"date-time":"2022-02-23T22:33:34Z","timestamp":1645655614000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38616-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642386152","9783642386169"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38616-9_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}