{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T12:38:13Z","timestamp":1764333493914,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819608904"},{"type":"electronic","value":"9789819608911"}],"license":[{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0891-1_15","type":"book-chapter","created":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T22:37:14Z","timestamp":1733956634000},"page":"465-493","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Post-quantum Asynchronous Remote Key Generation for\u00a0FIDO2"],"prefix":"10.1007","author":[{"given":"Jacqueline","family":"Brendel","sequence":"first","affiliation":[]},{"given":"Sebastian","family":"Clermont","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Fischlin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,12]]},"reference":[{"doi-asserted-by":"publisher","unstructured":"Barbosa, M., Boldyreva, A., Chen, S., Warinschi, B.: Provable security analysis of FIDO2. In: Malkin, T., Peikert, C. (eds.) CRYPTO\u00a02021, Part\u00a0III. LNCS, vol. 12827, pp. 125\u2013156. Springer, Cham, Virtual Event (Aug 2021). https:\/\/doi.org\/10.1007\/978-3-030-84252-9_5","key":"15_CR1","DOI":"10.1007\/978-3-030-84252-9_5"},{"doi-asserted-by":"publisher","unstructured":"Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-privacy in public-key encryption. In: Boyd, C. (ed.) ASIACRYPT\u00a02001. LNCS, vol.\u00a02248, pp. 566\u2013582. Springer, Berlin, Heidelberg (Dec 2001). https:\/\/doi.org\/10.1007\/3-540-45682-1_33","key":"15_CR2","DOI":"10.1007\/3-540-45682-1_33"},{"doi-asserted-by":"crossref","unstructured":"Bindel, N., Cremers, C., Zhao, M.: FIDO2, CTAP 2.1, and WebAuthn 2: Provable Security and Post-Quantum Instantiation. In: IEEE Symposium on Security and Privacy (SP). pp. 674\u2013693 (2023)","key":"15_CR3","DOI":"10.1109\/SP46215.2023.10179454"},{"doi-asserted-by":"publisher","unstructured":"Bindel, N., Gama, N., Guasch, S., Ronen, E.: To attest or not to attest, this is the question - provable attestation in FIDO2. In: Guo, J., Steinfeld, R. (eds.) ASIACRYPT\u00a02023, Part\u00a0VI. LNCS, vol. 14443, pp. 297\u2013328. Springer, Singapore (Dec 2023).https:\/\/doi.org\/10.1007\/978-981-99-8736-8_10","key":"15_CR4","DOI":"10.1007\/978-981-99-8736-8_10"},{"unstructured":"Bradley, J., Hodges, J., Jones, M.B., Kumar, A., Lindemann, R., Verrept, J., Antoine, M., Bharadwaj, V., Birgisson, A., Brand, C., Czeskis, A., Duboucher, T., Ehrensv\u00e4rd, J., Ploch, M.J., Powers, A., Armstrong, C., Georgantas, K., Kaczmarczyck, F., Satragno, N., Sung, N.: Client to Authenticator Protocol (CTAP) (Jun 2022), https:\/\/fidoalliance.org\/specs\/fido-v2.1-ps-20210615\/fido-client-to-authenticator-protocol-v2.1-ps-errata-20220621.html","key":"15_CR5"},{"doi-asserted-by":"publisher","unstructured":"Brendel, J., Fischlin, M., G\u00fcnther, F., Janson, C., Stebila, D.: Towards post-quantum security for Signal\u2019s X3DH handshake. In: Dunkelman, O., Jr., M.J.J., O\u2019Flynn, C. (eds.) SAC 2020. LNCS, vol. 12804, pp. 404\u2013430. Springer, Cham (Oct 2020).https:\/\/doi.org\/10.1007\/978-3-030-81652-0_16","key":"15_CR6","DOI":"10.1007\/978-3-030-81652-0_16"},{"doi-asserted-by":"crossref","unstructured":"Frymann, N., Gardham, D., Manulis, M.: Asynchronous remote key generation for post-quantum cryptosystems from lattices. In: 2023 IEEE 8th European Symposium on Security and Privacy (EuroSP). pp. 928\u2013941. IEEE Computer Society, Los Alamitos, CA, USA (jul 2023)","key":"15_CR7","DOI":"10.1109\/EuroSP57164.2023.00059"},{"doi-asserted-by":"publisher","unstructured":"Frymann, N., Gardham, D., Kiefer, F., Lundberg, E., Manulis, M., Nilsson, D.: Asynchronous remote key generation: An analysis of yubico\u2019s proposal for W3C WebAuthn. In: Ligatti, J., Ou, X., Katz, J., Vigna, G. (eds.) ACM CCS 2020. pp. 939\u2013954. ACM Press (Nov 2023).https:\/\/doi.org\/10.1145\/3372297.3417292","key":"15_CR8","DOI":"10.1145\/3372297.3417292"},{"doi-asserted-by":"publisher","unstructured":"Frymann, N., Gardham, D., Manulis, M.: Unlinkable delegation of WebAuthn credentials. In: Atluri, V., Di Pietro, R., Jensen, C.D., Meng, W. (eds.) ESORICS\u00a02022, Part\u00a0III. LNCS, vol. 13556, pp. 125\u2013144. Springer, Cham (Sep 2022).https:\/\/doi.org\/10.1007\/978-3-031-17143-7_7","key":"15_CR9","DOI":"10.1007\/978-3-031-17143-7_7"},{"doi-asserted-by":"crossref","unstructured":"Frymann, N., Gardham, D., Manulis, M., Nartz, H.: Generalised asynchronous remote key generation for pairing-based cryptosystems. In: Applied Cryptography and Network Security: 21st International Conference, ACNS 2023, Kyoto, Japan, June 19\u201322, 2023, Proceedings, Part I. p. 394\u2013421. Springer-Verlag, Berlin, Heidelberg (2023)","key":"15_CR10","DOI":"10.1007\/978-3-031-33488-7_15"},{"doi-asserted-by":"publisher","unstructured":"Guan, J., Li, H., Ye, H., Zhao, Z.: A formal analysis of the FIDO2 protocols. In: Atluri, V., Di Pietro, R., Jensen, C.D., Meng, W. (eds.) ESORICS\u00a02022, Part\u00a0III. LNCS, vol. 13556, pp. 3\u201321. Springer, Cham (Sep 2022).https:\/\/doi.org\/10.1007\/978-3-031-17143-7_1","key":"15_CR11","DOI":"10.1007\/978-3-031-17143-7_1"},{"doi-asserted-by":"publisher","unstructured":"Hanzlik, L., Loss, J., Wagner, B.: Token meets wallet: Formalizing privacy and revocation for FIDO2. In: 2023 IEEE Symposium on Security and Privacy. pp. 1491\u20131508. IEEE Computer Society Press (May 2023).https:\/\/doi.org\/10.1109\/SP46215.2023.10179373","key":"15_CR12","DOI":"10.1109\/SP46215.2023.10179373"},{"unstructured":"Harell, C.: Yubikeys, passkeys and the future of modern authentication (03 2022), https:\/\/www.yubico.com\/blog\/passkeys-and-the-future-of-modern-authentication\/","key":"15_CR13"},{"unstructured":"Hodges, J., Jones, J., Jones, M.B., Kumar, A., Lundberg, E., Bradley, J., Brand, C., Langley, A., Mandyam, G., Satragno, N., Steele, N., Tan, J., Weeden, S., West, M., Yasskin, J.: Web Authentication: An API for accessing Public Key Credentials - Level 3 (Apr 2021), https:\/\/www.w3.org\/TR\/webauthn-3","key":"15_CR14"},{"unstructured":"H\u00fclsing, A., Bernstein, D.J., Dobraunig, C., Eichlseder, M., Fluhrer, S., Gazdag, S.L., Kampanakis, P., K\u00f6lbl, S., Lange, T., Lauridsen, M.M., Mendel, F., Niederhagen, R., Rechberger, C., Rijneveld, J., Schwabe, P., Aumasson, J.P., Westerbaan, B., Beullens, W.: SPHINCS+. Tech. rep., National Institute of Standards and Technology (2022), available at https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/selected-algorithms-2022","key":"15_CR15"},{"unstructured":"Lundberg, E., Nielsson, D.: WebAuthn Recovery Extension (2019), https:\/\/github.com\/Yubico\/webauthn-recovery-extension","key":"15_CR16"},{"unstructured":"Lyubashevsky, V., Ducas, L., Kiltz, E., Lepoint, T., Schwabe, P., Seiler, G., Stehl\u00e9, D., Bai, S.: CRYSTALS-DILITHIUM. Tech. rep., National Institute of Standards and Technology (2022), available at https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/selected-algorithms-2022","key":"15_CR17"},{"doi-asserted-by":"publisher","unstructured":"Maram, V., Xagawa, K.: Post-quantum anonymity of Kyber. In: Boldyreva, A., Kolesnikov, V. (eds.) PKC\u00a02023, Part\u00a0I. LNCS, vol. 13940, pp. 3\u201335. Springer, Cham (May 2023).https:\/\/doi.org\/10.1007\/978-3-031-31368-4_1","key":"15_CR18","DOI":"10.1007\/978-3-031-31368-4_1"},{"unstructured":"Prest, T., Fouque, P.A., Hoffstein, J., Kirchner, P., Lyubashevsky, V., Pornin, T., Ricosset, T., Seiler, G., Whyte, W., Zhang, Z.: FALCON. Tech. rep., National Institute of Standards and Technology (2022), available at https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/selected-algorithms-2022","key":"15_CR19"},{"unstructured":"Schwabe, P., Avanzi, R., Bos, J., Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schanck, J.M., Seiler, G., Stehl\u00e9, D., Ding, J.: CRYSTALS-KYBER. Tech. rep., National Institute of Standards and Technology (2022), available at https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/selected-algorithms-2022","key":"15_CR20"},{"unstructured":"Shikiar, A.: Charting an Accelerated Path Forward for Passwordless Authentication Adoption (03 2022), https:\/\/fidoalliance.org\/charting-an-accelerated-path-forward-for-passwordless-authentication-adoption\/","key":"15_CR21"},{"doi-asserted-by":"publisher","unstructured":"Stebila, D., Wilson, S.: Quantum-safe account recovery for webauthn. Cryptology ePrint Archive, Paper 2024\/678 (202https:\/\/doi.org\/10.1145\/3634737.3661138, https:\/\/eprint.iacr.org\/2024\/678, to appear at AsiaCCS \u201924","key":"15_CR22","DOI":"10.1145\/3634737.3661138"},{"doi-asserted-by":"publisher","unstructured":"Xagawa, K.: Anonymity of NIST PQC round 3 KEMs. In: Dunkelman, O., Dziembowski, S. (eds.) EUROCRYPT\u00a02022, Part\u00a0III. LNCS, vol. 13277, pp. 551\u2013581. Springer, Cham (May\u00a0\/\u00a0Jun 2022).https:\/\/doi.org\/10.1007\/978-3-031-07082-2_20","key":"15_CR23","DOI":"10.1007\/978-3-031-07082-2_20"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0891-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T22:43:47Z","timestamp":1733957027000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0891-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,12]]},"ISBN":["9789819608904","9789819608911"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0891-1_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,12]]},"assertion":[{"value":"12 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}