{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:10:41Z","timestamp":1742922641536,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":32,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819609345"},{"type":"electronic","value":"9789819609352"}],"license":[{"start":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T00:00:00Z","timestamp":1733702400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T00:00:00Z","timestamp":1733702400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0935-2_5","type":"book-chapter","created":{"date-parts":[[2024,12,8]],"date-time":"2024-12-08T18:01:23Z","timestamp":1733680883000},"page":"134-167","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Tightly-Secure Group Key Exchange with\u00a0Perfect Forward Secrecy"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-4632-7017","authenticated-orcid":false,"given":"Emanuele","family":"Di Giandomenico","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4990-0929","authenticated-orcid":false,"given":"Doreen","family":"Riepel","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8698-4244","authenticated-orcid":false,"given":"Sven","family":"Sch\u00e4ge","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","unstructured":"Abdalla, M., Bohli, J.M., Gonz\u00e1lez Vasco, M.I., Steinwandt, R.: (Password) authenticated key establishment: From 2-party to group. In: Vadhan, S.P. (ed.) TCC\u00a02007. LNCS, vol.\u00a04392, pp. 499\u2013514. Springer, Berlin, Heidelberg (Feb 2007). https:\/\/doi.org\/10.1007\/978-3-540-70936-7_27","DOI":"10.1007\/978-3-540-70936-7_27"},{"key":"5_CR2","doi-asserted-by":"publisher","unstructured":"Alwen, J., Coretti, S., Dodis, Y., Tselekounis, Y.: Security analysis and improvements for the IETF MLS standard for group messaging. In: Micciancio, D., Ristenpart, T. (eds.) CRYPTO\u00a02020, Part\u00a0I. LNCS, vol. 12170, pp. 248\u2013277. Springer, Cham (Aug 2020). https:\/\/doi.org\/10.1007\/978-3-030-56784-2_9","DOI":"10.1007\/978-3-030-56784-2_9"},{"key":"5_CR3","doi-asserted-by":"publisher","unstructured":"Alwen, J., Coretti, S., Jost, D., Mularczyk, M.: Continuous group key agreement with active security. In: Pass, R., Pietrzak, K. (eds.) TCC\u00a02020, Part\u00a0II. LNCS, vol. 12551, pp. 261\u2013290. Springer, Cham (Nov 2020). https:\/\/doi.org\/10.1007\/978-3-030-64378-2_10","DOI":"10.1007\/978-3-030-64378-2_10"},{"key":"5_CR4","doi-asserted-by":"publisher","unstructured":"Apon, D., Dachman-Soled, D., Gong, H., Katz, J.: Constant-round group key exchange from the ring-LWE assumption. In: Ding, J., Steinwandt, R. (eds.) Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019. pp. 189\u2013205. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-25510-7_11","DOI":"10.1007\/978-3-030-25510-7_11"},{"key":"5_CR5","doi-asserted-by":"publisher","unstructured":"Bader, C., Jager, T., Li, Y., Sch\u00e4ge, S.: On the impossibility of tight cryptographic reductions. In: Fischlin, M., Coron, J.S. (eds.) EUROCRYPT\u00a02016, Part\u00a0II. LNCS, vol.\u00a09666, pp. 273\u2013304. Springer, Berlin, Heidelberg (May 2016). https:\/\/doi.org\/10.1007\/978-3-662-49896-5_10","DOI":"10.1007\/978-3-662-49896-5_10"},{"key":"5_CR6","doi-asserted-by":"publisher","unstructured":"Bienstock, A., Dodis, Y., Garg, S., Grogan, G., Hajiabadi, M., R\u00f6sler, P.: On the worst-case inefficiency of CGKA. In: Kiltz, E., Vaikuntanathan, V. (eds.) TCC\u00a02022, Part\u00a0II. LNCS, vol. 13748, pp. 213\u2013243. Springer, Cham (Nov 2022). https:\/\/doi.org\/10.1007\/978-3-031-22365-5_8","DOI":"10.1007\/978-3-031-22365-5_8"},{"key":"5_CR7","doi-asserted-by":"publisher","unstructured":"Burmester, M., Desmedt, Y.: A secure and efficient conference key distribution system (extended abstract). In: Santis, A.D. (ed.) EUROCRYPT\u201994. LNCS, vol.\u00a0950, pp. 275\u2013286. Springer, Berlin, Heidelberg (May 1995). https:\/\/doi.org\/10.1007\/BFb0053443","DOI":"10.1007\/BFb0053443"},{"key":"5_CR8","unstructured":"Cohn-Gordon, K., Cremers, C.: Mind the gap: Where provable security and real-world messaging don\u2019t quite meet. Cryptology ePrint Archive, Report 2017\/982 (2017), https:\/\/eprint.iacr.org\/2017\/982"},{"key":"5_CR9","doi-asserted-by":"publisher","unstructured":"Cohn-Gordon, K., Cremers, C., Garratt, L., Millican, J., Milner, K.: On ends-to-ends encryption: Asynchronous group messaging with strong security guarantees. In: Lie, D., Mannan, M., Backes, M., Wang, X. (eds.) ACM CCS 2018. pp. 1802\u20131819. ACM Press (Oct 2018). https:\/\/doi.org\/10.1145\/3243734.3243747","DOI":"10.1145\/3243734.3243747"},{"key":"5_CR10","doi-asserted-by":"publisher","unstructured":"Diemert, D., Gellert, K., Jager, T., Lyu, L.: More efficient digital signatures with tight multi-user security. In: Garay, J. (ed.) PKC\u00a02021, Part\u00a0II. LNCS, vol. 12711, pp. 1\u201331. Springer, Cham (May 2021). https:\/\/doi.org\/10.1007\/978-3-030-75248-4_1","DOI":"10.1007\/978-3-030-75248-4_1"},{"key":"5_CR11","doi-asserted-by":"publisher","unstructured":"Dodis, Y., Fiore, D.: Unilaterally-authenticated key exchange. In: Kiayias, A. (ed.) FC 2017. LNCS, vol. 10322, pp. 542\u2013560. Springer, Cham (Apr 2017). https:\/\/doi.org\/10.1007\/978-3-319-70972-7_31","DOI":"10.1007\/978-3-319-70972-7_31"},{"key":"5_CR12","doi-asserted-by":"publisher","unstructured":"Dutta, R., Barua, R.: Constant round dynamic group key agreement. In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds.) ISC\u00a02005. LNCS, vol.\u00a03650, pp. 74\u201388. Springer, Berlin, Heidelberg (Sep 2005). https:\/\/doi.org\/10.1007\/11556992_6","DOI":"10.1007\/11556992_6"},{"key":"5_CR13","doi-asserted-by":"publisher","unstructured":"Fleischhacker, N., Jager, T., Schr\u00f6der, D.: On tight security proofs for Schnorr signatures. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT\u00a02014, Part\u00a0I. LNCS, vol.\u00a08873, pp. 512\u2013531. Springer, Berlin, Heidelberg (Dec 2014). https:\/\/doi.org\/10.1007\/978-3-662-45611-8_27","DOI":"10.1007\/978-3-662-45611-8_27"},{"key":"5_CR14","doi-asserted-by":"publisher","unstructured":"Gorantla, M.C., Boyd, C., Gonz\u00e1lez Nieto, J.M.: Modeling key compromise impersonation attacks on group key exchange protocols. In: Jarecki, S., Tsudik, G. (eds.) PKC\u00a02009. LNCS, vol.\u00a05443, pp. 105\u2013123. Springer, Berlin, Heidelberg (Mar 2009). https:\/\/doi.org\/10.1007\/978-3-642-00468-1_7","DOI":"10.1007\/978-3-642-00468-1_7"},{"key":"5_CR15","doi-asserted-by":"publisher","unstructured":"Han, S., Jager, T., Kiltz, E., Liu, S., Pan, J., Riepel, D., Sch\u00e4ge, S.: Authenticated key exchange and signatures with tight security in the standard model. In: Malkin, T., Peikert, C. (eds.) CRYPTO\u00a02021, Part\u00a0IV. LNCS, vol. 12828, pp. 670\u2013700. Springer, Cham, Virtual Event (Aug 2021). https:\/\/doi.org\/10.1007\/978-3-030-84259-8_23","DOI":"10.1007\/978-3-030-84259-8_23"},{"key":"5_CR16","doi-asserted-by":"publisher","unstructured":"Han, S., Liu, S., Wang, Z., Gu, D.: Almost tight multi-user security under adaptive corruptions from LWE in the standard model. In: Handschuh, H., Lysyanskaya, A. (eds.) CRYPTO\u00a02023, Part\u00a0V. LNCS, vol. 14085, pp. 682\u2013715. Springer, Cham (Aug 2023). https:\/\/doi.org\/10.1007\/978-3-031-38554-4_22","DOI":"10.1007\/978-3-031-38554-4_22"},{"key":"5_CR17","doi-asserted-by":"publisher","unstructured":"H\u00f6velmanns, K., Kiltz, E., Sch\u00e4ge, S., Unruh, D.: Generic authenticated key exchange in the quantum random oracle model. In: Kiayias, A., Kohlweiss, M., Wallden, P., Zikas, V. (eds.) PKC\u00a02020, Part\u00a0II. LNCS, vol. 12111, pp. 389\u2013422. Springer, Cham (May 2020). https:\/\/doi.org\/10.1007\/978-3-030-45388-6_14","DOI":"10.1007\/978-3-030-45388-6_14"},{"key":"5_CR18","doi-asserted-by":"publisher","unstructured":"Ishibashi, R., Yoneyama, K.: Post-quantum anonymous one-sided authenticated key exchange without random oracles. In: Hanaoka, G., Shikata, J., Watanabe, Y. (eds.) PKC\u00a02022, Part\u00a0II. LNCS, vol. 13178, pp. 35\u201365. Springer, Cham (Mar 2022). https:\/\/doi.org\/10.1007\/978-3-030-97131-1_2","DOI":"10.1007\/978-3-030-97131-1_2"},{"key":"5_CR19","doi-asserted-by":"publisher","unstructured":"Jager, T., Kiltz, E., Riepel, D., Sch\u00e4ge, S.: Tightly-secure authenticated key exchange, revisited. In: Canteaut, A., Standaert, F.X. (eds.) EUROCRYPT\u00a02021, Part\u00a0I. LNCS, vol. 12696, pp. 117\u2013146. Springer, Cham (Oct 2021). https:\/\/doi.org\/10.1007\/978-3-030-77870-5_5","DOI":"10.1007\/978-3-030-77870-5_5"},{"key":"5_CR20","doi-asserted-by":"publisher","unstructured":"). Klein, K., Pascual-Perez, G., Walter, M., Kamath, C., Capretto, M., Cueto, M., Markov, I., Yeo, M., Alwen, J., Pietrzak, K.: Keep the dirt: Tainted TreeKEM, adaptively and actively secure continuous group key agreement. In: 2021 IEEE Symposium on Security and Privacy. pp. 268\u2013284. IEEE Computer Society Press (May 2021). https:\/\/doi.org\/10.1109\/SP40001.2021.00035","DOI":"10.1109\/SP40001.2021.00035"},{"key":"5_CR21","doi-asserted-by":"publisher","unstructured":"Krawczyk, H.: HMQV: A high-performance secure Diffie-Hellman protocol. In: Shoup, V. (ed.) CRYPTO\u00a02005. LNCS, vol.\u00a03621, pp. 546\u2013566. Springer, Berlin, Heidelberg (Aug 2005). https:\/\/doi.org\/10.1007\/11535218_33","DOI":"10.1007\/11535218_33"},{"key":"5_CR22","doi-asserted-by":"publisher","unstructured":"LaMacchia, B.A., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol.\u00a04784, pp. 1\u201316. Springer, Berlin, Heidelberg (Nov 2007). https:\/\/doi.org\/10.1007\/978-3-540-75670-5_1","DOI":"10.1007\/978-3-540-75670-5_1"},{"key":"5_CR23","unstructured":"Maurer, U., Tackmann, B., Coretti, S.: Key exchange with unilateral authentication: Composable security definition and modular protocol design. Cryptology ePrint Archive, Report 2013\/555 (2013), https:\/\/eprint.iacr.org\/2013\/555"},{"key":"5_CR24","doi-asserted-by":"publisher","unstructured":"Mayer, A.J., Yung, M.: Secure protocol transformation via \u201cexpansion\u201d: From two-party to groups. In: Motiwalla, J., Tsudik, G. (eds.) ACM CCS 99. pp. 83\u201392. ACM Press (Nov 1999). https:\/\/doi.org\/10.1145\/319709.319721","DOI":"10.1145\/319709.319721"},{"issue":"4","key":"5_CR25","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/s00145-022-09438-y","volume":"35","author":"J Pan","year":"2022","unstructured":"Pan, J., Qian, C., Ringerud, M.: Signed (group) Diffie-Hellman key exchange with tight security. Journal of Cryptology 35(4), \u00a026 (Oct 2022). https:\/\/doi.org\/10.1007\/s00145-022-09438-y","journal-title":"Journal of Cryptology"},{"key":"5_CR26","doi-asserted-by":"publisher","unstructured":"Pan, J., Riepel, D., Zeng, R.: Key exchange with tight (full) forward secrecy via key confirmation. In: Joye, M., Leander, G. (eds.) EUROCRYPT\u00a02024, Part\u00a0VII. LNCS, vol. 14657, pp. 59\u201389. Springer, Cham (May 2024). https:\/\/doi.org\/10.1007\/978-3-031-58754-2_3","DOI":"10.1007\/978-3-031-58754-2_3"},{"key":"5_CR27","doi-asserted-by":"publisher","unstructured":"Pan, J., Wagner, B.: Lattice-based signatures with tight adaptive corruptions and more. In: Hanaoka, G., Shikata, J., Watanabe, Y. (eds.) PKC\u00a02022, Part\u00a0II. LNCS, vol. 13178, pp. 347\u2013378. Springer, Cham (Mar 2022). https:\/\/doi.org\/10.1007\/978-3-030-97131-1_12","DOI":"10.1007\/978-3-030-97131-1_12"},{"key":"5_CR28","doi-asserted-by":"publisher","unstructured":"Pan, J., Wagner, B., Zeng, R.: Lattice-based authenticated key exchange with tight security. In: Handschuh, H., Lysyanskaya, A. (eds.) CRYPTO\u00a02023, Part\u00a0V. LNCS, vol. 14085, pp. 616\u2013647. Springer, Cham (Aug 2023). https:\/\/doi.org\/10.1007\/978-3-031-38554-4_20","DOI":"10.1007\/978-3-031-38554-4_20"},{"key":"5_CR29","doi-asserted-by":"publisher","unstructured":"Pan, J., Wagner, B., Zeng, R.: Tighter security for generic authenticated key exchange in the QROM. In: Guo, J., Steinfeld, R. (eds.) ASIACRYPT\u00a02023, Part\u00a0IV. LNCS, vol. 14441, pp. 401\u2013433. Springer, Singapore (Dec 2023). https:\/\/doi.org\/10.1007\/978-981-99-8730-6_13","DOI":"10.1007\/978-981-99-8730-6_13"},{"key":"5_CR30","doi-asserted-by":"publisher","unstructured":"Poettering, B., R\u00f6sler, P., Schwenk, J., Stebila, D.: SoK: Game-based security models for group key exchange. In: Paterson, K.G. (ed.) CT-RSA\u00a02021. LNCS, vol. 12704, pp. 148\u2013176. Springer, Cham (May 2021). https:\/\/doi.org\/10.1007\/978-3-030-75539-3_7","DOI":"10.1007\/978-3-030-75539-3_7"},{"key":"5_CR31","doi-asserted-by":"publisher","unstructured":"Shor, P.W.: Algorithms for quantum computation: Discrete logarithms and factoring. In: 35th FOCS. pp. 124\u2013134. IEEE Computer Society Press (Nov 1994). https:\/\/doi.org\/10.1109\/SFCS.1994.365700","DOI":"10.1109\/SFCS.1994.365700"},{"key":"5_CR32","unstructured":"Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive, Report 2004\/332 (2004), https:\/\/eprint.iacr.org\/2004\/332"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0935-2_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,8]],"date-time":"2024-12-08T18:02:14Z","timestamp":1733680934000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0935-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,9]]},"ISBN":["9789819609345","9789819609352"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0935-2_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,9]]},"assertion":[{"value":"9 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}