{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,10,13]],"date-time":"2022-10-13T06:27:20Z","timestamp":1665642440275},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2016,1,4]],"date-time":"2016-01-04T00:00:00Z","timestamp":1451865600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1007\/s10207-015-0312-y","type":"journal-article","created":{"date-parts":[[2016,1,4]],"date-time":"2016-01-04T15:16:04Z","timestamp":1451920564000},"page":"151-171","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["ASICS: authenticated key exchange security incorporating certification systems"],"prefix":"10.1007","volume":"16","author":[{"given":"Colin","family":"Boyd","sequence":"first","affiliation":[]},{"given":"Cas","family":"Cremers","sequence":"additional","affiliation":[]},{"given":"Mich\u00e8le","family":"Feltz","sequence":"additional","affiliation":[]},{"given":"Kenneth G.","family":"Paterson","sequence":"additional","affiliation":[]},{"given":"Bertram","family":"Poettering","sequence":"additional","affiliation":[]},{"given":"Douglas","family":"Stebila","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,4]]},"reference":[{"key":"312_CR1","doi-asserted-by":"crossref","unstructured":"Adams, C., Farrell, S., Kause, T., Mononen, T.: Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP). RFC 4210 (Proposed Standard). http:\/\/www.ietf.org\/rfc\/rfc4210.txt , updated by RFC 6712 (2005)","DOI":"10.17487\/rfc4210"},{"key":"312_CR2","unstructured":"Barker, E., Barker, W., Burr, W., Polk, W., Smid, M.: Recommendation for key management\u2014part 1: general. NIST Special Publication. http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-57\/sp800-57-Part1-revised2_Mar08-2007.pdf (2007)"},{"key":"312_CR3","doi-asserted-by":"crossref","unstructured":"Bellare, M., Neven, G.: Multi-signatures in the plain public-key model and a general forking lemma. In: Juels, A., Wright, R.N., Vimercati, S. (eds.) ACM CCS 06, pp. 390\u2013399. ACM Press, Alexandria (2006)","DOI":"10.1145\/1180405.1180453"},{"key":"312_CR4","doi-asserted-by":"crossref","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139\u2013155. Springer, Heidelberg (2000)","DOI":"10.1007\/3-540-45539-6_11"},{"key":"312_CR5","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO\u201993. LNCS, vol. 773, pp. 232\u2013249. Springer, Heidelberg (1994)","DOI":"10.1007\/3-540-48329-2_21"},{"key":"312_CR6","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Provably secure session key distribution: the three party case. In: 27th ACM STOC, pp. 57\u201366. ACM Press, Las Vegas (1995)","DOI":"10.1145\/225058.225084"},{"key":"312_CR7","doi-asserted-by":"crossref","unstructured":"Blake-Wilson, S., Johnson, D., Menezes, A.: Key agreement protocols and their security analysis. In: Darnell, M. (ed.) 6th IMA International Conference on Cryptography and Coding. LNCS, vol. 1355, pp. 30\u201345. Springer, Heidelberg (1997)","DOI":"10.1007\/BFb0024447"},{"key":"312_CR8","doi-asserted-by":"crossref","unstructured":"Blake-Wilson, S., Menezes, A.: Entity authentication and authenticated key transport protocols employing asymmetric techniques. In: Christianson, B., Crispo, B., Lomas, T.M.A., Roe, M. (eds.) Proceedings of the 5th International Workshop on Security Protocols, Paris, France, April 7\u20139, 1997. LNCS, vol. 1361, pp. 137\u2013158. Springer (1998)","DOI":"10.1007\/BFb0028166"},{"key":"312_CR9","doi-asserted-by":"crossref","unstructured":"Blake-Wilson, S., Menezes, A.: Unknown key-share attacks on the station-to-station (STS) protocol. In: Imai, H., Zheng, Y. (eds.) PKC\u201999. LNCS, vol. 1560, pp. 154\u2013170. Springer, Heidelberg (1999)","DOI":"10.1007\/3-540-49162-7_12"},{"key":"312_CR10","doi-asserted-by":"crossref","unstructured":"Boldyreva, A., Fischlin, M., Palacio, A., Warinschi, B.: A closer look at PKI: security and efficiency. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 458\u2013475. Springer, Heidelberg (2007)","DOI":"10.1007\/978-3-540-71677-8_30"},{"key":"312_CR11","doi-asserted-by":"crossref","unstructured":"Boyd, C., Cremers, C., Feltz, M., Paterson, K.G., Poettering, B., Stebila, D.: ASICS: Authenticated key exchange security incorporating certification systems. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol. 8134, pp. 381\u2013399. Springer, Heidelberg (2013)","DOI":"10.1007\/978-3-642-40203-6_22"},{"key":"312_CR12","unstructured":"CA\/Browser Forum: Baseline requirements for the issuance and management of publicly-trusted certificates, v1.1.6. https:\/\/cabforum.org\/wp-content\/uploads\/Baseline_Requirements_V1_1_6.pdf (2013)"},{"key":"312_CR13","unstructured":"CA\/Browser Forum: Guidelines for the issuance and management of extended validation certificates, v1.4.3. https:\/\/cabforum.org\/wp-content\/uploads\/Guidelines_v1_4_3.pdf (2013)"},{"key":"312_CR14","doi-asserted-by":"crossref","unstructured":"Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453\u2013474. Springer, Heidelberg, Germany (2001)","DOI":"10.1007\/3-540-44987-6_28"},{"key":"312_CR15","doi-asserted-by":"crossref","unstructured":"Cash, D., Kiltz, E., Shoup, V.: The twin Diffie\u2013Hellman problem and applications. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 127\u2013145. Springer, Heidelberg (2008)","DOI":"10.1007\/978-3-540-78967-3_8"},{"key":"312_CR16","doi-asserted-by":"crossref","unstructured":"Chatterjee, S., Menezes, A., Ustaoglu, B.: Combined security analysis of the one- and three-pass unified model key agreement protocols. In: Gong, G., Gupta, K.C. (eds.) INDOCRYPT 2010. LNCS, vol. 6498, pp. 49\u201368. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-17401-8_5"},{"key":"312_CR17","doi-asserted-by":"crossref","unstructured":"Choo, K.K.R., Boyd, C., Hitchcock, Y.: Examining indistinguishability-based proof models for key establishment protocols. In: Roy, B.K. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 585\u2013604. Springer, Heidelberg (2005)","DOI":"10.1007\/11593447_32"},{"key":"312_CR18","doi-asserted-by":"crossref","unstructured":"Cremers, C.: Examining indistinguishability-based security models for key exchange protocols: the case of CK, CK-HMQV, and eCK. In: Cheung, B.S.N., Hui, L.C.K., Sandhu, R.S., Wong, D.S. (eds.) ASIACCS 11, pp. 80\u201391. ACM Press, Hong Kong, China (2011)","DOI":"10.1145\/1966913.1966925"},{"key":"312_CR19","doi-asserted-by":"crossref","unstructured":"Cremers, C.J.F., Feltz, M.: Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 734\u2013751. Springer, Heidelberg (2012)","DOI":"10.1007\/978-3-642-33167-1_42"},{"issue":"1","key":"312_CR20","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/s10623-013-9852-1","volume":"74","author":"CJF Cremers","year":"2015","unstructured":"Cremers, C.J.F., Feltz, M.: Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal. Des. Codes Cryptogr. 74(1), 183\u2013218 (2015)","journal-title":"Des. Codes Cryptogr."},{"key":"312_CR21","unstructured":"Ducklin, P.: The TURKTRUST SSL certificate fiasco\u2014what really happened, and what happens next? http:\/\/nakedsecurity.sophos.com\/2013\/01\/08\/the-turktrust-ssl-certificate-fiasco-what-happened-and-what-happens-next\/ (2013)"},{"key":"312_CR22","doi-asserted-by":"crossref","unstructured":"Farshim, P., Warinschi, B.: Certified encryption revisited. In: Preneel, B. (ed.) AFRICACRYPT 09. LNCS, vol. 5580, pp. 179\u2013197. Springer, Heidelberg (2009)","DOI":"10.1007\/978-3-642-02384-2_12"},{"key":"312_CR23","unstructured":"FOX IT: Black Tulip: Report of the investigation into the DigiNotar Certificate Authority breach. http:\/\/www.rijksoverheid.nl\/bestanden\/documenten-en-publicaties\/rapporten\/2012\/08\/13\/black-tulip-update\/black-tulip-update.pdf (2012)"},{"key":"312_CR24","doi-asserted-by":"crossref","unstructured":"Freire, E.S.V., Hofheinz, D., Kiltz, E., Paterson, K.G.: Non-interactive key exchange. In: Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. LNCS, vol. 7778, pp. 254\u2013271. Springer, Heidelberg (2013)","DOI":"10.1007\/978-3-642-36362-7_17"},{"issue":"2","key":"312_CR25","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/s10623-011-9604-z","volume":"67","author":"I Goldberg","year":"2013","unstructured":"Goldberg, I., Stebila, D., Ustaoglu, B.: Anonymity and one-way authentication in key exchange protocols. Des. Codes Cryptogr. 67(2), 245\u2013269 (2013)","journal-title":"Des. Codes Cryptogr."},{"issue":"2","key":"312_CR26","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S Goldwasser","year":"1984","unstructured":"Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci. 28(2), 270\u2013299 (1984)","journal-title":"J. Comput. Syst. Sci."},{"key":"312_CR27","doi-asserted-by":"crossref","unstructured":"Jeong, I.R., Katz, J., Lee, D.H.: One-round protocols for two-party authenticated key exchange. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 04. LNCS, vol. 3089, pp. 220\u2013232. Springer, Heidelberg (2004)","DOI":"10.1007\/978-3-540-24852-1_16"},{"key":"312_CR28","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1145\/501978.501981","volume":"4","author":"BS Kaliski","year":"2001","unstructured":"Kaliski, B.S.: An unknown key-share attack on the MQV key agreement protocol. ACM Trans. Inf. Syst. Secur. 4, 275\u2013288 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"312_CR29","doi-asserted-by":"crossref","unstructured":"Krawczyk, H.: HMQV: A high-performance secure Diffie\u2013Hellman protocol. Cryptology ePrint Archive, Report 2005\/176. http:\/\/eprint.iacr.org\/2005\/176 (2005)","DOI":"10.1007\/11535218_33"},{"key":"312_CR30","doi-asserted-by":"crossref","unstructured":"Krawczyk, H.: HMQV: A high-performance secure Diffie\u2013Hellman protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546\u2013566. Springer, Heidelberg (2005)","DOI":"10.1007\/11535218_33"},{"key":"312_CR31","doi-asserted-by":"crossref","unstructured":"Kudla, C., Paterson, K.G.: Modular security proofs for key agreement protocols. In: Roy, B.K. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 549\u2013565. Springer, Heidelberg (2005)","DOI":"10.1007\/11593447_30"},{"key":"312_CR32","doi-asserted-by":"crossref","unstructured":"LaMacchia, B.A., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 1\u201316. Springer, Heidelberg (2007)","DOI":"10.1007\/978-3-540-75670-5_1"},{"key":"312_CR33","doi-asserted-by":"crossref","unstructured":"Lauter, K., Mityagin, A.: Security analysis of KEA authenticated key exchange protocol. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 378\u2013394. Springer, Heidelberg (2006)","DOI":"10.1007\/11745853_25"},{"key":"312_CR34","doi-asserted-by":"crossref","unstructured":"Lim, C.H., Lee, P.J.: A key recovery attack on discrete log-based schemes using a prime order subgroup. In: Kaliski Jr., B.S. (ed.) CRYPTO\u201997. LNCS, vol. 1294, pp. 249\u2013263. Springer, Heidelberg (1997)","DOI":"10.1007\/BFb0052240"},{"issue":"2","key":"312_CR35","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/BF02351718","volume":"1","author":"KS McCurley","year":"1988","unstructured":"McCurley, K.S.: A key distribution system equivalent to factoring. J Cryptol 1(2), 95\u2013105 (1988)","journal-title":"J Cryptol"},{"key":"312_CR36","unstructured":"Menezes, A.: Another look at HMQV. Cryptology ePrint Archive, Report 2005\/205. http:\/\/eprint.iacr.org\/2005\/205 (2005)"},{"key":"312_CR37","doi-asserted-by":"crossref","unstructured":"Menezes, A., Ustaoglu, B.: On the importance of public-key validation in the MQV and HMQV key agreement protocols. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol. 4329, pp. 133\u2013147. Springer, Heidelberg (2006)","DOI":"10.1007\/11941378_11"},{"key":"312_CR38","doi-asserted-by":"crossref","unstructured":"Menezes, A., Ustaoglu, B.: Security arguments for the UM key agreement protocol in the NIST SP 800\u201356A standard. In: Abe, M., Gligor, V. (eds.) ASIACCS 08. pp. 261\u2013270. ACM Press, Tokyo, Japan (2008)","DOI":"10.1145\/1368310.1368348"},{"issue":"3","key":"312_CR39","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D Pointcheval","year":"2000","unstructured":"Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J Cryptol 13(3), 361\u2013396 (2000)","journal-title":"J Cryptol"},{"key":"312_CR40","doi-asserted-by":"crossref","unstructured":"Ristenpart, T., Yilek, S.: The power of proofs-of-possession: securing multiparty signatures against rogue-key attacks. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 228\u2013245. Springer, Heidelberg (2007)","DOI":"10.1007\/978-3-540-72540-4_13"},{"key":"312_CR41","doi-asserted-by":"crossref","unstructured":"Schaad, J.: Internet X.509 Public Key Infrastructure Certificate Request Message Format (CRMF). RFC 4211 (Proposed Standard). http:\/\/www.ietf.org\/rfc\/rfc4211.txt (2005)","DOI":"10.17487\/rfc4211"},{"key":"312_CR42","unstructured":"Shmuely, Z.: Composite Diffie\u2013Hellman public-key generating systems are hard to break. Technical Report No. 356, Computer Science Department, Technion-Israel Institute of Technology (1985)"},{"key":"312_CR43","unstructured":"Shoup, V.: On formal methods for secure key exchange (version 4) (November 1999), revision of IBM Research Report RZ 3120. http:\/\/www.shoup.net\/papers\/skey.pdf (1999)"},{"key":"312_CR44","doi-asserted-by":"crossref","unstructured":"Turner, S.: The application\/pkcs10 Media Type. RFC 5967 (Informational). http:\/\/www.ietf.org\/rfc\/rfc5967.txt (2010)","DOI":"10.17487\/rfc5967"},{"key":"312_CR45","unstructured":"Turner, P., Polk, W., Barker, E.: ITL Bulletin for July 2012: preparing for and responding to certification authority compromise and fraudulent certificate issuance. http:\/\/csrc.nist.gov\/publications\/nistbul\/july-2012_itl-bulletin.pdf (2012)"},{"issue":"3","key":"312_CR46","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1007\/s10623-007-9159-1","volume":"46","author":"B Ustaoglu","year":"2008","unstructured":"Ustaoglu, B.: Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS. Des. Codes Cryptogr. 46(3), 329\u2013342 (2008)","journal-title":"Des. Codes Cryptogr."},{"key":"312_CR47","doi-asserted-by":"crossref","unstructured":"Ustaoglu, B.: Comparing sessionstatereveal and ephemeralkeyreveal for Diffie\u2013Hellman protocols. In: Pieprzyk, J., Zhang, F. (eds.) ProvSec 2009. LNCS, vol. 5848, pp. 183\u2013197. Springer, Heidelberg (2009)","DOI":"10.1007\/978-3-642-04642-1_16"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-015-0312-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-015-0312-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-015-0312-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-015-0312-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T01:01:13Z","timestamp":1567472473000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-015-0312-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,4]]},"references-count":47,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,4]]}},"alternative-id":["312"],"URL":"https:\/\/doi.org\/10.1007\/s10207-015-0312-y","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1,4]]}}}