{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T07:56:48Z","timestamp":1767859008059,"version":"3.49.0"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,5,7]],"date-time":"2021-05-07T00:00:00Z","timestamp":1620345600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,7]],"date-time":"2021-05-07T00:00:00Z","timestamp":1620345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001700","name":"Ministry of Education, Culture, Sports, Science and Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001700","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1007\/s10207-021-00549-4","type":"journal-article","created":{"date-parts":[[2021,5,7]],"date-time":"2021-05-07T16:03:02Z","timestamp":1620403382000},"page":"207-221","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Authenticated logarithmic-order supersingular isogeny group key exchange"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8209-1772","authenticated-orcid":false,"given":"Hector B.","family":"Hougaard","sequence":"first","affiliation":[]},{"given":"Atsuko","family":"Miyaji","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,7]]},"reference":[{"key":"549_CR1","unstructured":"Azarderakhsh R, Jalali A, Jao D, Soukharev V: Practical supersingular isogeny group key agreement. IACR Cryptol. ePrint Arch. (2019)"},{"key":"549_CR2","unstructured":"Boyd C, Gellert K: A modern view on forward security. Cryptology ePrint Archive, Report 2019\/1362 (2019). https:\/\/eprint.iacr.org\/2019\/1362"},{"key":"549_CR3","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/BFb0053443","volume-title":"Advances in Cryptology - EUROCRYPT94","author":"M Burmester","year":"1995","unstructured":"Burmester, M., Desmedt, Y.: A secure and efficient conference key distribution system. In: De Santis, A. (ed.) Advances in Cryptology - EUROCRYPT94, pp. 275\u2013286. Springer, Berlin (1995)"},{"key":"549_CR4","doi-asserted-by":"crossref","unstructured":"Burmester M, Desmedt Y: Efficient and secure conference-key distribution. In: Proceedings of the International Workshop on Security Protocols, Springer, London (1997). http:\/\/dl.acm.org\/citation.cfm?id=647214.720375","DOI":"10.1007\/3-540-62494-5_12"},{"key":"549_CR5","doi-asserted-by":"crossref","unstructured":"Canetti R, Krawczyk H: Analysis of key-exchange protocols and their use for building secure channels. In: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology, EUROCRYPT \u201901. Springer, London (2001). http:\/\/dl.acm.org\/citation.cfm?id=647086.715688","DOI":"10.1007\/3-540-44987-6_28"},{"key":"549_CR6","unstructured":"De\u00a0Feo L, Jao D: defeo\/sidh-paper. https:\/\/github.com\/defeo\/sidh-paper\/blob\/master\/eprint.tex"},{"key":"549_CR7","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/978-3-540-77366-5_12","volume-title":"Financial Cryptography and Data Security","author":"Y Desmedt","year":"2007","unstructured":"Desmedt, Y., Lange, T., Burmester, M.: Scalable authenticated tree based group key exchange for ad-hoc groups. In: Dietrich, S., Dhamija, R. (eds.) Financial Cryptography and Data Security, pp. 104\u2013118. Springer, Berlin (2007)"},{"issue":"3","key":"549_CR8","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1515\/jmc-2012-0015","volume":"8","author":"LD Feo","year":"2014","unstructured":"Feo, L.D., Jao, D., Pl\u00fbt, J.: Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. J. Math. Cryptol. 8(3), 209\u2013247 (2014). https:\/\/doi.org\/10.1515\/jmc-2012-0015","journal-title":"J. Math. Cryptol."},{"key":"549_CR9","doi-asserted-by":"crossref","unstructured":"Furukawa S, Kunihiro N, Takashima K: Multi-party key exchange protocols from supersingular isogenies. 2018 International Symposium on Information Theory and Its Applications (ISITA) 208\u2013212 (2018)","DOI":"10.23919\/ISITA.2018.8664316"},{"key":"549_CR10","unstructured":"Galbraith SD: Authenticated key exchange for SIDH. IACR Cryptology ePrint Archive 2018, 266 (2018).http:\/\/eprint.iacr.org\/2018\/266"},{"key":"549_CR11","doi-asserted-by":"crossref","unstructured":"Galbraith SD, Petit C, Shani B, Ti YB: On the security of supersingular isogeny cryptosystems. In: J.H. Cheon, T.\u00a0Takagi (eds.) Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I, Lecture Notes in Computer Science, 10031, 63\u201391 (2016). https:\/\/doi.org\/10.1007\/978-3-662-53887-6_3","DOI":"10.1007\/978-3-662-53887-6_3"},{"key":"549_CR12","unstructured":"G\u00fcnther, C.G.: An identity-based key-exchange protocol. In: Quisquater, J.J., Vandewalle, J. (eds.) Advances in Cryptology EUROCRYPT\u201989. Springer, Berlin (1990)"},{"key":"549_CR13","doi-asserted-by":"crossref","unstructured":"Hatano T, Miyaji A, Sato T: T-robust scalable group key exchange protocol with o(log n) complexity. In: Proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP\u2019. Springer, Berlin (2011). http:\/\/dl.acm.org\/citation.cfm?id=2029853.2029870","DOI":"10.1007\/978-3-642-22497-3_13"},{"key":"549_CR14","doi-asserted-by":"crossref","unstructured":"Hougaard HB, Miyaji A: SIT: supersingular isogeny tree-based group key exchange. In: 15th Asia Joint Conference on Information Security, AsiaJCIS 2020, Taipei. IEEE (2020). https:\/\/doi.org\/10.1109\/AsiaJCIS50894.2020.00019","DOI":"10.1109\/AsiaJCIS50894.2020.00019"},{"key":"549_CR15","doi-asserted-by":"crossref","unstructured":"Jager T, Kohlar F, Sch\u00e4ge S, Schwenk J: Generic compilers for authenticated key exchange. In: Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Lecture Notes in Computer Science. Springer (2010). https:\/\/www.iacr.org\/archive\/asiacrypt2010\/6477232\/6477232.pdf","DOI":"10.1007\/978-3-642-17373-8_14"},{"key":"549_CR16","volume-title":"Post-Quantum Cryptography","author":"D Jao","year":"2011","unstructured":"Jao, D., De Feo, L.: Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. In: Yang, B.Y. (ed.) Post-Quantum Cryptography. Springer, Berlin (2011)"},{"issue":"1","key":"549_CR17","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s00145-006-0361-5","volume":"20","author":"J Katz","year":"2007","unstructured":"Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. J. Cryptol. 20(1), 85\u2013113 (2007)","journal-title":"J. Cryptol."},{"key":"549_CR18","volume-title":"Applied Cryptography and Network Security","author":"Y Li","year":"2014","unstructured":"Li, Y., Sch\u00e4ge, S., Yang, Z., Bader, C., Schwenk, J.: New modular compilers for authenticated key exchange. In: Boureanu, I., Owesarski, P., Vaudenay, S. (eds.) Applied Cryptography and Network Security. Springer International Publishing, Cham (2014)"},{"key":"549_CR19","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-642-14423-3_2","volume-title":"Information, Security and Cryptology - ICISC 2009","author":"M Manulis","year":"2010","unstructured":"Manulis, M., Suzuki, K., Ustaoglu, B.: Modeling leakage of ephemeral secrets in tripartite\/group key exchange. In: Lee, D., Hong, S. (eds.) Information, Security and Cryptology - ICISC 2009, pp. 16\u201333. Springer, Berlin (2010)"},{"key":"549_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09494-6","volume-title":"The arithmetic of elliptic curves graduate texts in mathematics.","author":"JH Silverman","year":"2009","unstructured":"Silverman, J.H.: The arithmetic of elliptic curves graduate texts in mathematics. Springer, Dordrecht (2009)"},{"key":"549_CR21","doi-asserted-by":"crossref","unstructured":"Takashima K: Post-quantum constant-round group key exchange from static assumptions. In: Takagi T, Wakayama M, Tanaka K, Kunihiro N, Kimoto K, Ikematsu Y (eds.) International Symposium on Mathematics, Quantum Theory, and Cryptography. Springer, Singapore (2021)","DOI":"10.1007\/978-981-15-5191-8_18"},{"key":"549_CR22","doi-asserted-by":"crossref","unstructured":"Tang, Q., Mitchell, C.: Efficient compilers for authenticated group key exchange. In: Lecture Notes in Computer Science, vol. 3802, pp. 192\u2013197. Springer (2006)","DOI":"10.1007\/11596981_29"},{"key":"549_CR23","unstructured":"Washington LC: Elliptic Curves: Number Theory and Cryptography, Second Edition, 2 edn. Chapman & Hall\/CRC (2008)"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-021-00549-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-021-00549-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-021-00549-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,21]],"date-time":"2022-03-21T08:05:57Z","timestamp":1647849957000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-021-00549-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,7]]},"references-count":23,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["549"],"URL":"https:\/\/doi.org\/10.1007\/s10207-021-00549-4","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,7]]},"assertion":[{"value":"7 May 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}