{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T18:16:40Z","timestamp":1757701000643,"version":"3.44.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T00:00:00Z","timestamp":1740441600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T00:00:00Z","timestamp":1740441600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100004826","name":"Natural Science Foundation of Beijing Municipality","doi-asserted-by":"publisher","award":["4232034"],"award-info":[{"award-number":["4232034"]}],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["3282024058"],"award-info":[{"award-number":["3282024058"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s10586-024-04942-1","type":"journal-article","created":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T01:20:12Z","timestamp":1740446412000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["K-PAKE: post quantum password authentication key exchange protocol for satellite networks"],"prefix":"10.1007","volume":"28","author":[{"given":"Yatao","family":"Yang","sequence":"first","affiliation":[]},{"given":"Ruoyan","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Fangrui","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,25]]},"reference":[{"key":"4942_CR1","doi-asserted-by":"crossref","unstructured":"Katz, J., Vaikuntanathan, V.: Smooth projective hashing and password-based authenticated key exchange from lattices. In: 15th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2009). LNCS, vol 5912, Springer, Berlin, Heidelberg, pp 636\u2013652 (2009).","DOI":"10.1007\/978-3-642-10366-7_37"},{"key":"4942_CR2","doi-asserted-by":"crossref","unstructured":"Peikert, C.: Lattice cryptography for the Internet. In: 6th International Workshop on Post-Quantum Cryptography (PQCrypto 2014). LNCS, vol 8772, Springer, Cham, 197\u2013219 (2014).","DOI":"10.1007\/978-3-319-11659-4_12"},{"key":"4942_CR3","doi-asserted-by":"crossref","unstructured":"Sutradhar, K., Om, H.: An efficient simulation for quantum secure multiparty computation. Scientific Reports (2021).","DOI":"10.1038\/s41598-021-81799-z"},{"key":"4942_CR4","doi-asserted-by":"crossref","unstructured":"Sutradhar, K., Venkatesh, R.: A privacy preserving quantum aggregating technique. Quantum Inform. Process.  23(124) (2024).","DOI":"10.1007\/s11128-024-04333-w"},{"key":"4942_CR5","doi-asserted-by":"crossref","unstructured":"Sutradhar, K., Venkatesh, R., Venkatesh, P.: Quantum Internet of Things for Smart Healthcare. Springer, Cham, pp 263\u2013285 (2023).","DOI":"10.1007\/978-3-031-50514-0_12"},{"key":"4942_CR6","doi-asserted-by":"crossref","unstructured":"Costa, N., Martinez, R.: Lattice-Based Proof of a Shuffle. In: 2019 Financial Cryptography and Data Security (FC 2019). LNCS, vol 11599, Springer, Cham, pp 330\u2013346 (2019).","DOI":"10.1007\/978-3-030-43725-1_23"},{"key":"4942_CR7","doi-asserted-by":"crossref","unstructured":"Perera, M. N. S., Nakamura, T., Hashimoto, M., et al.: Zero-knowledge proof system for fully anonymous attribute based group signatures from lattices with VLR. In: 2019 20th International Conference on Information Security Applications (WISA 2019). LNCS, Springer, Cham, 2019, 11897: 126\u2013140.","DOI":"10.1007\/978-3-030-39303-8_10"},{"key":"4942_CR8","unstructured":"Bellovin, S. M., Merritt, M.: Encrypted key exchange: Password based protocols secure against dictionary attacks. In: 1992 IEEE Symposium on Research in Security and Privacy. IEEE, New Yprk, pp 72\u201384 (1992)."},{"key":"4942_CR9","doi-asserted-by":"crossref","unstructured":"Boyko, V., MacKenzie, P., Patel, S.: Provably secure password-authenticated key exchange using Diffie-Hellman. In: 19th International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT 2000). LNCS, vol 1807, Springer, Berlin, pp 156\u2013171 (2000).","DOI":"10.1007\/3-540-45539-6_12"},{"key":"4942_CR10","doi-asserted-by":"crossref","unstructured":"Hao, F., Ryan, P.: Password authenticated key exchange by juggling. In: 16th International Workshop on Security Protocols XVI (Security Protocols 2008). LNCS, vol 6615, Springer, Berlin, Heidelberg, pp 172\u2013179 (2008).","DOI":"10.1007\/978-3-642-22137-8_24"},{"key":"4942_CR11","doi-asserted-by":"crossref","unstructured":"Dierks T, Rescorla E. The Transport Layer Security (TLS): Protocol Version 1.2. RFC 5246 (Proposed Standard), 2006.","DOI":"10.17487\/rfc4346"},{"key":"4942_CR12","doi-asserted-by":"crossref","unstructured":"Ding J, Alsayigh S, Lancrenon J, et al. Provably secure password authenticated key exchange based on RLWE for the postquantum world. In: The Cryptographers\u2019 Track at the RSA Conference 2017 on Topics in Cryptology (CT-RSA 2017). LNCS, vol 10159, Springer, Cham, 2017: 183\u2013204.","DOI":"10.1007\/978-3-319-52153-4_11"},{"key":"4942_CR13","doi-asserted-by":"crossref","unstructured":"Gao X, Ding J, Liu J, et al. Post quantum secure remote password protocol from RLWE problem. In: 13th International Conference on Information Security and Cryptology (Inscrypt 2017). LNCS, vol 10726, Springer, Cham, 2017: 99\u2013116.","DOI":"10.1007\/978-3-319-75160-3_8"},{"key":"4942_CR14","first-page":"1","volume":"2019","author":"VH Hoang","year":"2019","unstructured":"Hoang, V.H., Lehtihet, E., Yacine, G.D., Password-based authenticated key Exchange based on signcryption for the Internet of things.: Wireless Days (WD 2019), Manchester, UK. IEEE 2019, 1\u20138 (2019)","journal-title":"IEEE"},{"issue":"1","key":"4942_CR15","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/TSC.2019.2939836","volume":"15","author":"Z Li","year":"2022","unstructured":"Li, Z., Wang, D.: Achieving one-round password-based authenticated key exchange over lattices. IEEE Trans. Serv. Comput. 15(1), 308\u2013321 (2022)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"1","key":"4942_CR16","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1109\/TSC.2019.2942297","volume":"15","author":"X Zhang","year":"2022","unstructured":"Zhang, X., Zhao, J., Xu, C., et al.: DOPIV: post-quantum secure identity-based data outsourcing with public integrity verification in cloud storage. IEEE Trans. Serv. Comput. 15(1), 334\u2013345 (2022)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"1","key":"4942_CR17","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1109\/TDSC.2021.3129512","volume":"20","author":"Q Wang","year":"2021","unstructured":"Wang, Q., Wang, D., Cheng, C., et al.: Quantum2FA: efficient quantum-resistant two-factor authentication scheme for mobile devices. IEEE Trans. Dependable Secure Comput. 20(1), 193\u2013208 (2021)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"4942_CR18","doi-asserted-by":"crossref","unstructured":"Benhamouda F, Blazy O, Ducas L, et al. Hash proof systems over lattices revisited. In: 21st IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC 2018). LNCS, vol 10770, Springer, Cham, 2018: 644\u2013674.","DOI":"10.1007\/978-3-319-76581-5_22"},{"key":"4942_CR19","doi-asserted-by":"crossref","unstructured":"Zhang J, Yu Y. Two-round PAKE from approximate SPH and instantiations from lattices. In: 23rd International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT 2017). LNCS, vol 10626, Springer, Cham, 2017: 37\u201367.","DOI":"10.1007\/978-3-319-70700-6_2"},{"key":"4942_CR20","doi-asserted-by":"crossref","unstructured":"Alnahawi, Nouri, et al. Towards post-quantum secure PAKE-A tight security proof for OCAKE in the BPR model. Cryptology ePrint Archive, 2023.","DOI":"10.1007\/978-981-97-8016-7_9"},{"issue":"16","key":"4942_CR21","doi-asserted-by":"publisher","first-page":"17859","DOI":"10.1007\/s11227-023-05251-x","volume":"79","author":"K Seyhan","year":"2023","unstructured":"Seyhan, K., Akleylek, S.: A new password-authenticated module learning with rounding-based key exchange protocol: Saber. PAKE. J. Supercomput. 79(16), 17859\u201317896 (2023)","journal-title":"PAKE. J. Supercomput."},{"issue":"11","key":"4942_CR22","first-page":"180","volume":"40","author":"YT Yang","year":"2019","unstructured":"Yang, Y.T., Han, X.G., Huang, J.R., et al.: Bidirectional authenticated key agreement protocol supporting identity\u2019s privacy preservation based on RLWE. J. Commun. 40(11), 180\u2013186 (2019). ((in chinese))","journal-title":"J. Commun."},{"key":"4942_CR23","doi-asserted-by":"publisher","first-page":"41764","DOI":"10.1109\/ACCESS.2020.2977137","volume":"8","author":"YT Yang","year":"2020","unstructured":"Yang, Y.T., Huang, J.R., Chen, J.Y., et al.: INAKA: improved authenticated key agreement protocol based on NewHope. IEEE ACCESS 8, 41764\u201341773 (2020)","journal-title":"IEEE ACCESS"},{"issue":"10","key":"4942_CR24","first-page":"2187","volume":"54","author":"Y Yatao","year":"2017","unstructured":"Yatao, Y., Yaze, Z., Zichen, Li., et al.: RAKA: new authenticated key agreement protocol based on ring-LWE. J. Comp. Res. Dev. 54(10), 2187\u20132192 (2017)","journal-title":"J. Comp. Res. Dev."},{"key":"4942_CR25","doi-asserted-by":"crossref","unstructured":"Regev O, Rosen R. Lattice problems and norm embeddings. In: The thirty-eighth annual ACM symposium on Theory of computing (STOC '06), ACM, 2006: 447\u2013456.","DOI":"10.1145\/1132516.1132581"},{"issue":"6","key":"4942_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2535925","volume":"60","author":"V Lyubashevsky","year":"2013","unstructured":"Lyubashevsky, V., Peikert, C., Regev, O.: On ideal lattices and learning with errors over rings. J. ACM 60(6), 1\u201335 (2013)","journal-title":"J. ACM"},{"key":"4942_CR27","unstructured":"Bettaieb S, Bidoux L, Blazy O, et al. Post-quantum oblivious transfer from smooth projective hash functions with grey zone. arxiv preprint. 2209.04149 (2022)."},{"key":"4942_CR28","doi-asserted-by":"crossref","unstructured":"Beguinet, H., Chevalier, C., Pointcheval, D., Ricosset, T., Rossi, M.: GeT a CAKE: Generic Transformations from Key Encaspulation Mechanisms to Password Authenticated Key Exchanges. In: 21st International Conference Applied Cryptography and Network Security (ACNS 2023). LNCS, vol 13906. Springer, Cham, pp 516\u2013538 (2023).","DOI":"10.1007\/978-3-031-33491-7_19"},{"issue":"11","key":"4942_CR29","first-page":"2321","volume":"45","author":"YIN An-Qi","year":"2022","unstructured":"An-Qi, Y.I.N., Ding, W.A.N.G., Yuan-Bo, G.U.O., et al.: Provably secure quantum resistant efficient password-authentication key exchange protocol. Chin. J. Comp. 45(11), 2321\u20132336 (2022)","journal-title":"Chin. J. Comp."},{"issue":"11","key":"4942_CR30","doi-asserted-by":"publisher","first-page":"2776","DOI":"10.1109\/TIFS.2017.2721359","volume":"12","author":"D Wang","year":"2017","unstructured":"Wang, D., Cheng, H., Wang, P., et al.: Zipf\u2019s law in passwords. IEEE Trans. Inf. Forensics Secur. 12(11), 2776\u20132791 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4942_CR31","unstructured":"Thomas, Wu.: The secure remote password protocol. In: Internet Society Network and Distributed System Security Symposium (NDSS 1998). Internet Society, USA, pp 97\u2013111 (1998)"},{"key":"4942_CR32","doi-asserted-by":"crossref","unstructured":"Shen, J., Feng, M., Liu, D., et al.: Enhanced remote password-authenticated key agreement based on smart card supporting password changing. In: 13th International Conference on Information Security Practice and Experience (ISPEC 2017). LNCS, vol 10701, Springer, Cham, pp 454\u2013467 (2017).","DOI":"10.1007\/978-3-319-72359-4_27"},{"key":"4942_CR33","doi-asserted-by":"crossref","unstructured":"Wang, D., Zhang, Z., Wang, P.: Targeted online password guessing: An underestimated threat. In: ACM SIGSAC conference on computer and communications security (CCS 16). ACM, New York, pp 1242\u20131254 (2016)","DOI":"10.1145\/2976749.2978339"},{"issue":"1","key":"4942_CR34","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1109\/TII.2018.2824815","volume":"15","author":"S Roy","year":"2019","unstructured":"Roy, S., Das, A.K., Chatterjee, S., et al.: provably secure fine-grained data access control over multiple cloud servers in mobile cloud computing based healthcare applications. IEEE Trans. Industr. Inf. 15(1), 457\u2013468 (2019)","journal-title":"IEEE Trans. Industr. Inf."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04942-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-04942-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04942-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T06:31:08Z","timestamp":1757140268000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-04942-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,25]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["4942"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-04942-1","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2025,2,25]]},"assertion":[{"value":"27 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 October 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 November 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}}],"article-number":"223"}}