{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T13:19:03Z","timestamp":1755695943031},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,7,12]],"date-time":"2013-07-12T00:00:00Z","timestamp":1373587200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1007\/s10623-013-9852-1","type":"journal-article","created":{"date-parts":[[2013,7,11]],"date-time":"2013-07-11T04:57:54Z","timestamp":1373518674000},"page":"183-218","source":"Crossref","is-referenced-by-count":22,"title":["Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal"],"prefix":"10.1007","volume":"74","author":[{"given":"Cas","family":"Cremers","sequence":"first","affiliation":[]},{"given":"Mich\u00e8le","family":"Feltz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,7,12]]},"reference":[{"key":"9852_CR1","unstructured":"Basin D., Cremers C.: Degrees of security: protocol guarantees in the face of compromising adversaries. In: Computer Science Logic, 24th International Workshop, CSL 2010, 19th Annual Conference of the EACSL. Lecture Notes in Computer Science, vol. 6247, pp. 1\u201318. Springer, Berlin (2010)."},{"key":"9852_CR2","unstructured":"Bellare M., Rogaway P.: Entity authentication and key distribution. In: 13th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO \u201993, pp. 232\u2013249. Springer, New York (1994)."},{"key":"9852_CR3","unstructured":"Bellare M., Rogaway P.: Provably secure session key distribution: the three party case. In: 27th Annual ACM Symposium on Theory of Computing, STOC \u201995, pp. 57\u201366. ACM, New York (1995)."},{"key":"9852_CR4","unstructured":"Bellare M., Pointcheval D., Rogaway P.: Authenticated key exchange secure against dictionary attacks. In: 19th International Conference on Theory and Application of Cryptographic Techniques, EUROCRYPT\u201900, pp. 139\u2013155. Springer, New York (2000)."},{"key":"9852_CR5","unstructured":"Blake-Wilson S., Menezes A.: Unknown key-share attacks on the station-to-station (STS) protocol. In: Imai H., Zheng Y. (eds.) PKC \u201999 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography. Lecture Notes in Computer Science, vol. 1560, pp. 154\u2013170. Springer, Berlin (1999)."},{"key":"9852_CR6","unstructured":"Boneh D., Lynn B., Shacham H.: Short signatures from the Weil pairing. In: ASIACRYPT\u201901, pp. 514\u2013532. Springer, Berlin (2001)."},{"key":"9852_CR7","unstructured":"Boneh D., Shen E., Waters B.: Strongly unforgeable signatures based on computational Diffie\u2013Hellman. In: Yung M., Dodis Y., Kiayias A., Malkin T. (eds.) PKC\u201906. Lecture Notes in Computer Science, vol. 3958, pp. 229\u2013240. Springer, Berlin (2006)."},{"key":"9852_CR8","unstructured":"Boyd C., Gonz\u00e1lez Nieto J.: On forward secrecy in one-round key exchange. In: 13th IMA International Conference, IMACC 2011. Lecture Notes in Computer Science, vol. 7089, pp. 451\u2013468. Springer, Berlin (2011)."},{"key":"9852_CR9","doi-asserted-by":"crossref","unstructured":"Boyd C., Cliff Y., Gonz\u00e1lez Nieto J.M., Paterson K.G.: One-round key exchange in the standard model. Int. J. Appl. Cryptogr. 1, 181\u2013199 (2009).","DOI":"10.1504\/IJACT.2009.023466"},{"key":"9852_CR10","unstructured":"Bresson E., Manulis M., Schwenk J.: On security models and compilers for group key exchange protocols. Cryptology ePrint Archive, Report 2006\/385. http:\/\/eprint.iacr.org\/ (2006)."},{"key":"9852_CR11","unstructured":"Canetti R., Krawczyk H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann B. (ed.) EUROCRYPT\u201901. Lecture Notes in Computer Science, vol. 2045, pp. 453\u2013474. Springer, London (2001). Full version on eprint."},{"key":"9852_CR12","unstructured":"Cheng Q., Ma C., Hu X.: A new strongly secure authenticated key exchange protocol. In: Park J.H., Chen H-H., Atiquzzaman M., Lee C., Kim T-H., Yeo S.-S. (eds.) ISA \u201909. Lecture Notes in Computer Science, vol. 5576, pp. 135\u2013144. Springer, Berlin (2009)."},{"key":"9852_CR13","unstructured":"Choo K-K.R., Boyd C., Hitchcock Y.: Examining indistinguishability-based proof models for key establishment protocols. In: Proceedings of the 11th International Conference on Theory and Application of Cryptology and Information Security, ASIACRYPT\u201905, pp. 585\u2013604. Springer, Berlin (2005)."},{"key":"9852_CR14","unstructured":"Chow S.S.M., Choo K-K.R.: Strongly-secure identity-based key agreement and anonymous extension. In: Garay J.A., Lenstra A.K., Mambo M., Peralta R. (eds.) Information Security, ISC\u201907. Lecture Notes in Computer Science, vol. 4779, pp. 203\u2013220. Springer, Berlin (2007)."},{"key":"9852_CR15","unstructured":"Cremers C.: Examining indistinguishability-based security models for key exchange protocols: the case of CK, CK-HMQV, and eCK. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS \u201911, pp. 80\u201391. ACM, New York (2011)."},{"key":"9852_CR16","unstructured":"Cremers C., Feltz M.: One-round strongly secure key exchange with perfect forward secrecy and deniability. Cryptology ePrint Archive, Report 2011\/300. http:\/\/eprint.iacr.org\/ (2011)."},{"key":"9852_CR17","unstructured":"Cremers C., Feltz M.: Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal. In: Proceedings of the 17th European Conference on Research in Computer Security, ESORICS. Springer, Berlin (2012)."},{"key":"9852_CR18","unstructured":"Dagdelen O., Fischlin M.: Security analysis of the extended access control protocol for machine readable travel documents. In: Proceedings of the 13th International Conference on Information security, ISC\u201910, pp. 54\u201368. Springer, Berlin (2011)."},{"key":"9852_CR19","doi-asserted-by":"crossref","unstructured":"Dent A.W.: A note on game-hopping proofs. Cryptology ePrint Archive, Report 2006\/260. http:\/\/eprint.iacr.org\/2006\/260 (2006).","DOI":"10.1111\/j.1399-0004.2006.00685.x"},{"key":"9852_CR20","unstructured":"Gennaro R., Krawczyk H., Rabin T.: Okamoto\u2013Tanaka revisited: fully authenticated Diffie\u2013Hellman with minimal overhead. In: Zhou J., Yung M. (eds.) ACNS\u201910, pp. 309\u2013328. Springer, Berlin (2010)."},{"key":"9852_CR21","unstructured":"Jeong I.R., Katz J., Lee D.H.: One-round protocols for two-party authenticated key exchange. http:\/\/www.cs.umd.edu\/~jkatz\/papers\/1round_AKE.pdf (2008)."},{"key":"9852_CR22","doi-asserted-by":"crossref","unstructured":"Katz J., Lindell Y.: Introduction to Modern Cryptography. Chapman Hall\/CRC, Boca Raton (2008).","DOI":"10.1201\/9781420010756"},{"key":"9852_CR23","unstructured":"Katz J., Yung M.: Scalable protocols for authenticated group key exchange. In: Boneh D. (ed.) Advances in Cryptology\u2014CRYPTO 2003, vol. 2729, pp. 110\u2013125. Springer, Berlin (2003)."},{"key":"9852_CR24","unstructured":"Kim M., Fujioka A., Ustaoglu B.: Strongly secure authenticated key exchange without naxos\u2019 approach. In: IWSEC\u201909, Toyama, pp. 174\u2013191 (2009)."},{"key":"9852_CR25","doi-asserted-by":"crossref","unstructured":"Krawczyk H.: HMQV: a high-performance secure Diffie\u2013Hellman protocol. Cryptology ePrint Archive, Report 2005\/176. http:\/\/eprint.iacr.org\/ (2005).","DOI":"10.1007\/11535218_33"},{"key":"9852_CR26","unstructured":"Krawczyk H.: HMQV: a high-performance secure Diffie\u2013Hellman protocol. In: Shoup V. (ed.) Advances in Cryptology\u2014CRYPTO 2005. Lecture Notes in Computer Science, vol. 3621, pp. 546\u2013566. Springer, Berlin (2005)."},{"key":"9852_CR27","unstructured":"LaMacchia B.A., Lauter K., Mityagin A.: Stronger security of authenticated key exchange. Cryptology ePrint Archive, Report 2006\/073. http:\/\/eprint.iacr.org\/ (2006)."},{"key":"9852_CR28","unstructured":"LaMacchia B.A., Lauter K., Mityagin A.: Stronger security of authenticated key exchange. In: Susilo W., Liu J.K., Mu Y. (eds.) ProvSec\u201907. Lecture Notes in Computer Science, vol. 4784, pp. 1\u201316. Springer, Berlin (2007)."},{"key":"9852_CR29","unstructured":"Lauter K., Mityagin A.: Security analysis of KEA authenticated key exchange protocol. In: Public Key Cryptography\u2014Proceedings of the 9th International Conference on Theory and Practice in Public-Key Cryptography (PKC 2006), New York, April 24\u201326, 2006. Lecture Notes in Computer Science, vol. 3958, pp. 378\u2013394. Springer, Berlin (2006)."},{"key":"9852_CR30","unstructured":"Lee J., Park C.S.: An efficient authenticated key exchange protocol with a tight security reduction. Cryptology ePrint Archive, Report 2008\/345. http:\/\/eprint.iacr.org\/ (2008)."},{"key":"9852_CR31","unstructured":"Lee J., Park J.H.: Authenticated key exchange secure under the computational Diffie\u2013Hellman assumption. Cryptology ePrint Archive, Report 2008\/344. http:\/\/eprint.iacr.org\/ (2008)."},{"key":"9852_CR32","unstructured":"Maurer U.: Abstract models of computation in cryptography. In: Smart N. (ed.) Cryptography and Coding 2005. Lecture Notes in Computer Science, vol. 3796, pp. 1\u201312. Springer, Berlin (2005)."},{"key":"9852_CR33","unstructured":"Menezes A.: Another look at HMQV. J. Math. Cryptol. 1, 47\u201364 (2008)."},{"key":"9852_CR34","doi-asserted-by":"crossref","unstructured":"Menezes A., van Oorschot P., Vanstone S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996).","DOI":"10.1201\/9781439821916"},{"key":"9852_CR35","unstructured":"Okamoto T., Pointcheval D.: The gap-problems: a new class of problems for the security of cryptographic schemes. In: Kim K. (ed.) PKC\u20192001. Lecture Notes in Computer Science, vol. 1992, pp. 104\u2013118. Springer, Berlin (2001)."},{"key":"9852_CR36","unstructured":"Shoup V.: Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive, Report 2004\/332. http:\/\/eprint.iacr.org\/ (2006)."},{"key":"9852_CR37","unstructured":"Ustaoglu B.: Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS. Cryptology ePrint Archive, Report 2007\/123 (2007). Version June 22 (2009)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-013-9852-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-013-9852-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-013-9852-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,28]],"date-time":"2022-02-28T10:31:11Z","timestamp":1646044271000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-013-9852-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,12]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,1]]}},"alternative-id":["9852"],"URL":"https:\/\/doi.org\/10.1007\/s10623-013-9852-1","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,12]]}}}