{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T17:37:50Z","timestamp":1762623470549},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,6,12]],"date-time":"2013-06-12T00:00:00Z","timestamp":1370995200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1007\/s11227-013-0968-x","type":"journal-article","created":{"date-parts":[[2013,6,11]],"date-time":"2013-06-11T15:08:59Z","timestamp":1370963339000},"page":"671-690","source":"Crossref","is-referenced-by-count":4,"title":["Deniability and forward secrecy of one-round authenticated key exchange"],"prefix":"10.1007","volume":"67","author":[{"given":"Haibo","family":"Tian","sequence":"first","affiliation":[]},{"given":"Xiaofeng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,6,12]]},"reference":[{"key":"968_CR1","first-page":"390","volume-title":"CCS 2006","author":"M Bellare","year":"2006","unstructured":"Bellare M, Neven G (2006) Multi-signatures in the plain public-key model and a general forking lemma. In: CCS 2006. ACM, Alexandria, pp 390\u2013399"},{"key":"968_CR2","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Proceedings of Asiacrypt 2001","author":"D Boneh","year":"2001","unstructured":"Boneh D, Lynn B, Shacham H (2001) Short signatures from the Weil pairing. In: Proceedings of Asiacrypt 2001. LNCS, vol 2248. Springer, Berlin, pp 514\u2013532"},{"key":"968_CR3","first-page":"77","volume-title":"Proceedings of the ACM workshop on privacy in the electronic society","author":"N Borisov","year":"2004","unstructured":"Borisov N, Goldberg I, Brewer E (2004) Off the record communication or why not to use PGP. In: Proceedings of the ACM workshop on privacy in the electronic society. ACM, New York, pp 77\u201384"},{"key":"968_CR4","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1007\/978-3-642-25516-8_27","volume-title":"Cryptography and coding 2011","author":"C Boyd","year":"2011","unstructured":"Boyd C, Nieto J (2011) On forward secrecy in one-round key exchange. In: Chen L (ed) Cryptography and coding 2011. LNCS, vol 7089, pp 451\u2013468"},{"key":"968_CR5","unstructured":"Cremers C (2009) Formally and practically relating the CK, CK-HMQV, and eCK security models for authenticated key exchange. Cryptology ePrint archive, Report 2009\/253"},{"key":"968_CR6","unstructured":"Cremers C, Feltz M (2011) One-round strongly secure key exchange with perfect forward secrecy and deniability. Cryptology ePrint archive, Report 2011\/300"},{"key":"968_CR7","doi-asserted-by":"crossref","first-page":"734","DOI":"10.1007\/978-3-642-33167-1_42","volume-title":"ESORICS 2012","author":"C Cremers","year":"2012","unstructured":"Cremers C, Feltz M (2012) Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal. In: ESORICS 2012, pp 734\u2013751"},{"key":"968_CR8","first-page":"445","volume-title":"LNCS","author":"I Damg\u00e5rd","year":"1992","unstructured":"Damg\u00e5rd I (1992) Toward practical public key systems secure against chosen ciphertext attacks. In: LNCS, vol 576. Springer, Berlin, pp 445\u2013456"},{"key":"968_CR9","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1007\/11792086_31","volume-title":"Proc of the 7th algorithmic number theory symposium","author":"A Dent","year":"2006","unstructured":"Dent A, Galbraith S (2006) Hidden pairings and trapdoor DDH groups. In: Proc of the 7th algorithmic number theory symposium, Berlin, July 2006, pp 436\u2013451"},{"key":"968_CR10","series-title":"LNCS","first-page":"146","volume-title":"TCC 2009","author":"Y Dodis","year":"2009","unstructured":"Dodis Y, Katz J, Smith A, Walfish S (2009) Composability and on-line deniability of authentication. In: Reingold O (ed) TCC 2009. LNCS, vol 5444, pp 146\u2013162"},{"key":"968_CR11","first-page":"409","volume-title":"Proceedings of STOC","author":"C Dwork","year":"1998","unstructured":"Dwork C, Naor M, Sahai A (1998) Concurrent zero knowledge. In: Proceedings of STOC. ACM Press, New York, pp 409\u2013418. 1998"},{"key":"968_CR12","series-title":"LNCS","first-page":"309","volume-title":"ACNS 2010","author":"R Gennaro","year":"2010","unstructured":"Gennaro R, Krawczyk H, Rabin T (2010) Okamoto\u2013Tanaka revisited: fully authenticated Diffie\u2013Hellman with minimal overhead. In: ACNS 2010. LNCS, vol 6123, pp 309\u2013328"},{"key":"968_CR13","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1007\/978-3-642-14577-3_33","volume-title":"Financial cryptography","author":"F Hao","year":"2010","unstructured":"Hao F (2010) On robust key agreement based on public key authentication. In: Financial cryptography. LNCS, vol 6052, pp 383\u2013390"},{"issue":"2\/3","key":"968_CR14","first-page":"32","volume":"1","author":"H Huang","year":"2012","unstructured":"Huang H (2012) An eCK-secure one round authenticated key exchange protocol with perfect forward security. J Internet Serv Inf Secur 1(2\/3):32\u201343","journal-title":"J Internet Serv Inf Secur"},{"key":"968_CR15","series-title":"LNCS","first-page":"220","volume-title":"ACNS 2004","author":"I Jeong","year":"2004","unstructured":"Jeong I, Katz J, Lee D (2004) One-round protocols for two-party authenticated key exchange. In: Jakobsson M, Yung M, Zhou J (eds) ACNS 2004. LNCS, vol 3089, pp 220\u2013232"},{"key":"968_CR16","series-title":"LNCS","first-page":"47","volume-title":"FC 2008","author":"S Jiang","year":"2008","unstructured":"Jiang S, Safavi-Naini R (2008) An efficient deniable key exchange protocol (extended abstract). In: Tsudik G (ed) FC 2008. LNCS, vol 5143, pp 47\u201352"},{"key":"968_CR17","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1007\/11535218_33","volume-title":"CRYPTO 2005","author":"H Krawczyk","year":"2005","unstructured":"Krawczyk H (2005) HMQV: a high-performance secure Diffie\u2013Hellman protocol. In: CRYPTO 2005. LNCS, vol 3621, pp 546\u2013566"},{"key":"968_CR18","series-title":"LNCS","first-page":"1","volume-title":"ProvSec","author":"B LaMacchia","year":"2007","unstructured":"LaMacchia B, Lauter K, Mityagin A (2007) Stronger security of authenticated key exchange. In: ProvSec. LNCS, vol 4784, pp 1\u201316"},{"key":"968_CR19","first-page":"400","volume-title":"CCS\u20192006","author":"M Raimondo","year":"2006","unstructured":"Raimondo M, Gennaro R, Krawczyk H (2006) Deniable authentication and key exchange. In: CCS\u20192006, Alexandria, VA, USA, pp 400\u2013409"},{"issue":"1","key":"968_CR20","doi-asserted-by":"crossref","DOI":"10.1007\/s11432-012-4718-0","volume":"56","author":"H Tian","year":"2013","unstructured":"Tian H, Zhang F, Chen X, Wei B (2013) Selectively unforgeable but existentially forgeable signature schemes and applications. Sci China Inf Sci 56(1):012107(14). doi: 10.1007\/s11432-012-4718-0","journal-title":"Sci China Inf Sci"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-013-0968-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-013-0968-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-013-0968-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,15]],"date-time":"2019-07-15T05:21:31Z","timestamp":1563168091000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-013-0968-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,12]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,3]]}},"alternative-id":["968"],"URL":"https:\/\/doi.org\/10.1007\/s11227-013-0968-x","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,6,12]]}}}