{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T05:28:09Z","timestamp":1747805289015,"version":"3.37.0"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2009,1]]},"DOI":"10.1007\/s11390-009-9207-6","type":"journal-article","created":{"date-parts":[[2009,3,26]],"date-time":"2009-03-26T14:12:18Z","timestamp":1238076738000},"page":"138-151","source":"Crossref","is-referenced-by-count":2,"title":["nPAKE+: A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords"],"prefix":"10.1007","volume":"24","author":[{"given":"Zhiguo","family":"Wan","sequence":"first","affiliation":[]},{"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Bao","sequence":"additional","affiliation":[]},{"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Gu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,3,1]]},"reference":[{"key":"9207_CR1","doi-asserted-by":"crossref","unstructured":"Wan Z, Deng R H, Bao F, Preneel B. nPAKE+: A hierarchical group password-authenticated key exchange protocol using different passwords. In Proc. ICICS\u201907, Zhengzhou, China, December 12\u201315, 2007, pp.31\u201343.","DOI":"10.1007\/978-3-540-77048-0_3"},{"key":"9207_CR2","unstructured":"Tang Q, Chen L. Weaknesses in two group Diffie-Hellman key exchange protocols. Cryptology ePrint Archive 2005\/197."},{"key":"9207_CR3","unstructured":"Bellovin S M, Merritt M. Encrypted key exchange: Password based protocols secure against dictionary attacks. In Proc. the 1992 IEEE Symposium on Research in Security and Privacy, Oakland, USA, May 4\u20136, 1992, pp.72\u201384."},{"key":"9207_CR4","doi-asserted-by":"crossref","unstructured":"Bellovin S M, Merritt M. Augmented encryptedKey exchange: A password-based protocol secure against dictionary attacks and password file compromise. In Proc. CCS\u201993, Virginia, USA, Nov. 3\u20135, 1993, pp.244\u2013250.","DOI":"10.1145\/168588.168618"},{"key":"9207_CR5","doi-asserted-by":"crossref","unstructured":"Bellare M, Pointcheval D, Rogaway P. Authenticated key exchange secure against dictionary attack. In Proc. the Advances in Cryptology (EUROCRYPT\u201900), Bruges, Belgium, May 14\u201318, 2000, pp.139\u2013155.","DOI":"10.1007\/3-540-45539-6_11"},{"key":"9207_CR6","unstructured":"Bellare M, Rogaway P. The AuthA protocol for password-based authenticated key exchange. Contribution to the IEEE P1363 Study Group, March 2000."},{"issue":"5","key":"9207_CR7","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/242896.242897","volume":"26","author":"D Jablon","year":"1996","unstructured":"Jablon D. Strong password-only authenticated key exchange. Computer Communication Review, ACM SIGCOMM, October 1996, 26(5): 5\u201326.","journal-title":"Computer Communication Review, ACM SIGCOMM"},{"key":"9207_CR8","doi-asserted-by":"crossref","unstructured":"Victor Boyko, Philip D MacKenzie, Sarvar Patel. Provably secure password-authenticated key exchange using Diffie-Hellman. In Proc. EUROCRYPT\u201900, Bruges, Belgium, May 14\u201318, 2000, pp.156\u2013171.","DOI":"10.1007\/3-540-45539-6_12"},{"key":"9207_CR9","doi-asserted-by":"crossref","unstructured":"Jablon D P. Extended password key exchange protocols immune to dictionary attacks. In Proc. WETICE\u201997, Cambridge, MA, USA, June 1997, pp.248\u2013255.","DOI":"10.1109\/ENABL.1997.630822"},{"key":"9207_CR10","doi-asserted-by":"crossref","unstructured":"Katz J, Ostrovsky R, Yung M. Efficient password-authenticated key exchange using human-memorable passwords. In Proc. EUROCRYPT\u201901, Innsbruck, Austria, May 6\u201310, 2001, pp.475\u2013494.","DOI":"10.1007\/3-540-44987-6_29"},{"key":"9207_CR11","doi-asserted-by":"crossref","unstructured":"Katz J, Ostrovsky R, Yung M. Forward security in password-only key exchange protocols. In Proc. SCN\u201902, Amalfi, Italy, 2002, pp.29\u201344.","DOI":"10.1007\/3-540-36413-7_3"},{"key":"9207_CR12","doi-asserted-by":"crossref","unstructured":"Lucks S. Open key exchange: How to defeat dictionary attacks without encrypting public keys. In Proc. Security Protocols Workshop, Paris, France, April 7\u20139, 1997, pp.79\u201390.","DOI":"10.1007\/BFb0028161"},{"key":"9207_CR13","doi-asserted-by":"crossref","unstructured":"MacKenzie P. The PAK suite: Protocols for password-authenticated key exchange. Technical Report 2002-46, DIMACS, 2002.","DOI":"10.1007\/3-540-45708-9_25"},{"key":"9207_CR14","doi-asserted-by":"crossref","unstructured":"Oded Goldreich, Yehuda Lindell. Session-Key generation using human passwords only. In Proc. CRYPTO\u201901, California, USA, August 19\u201323, 2001, pp.408\u2013432.","DOI":"10.1007\/3-540-44647-8_24"},{"key":"9207_CR15","unstructured":"Wu T. The secure remote password protocol. In Proc. the 1998 Internet Society Symposium on Network and Distributed System Security, California, USA, March 11\u201313, 1998, pp.97\u2013111."},{"key":"9207_CR16","doi-asserted-by":"crossref","unstructured":"Gennaro R, Lindell Y. A framework for password-based authenticated key exchange. In Proc. EUROCRYPT\u201903, Warsaw, Poland, May 4\u20138, 2003, pp.524\u2013543.","DOI":"10.1007\/3-540-39200-9_33"},{"issue":"3","key":"9207_CR17","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1145\/206826.206834","volume":"29","author":"M Steiner","year":"1995","unstructured":"Steiner M, Tsudik G, Waidner M. Refinement and extension of encrypted key exchange. ACM SIGOPS Operating Systems Review, 1995, 29(3): 22\u201330.","journal-title":"ACM SIGOPS Operating Systems Review"},{"issue":"12","key":"9207_CR18","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1109\/4234.974498","volume":"5","author":"C L Lin","year":"2001","unstructured":"Lin C L, Sun H M, Hwang T. Three-party encrypted key exchange without server public-keys. IEEE Communications Letters, 2001, 5(12): 497\u2013499.","journal-title":"IEEE Communications Letters"},{"key":"9207_CR19","doi-asserted-by":"crossref","unstructured":"Byun J W, Jeong I R, Lee D H, Park C-S. Password-authenticated key exchange between clients with different passwords. In Proc. ICICS\u201902, Singapore, December 9\u201312, 2002, pp.134\u2013146.","DOI":"10.1007\/3-540-36159-6_12"},{"issue":"4","key":"9207_CR20","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/506106.506108","volume":"34","author":"C L Lin","year":"2000","unstructured":"Lin C L, Sun H M, Hwang T. Three-party encrypted key exchange: Attacks and a solution. ACM Operating Systems Review, 2000, 34(4): 12\u201320.","journal-title":"ACM Operating Systems Review"},{"issue":"18","key":"9207_CR21","doi-asserted-by":"crossref","first-page":"1627","DOI":"10.1016\/S0140-3664(00)00249-8","volume":"23","author":"N Asokan","year":"2000","unstructured":"Asokan N, Ginzboorg P. Key agreement in ad-hoc networks. Computer Communications, 2000, 23(18): 1627\u20131637.","journal-title":"Computer Communications"},{"key":"9207_CR22","doi-asserted-by":"crossref","unstructured":"Bresson E, Chevassut O, Pointcheval D. Group Diffie-Hellman key exchange secure against dictionary attacks. In Proc. Asiacrypt\u201902, Queenstown, New Zealand, Dec. 1\u20135, 2002, pp.497\u2013514.","DOI":"10.1007\/3-540-36178-2_31"},{"key":"9207_CR23","doi-asserted-by":"crossref","unstructured":"Tang Q, Choo K K. Secure password-based authenticated group key agreement for data-sharing peer-to-peer networks. In Proc. ACNS\u201906, Singapore, June 6\u20139, 2006, pp.162\u2013177.","DOI":"10.1007\/11767480_11"},{"key":"9207_CR24","doi-asserted-by":"crossref","unstructured":"Lee S M, Hwang J Y, Lee D H. Efficient password-based group key exchange. In Proc. TrustBus\u201904, Zaragoza, Spain, LNCS 3184, August 30\u2013September 3, 2004, pp.191\u2013199.","DOI":"10.1007\/978-3-540-30079-3_20"},{"issue":"1","key":"9207_CR25","first-page":"23","volume":"3","author":"R Dutta","year":"2006","unstructured":"Dutta R, Barua R. Password-based encrypted group key agreement. International Journal of Network Security, July 2006, 3(1): 23\u201334.","journal-title":"International Journal of Network Security"},{"key":"9207_CR26","doi-asserted-by":"crossref","unstructured":"Burmester M, Desmedt Y. A secure and efficient conference key distribution system (extended abstract). In Proc. the Advances in Cryptology-Eurocrypt\u201994, Perugia, Italy, May 1994, pp.275\u2013286.","DOI":"10.1007\/BFb0053443"},{"key":"9207_CR27","doi-asserted-by":"crossref","unstructured":"Abdalla M, Bresson E, Chevassut O, Pointcheval D. Password-based group key exchange in a constant number of rounds. In Proc. the 9th Int. Conf. Theory and Practice of Public Key Cryptography, New York, USA, April 2006, pp.427\u2013442.","DOI":"10.1007\/11745853_28"},{"key":"9207_CR28","doi-asserted-by":"crossref","unstructured":"Byun J W, Lee D H. N-party encrypted Diffie-Hellman key exchange using different passwords. In Proc. ACNS\u201905, New York, USA, LNCS 3531, June 2005, pp.75\u201390.","DOI":"10.1007\/11496137_6"},{"key":"9207_CR29","doi-asserted-by":"crossref","unstructured":"Byun J W, Lee S M, Lee D H, Hong D. Constant-round password-based group key generation for multi-layer ad-hoc networks. In Proc. SPC\u201906, York, UK, April 2006, pp.3\u201317.","DOI":"10.1007\/11734666_2"},{"key":"9207_CR30","doi-asserted-by":"crossref","unstructured":"Bresson E, Chevassut O, Pointcheval D. Security proofs for an efficient password-based key exchange. In Proc. the 10th ACM Conference on Computer and Communications Security 2003, Washington DC, USA, 2003, pp.241\u2013250.","DOI":"10.1145\/948109.948142"},{"key":"9207_CR31","doi-asserted-by":"crossref","unstructured":"Wong C K, Gouda M, Lam S. Secure group communications using key graphs. In Proc. SIGCOMM\u201998, Vancouver, BC, Canada, Sept. 1998, pp.68\u201379.","DOI":"10.1145\/285237.285260"},{"key":"9207_CR32","doi-asserted-by":"crossref","unstructured":"Wallner D M, Harder E J, Agee R C. Key management for multicast: Issues and architectures. Internet Request for Comments 2627, June, 1999.","DOI":"10.17487\/rfc2627"},{"key":"9207_CR33","unstructured":"McGrew D, Sherman A. Key establishment in large dynamic groups using one-way function trees. Technical Report 0755, Network Associates, Inc., 1998."},{"key":"9207_CR34","doi-asserted-by":"crossref","unstructured":"Steiner M, Tsudik G, Waidner M. Cliques: A new approach to group key agreement. In Proc. ICDCS\u201998, Amsterdam, the Netherlands, May 1998, pp.380\u2013387.","DOI":"10.1109\/ICDCS.1998.679745"},{"issue":"8","key":"9207_CR35","doi-asserted-by":"crossref","first-page":"769","DOI":"10.1109\/71.877936","volume":"11","author":"M Steiner","year":"2000","unstructured":"Steiner M, Tsudik G, Waidner M. Key agreement in dynamic peer groups. IEEE Transactions on Parallel and Distributed Systems, August 2000, 11(8): 769\u2013780.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"9207_CR36","doi-asserted-by":"crossref","unstructured":"Perrig A, Song D, Tygar D. ELK, a new protocol for efficient large-group key distribution. In Proc. the IEEE Symposium on Security and Privacy, California, USA, 2001, pp.247\u2013262.","DOI":"10.1109\/SECPRI.2001.924302"},{"key":"9207_CR37","doi-asserted-by":"crossref","unstructured":"Kim Y, Perrig A, Tsudik G. Communication-efficient group key agreement. In Proc. IFIP SEC\u201901, Paris, France, 2001, pp.229\u2013244.","DOI":"10.1007\/0-306-46998-7_16"},{"key":"9207_CR38","doi-asserted-by":"crossref","unstructured":"Steer D, Strawczynski L, Diffie W, Wiener M. A secure audio teleconference system. In Proc. the Advances in Cryptology (CRYPTO\u201988), Santa Barbara, CA, USA, Goldwasser S (ed.), 1990, pp.520\u2013528.","DOI":"10.1007\/0-387-34799-2_37"},{"key":"9207_CR39","doi-asserted-by":"crossref","unstructured":"Kim Y, Perrig A, Tsudik A. Simple and fault-tolerant key agreement for dynamic collaborative groups. In Proc. CCS\u201900, Athens, Greece, 2000, pp.235\u2013244.","DOI":"10.1145\/352600.352638"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-009-9207-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-009-9207-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-009-9207-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,8]],"date-time":"2025-02-08T18:02:09Z","timestamp":1739037729000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-009-9207-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,1]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009,1]]}},"alternative-id":["9207"],"URL":"https:\/\/doi.org\/10.1007\/s11390-009-9207-6","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"type":"print","value":"1000-9000"},{"type":"electronic","value":"1860-4749"}],"subject":[],"published":{"date-parts":[[2009,1]]}}}