{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T18:11:57Z","timestamp":1770228717073,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":30,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819609345","type":"print"},{"value":"9789819609352","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T00:00:00Z","timestamp":1733702400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T00:00:00Z","timestamp":1733702400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0935-2_1","type":"book-chapter","created":{"date-parts":[[2024,12,8]],"date-time":"2024-12-08T18:01:46Z","timestamp":1733680906000},"page":"3-33","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["C\u2019est Tr\u00e8s CHIC: A Compact Password-Authenticated Key Exchange from\u00a0Lattice-Based KEM"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1967-3390","authenticated-orcid":false,"given":"Afonso","family":"Arriaga","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6848-5564","authenticated-orcid":false,"given":"Manuel","family":"Barbosa","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5055-2407","authenticated-orcid":false,"given":"Stanislaw","family":"Jarecki","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7132-7591","authenticated-orcid":false,"given":"Marjan","family":"\u0160krobot","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"1_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1007\/978-3-642-11799-2_28","volume-title":"Theory of Cryptography","author":"M Abdalla","year":"2010","unstructured":"Abdalla, M., Bellare, M., Neven, G.: Robust Encryption. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 480\u2013497. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-11799-2_28"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Abdalla, M., Haase, B., Hesse, J.: Security analysis of CPace. In: Advances in Cryptology \u2013 ASIACRYPT 2021. pp. 711\u2013741. Springer (2021)","DOI":"10.1007\/978-3-030-92068-5_24"},{"key":"1_CR3","doi-asserted-by":"publisher","unstructured":"Alnahawi, N., H\u00f6velmanns, K., H\u00fclsing, A., Ritsch, S.: Towards post-quantum secure PAKE - A tight security proof for OCAKE in the BPR model. In: Kohlweiss, M., Di Pietro, R., Beresford, A. (eds.) Cryptology and Network Security. CANS 2024. LNCS, vol. 14906, pp. 191\u2013212. Springer, Singapore (2025). https:\/\/doi.org\/10.1007\/978-981-97-8016-7_9","DOI":"10.1007\/978-981-97-8016-7_9"},{"key":"1_CR4","unstructured":"Arriaga, A., Barbosa, M., Jarecki, S., Skrobot, M.: C\u2019est tr\u00e8s CHIC: A compact password-authenticated key exchange from lattice-based KEM. Cryptology ePrint Archive, Paper 2024\/308 (2024), https:\/\/eprint.iacr.org\/2024\/308"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Beguinet, H., Chevalier, C., Pointcheval, D., Ricosset, T., Rossi, M.: GeT a CAKE: Generic transformations from key encaspulation mechanisms to password authenticated key exchanges. In: Applied Cryptography and Network Security \u2013 ACNS 2023. pp. 516\u2013538. Springer (2023)","DOI":"10.1007\/978-3-031-33491-7_19"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-45539-6_11","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2000","author":"M Bellare","year":"2000","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139\u2013155. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-45539-6_11"},{"key":"1_CR7","unstructured":"Bellovin, S., Merritt, M.: Encrypted key exchange: password-based protocols secure against dictionary attacks. In: Symposium on Research in Security and Privacy \u2013 S &P 1992. pp. 72\u201384. IEEE Computer Society (1992)"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-642-25385-0_3","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2011","author":"D Boneh","year":"2011","unstructured":"Boneh, D., Dagdelen, \u00d6., Fischlin, M., Lehmann, A., Schaffner, C., Zhandry, M.: Random Oracles in a Quantum World. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 41\u201369. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-25385-0_3"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Bos, J., Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schanck, J.M., Schwabe, P., Seiler, G., Stehle, D.: CRYSTALS - Kyber: A CCA-secure module-lattice-based KEM. In: European Symposium on Security and Privacy \u2013 EuroS &P 2018. pp. 353\u2013367. IEEE Computer Society (2018)","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"1_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/3-540-45539-6_12","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2000","author":"V Boyko","year":"2000","unstructured":"Boyko, V., MacKenzie, P., Patel, S.: Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 156\u2013171. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-45539-6_12"},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/978-3-030-21568-2_22","volume-title":"Applied Cryptography and Network Security","author":"T Bradley","year":"2019","unstructured":"Bradley, T., Camenisch, J., Jarecki, S., Lehmann, A., Neven, G., Xu, J.: Password-Authenticated Public-Key Encryption. In: Deng, R.H., Gauthier-Uma\u00f1a, V., Ochoa, M., Yung, M. (eds.) ACNS 2019. LNCS, vol. 11464, pp. 442\u2013462. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-21568-2_22"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: Security proofs for an efficient password-based key exchange. In: ACM Conference on Computer and Communications Security \u2013 CCS 2003. pp. 241\u2013250. Association for Computing Machinery (2003)","DOI":"10.1145\/948109.948142"},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1007\/11426639_24","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"R Canetti","year":"2005","unstructured":"Canetti, R., Halevi, S., Katz, J., Lindell, Y., MacKenzie, P.: Universally Composable Password-Based Key Exchange. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 404\u2013421. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11426639_24"},{"key":"1_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-642-11799-2_17","volume-title":"Theory of Cryptography","author":"J-S Coron","year":"2010","unstructured":"Coron, J.-S., Dodis, Y., Mandal, A., Seurin, Y.: A Domain Extender for the Ideal Cipher. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 273\u2013289. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-11799-2_17"},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-642-11799-2_17","volume-title":"Theory of Cryptography","author":"J-S Coron","year":"2010","unstructured":"Coron, J.-S., Dodis, Y., Mandal, A., Seurin, Y.: A Domain Extender for the Ideal Cipher. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 273\u2013289. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-11799-2_17"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Grubbs, P., Maram, V., Paterson, K.G.: Anonymous, robust post-quantum public key encryption. In: Advances in Cryptology \u2013 EUROCRYPT 2022. pp. 402\u2013432. Springer (2022)","DOI":"10.1007\/978-3-031-07082-2_15"},{"issue":"4","key":"1_CR17","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1007\/s12095-015-0128-7","volume":"7","author":"C Guo","year":"2015","unstructured":"Guo, C., Lin, D.: Improved domain extender for the ideal cipher. Cryptography and Communications 7(4), 509\u2013533 (2015). https:\/\/doi.org\/10.1007\/s12095-015-0128-7","journal-title":"Cryptography and Communications"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Hao, F., van Oorschot, P.C.: SoK: Password-authenticated key exchange \u2013 theory, practice, standardization and real-world lessons. In: ACM Asia Conference on Computer and Communications Security \u2013 AsiaCCS 2022. pp. 697\u2013711. Association for Computing Machinery (2022)","DOI":"10.1145\/3488932.3523256"},{"key":"1_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/978-3-030-03326-2_10","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2018","author":"A Hosoyamada","year":"2018","unstructured":"Hosoyamada, A., Yasuda, K.: Building Quantum-One-Way Functions from Block Ciphers: Davies-Meyer and Merkle-Damg\u00e5rd Constructions. In: Peyrin, T., Galbraith, S. (eds.) ASIACRYPT 2018. LNCS, vol. 11272, pp. 275\u2013304. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03326-2_10"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Lyu, Y., Liu, S., Han, S.: Universal composable password authenticated key exchange for the post-quantum world. In: Advances in Cryptology \u2013 EUROCRYPT 2024. pp. 120\u2013150. Springer (2024)","DOI":"10.1007\/978-3-031-58754-2_5"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Maram, V., Xagawa, K.: Post-quantum anonymity of Kyber. In: Public-Key Cryptography \u2013 PKC 2023. pp. 3\u201335. Springer (2023)","DOI":"10.1007\/978-3-031-31368-4_1"},{"key":"1_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-540-24638-1_2","volume-title":"Theory of Cryptography","author":"U Maurer","year":"2004","unstructured":"Maurer, U., Renner, R., Holenstein, C.: Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 21\u201339. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24638-1_2"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"McQuoid, I., Rosulek, M., Roy, L.: Minimal symmetric PAKE and 1-out-of-n OT from programmable-once public functions. In: ACM Conference on Computer and Communications Security \u2013 CCS 2020. pp. 425\u2013442. Association for Computing Machinery (2020)","DOI":"10.1145\/3372297.3417870"},{"key":"1_CR24","unstructured":"Naehrig, M., Alkim, E., Bos, J., Ducas, L., Easterbrook, K., LaMacchia, B., Longa, P., Mironov, I., Nikolaenko, V., Peikert, C., Raghunathan, A., Stebila, D.: FrodoKEM. Tech. rep., National Institute of Standards and Technology (2020), available at https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/post-quantum-cryptography-standardization\/round-3-submissions"},{"key":"1_CR25","unstructured":"NIST: FIPS203, Module-Lattice-based Key-Encapsulation Mechanism Standard. Federal Information Processing Standards Publication (2023), https:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.203.pdf"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Okamoto, T., Pointcheval, D.: REACT: Rapid enhanced-security asymmetric cryptosystem transform. In: Topics in Cryptology \u2013 CT-RSA 2001. pp. 159\u2013174. Springer (2001)","DOI":"10.1007\/3-540-45353-9_13"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Pan, J., Zeng, R.: A generic construction of tightly secure password-based authenticated key exchange. In: Advances in Cryptology \u2013 ASIACRYPT 2023. pp. 143\u2013175. Springer (2023)","DOI":"10.1007\/978-981-99-8742-9_5"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Santos, B.F.D., Gu, Y., Jarecki, S.: Randomized half-ideal cipher on groups with applications to UC (a)PAKE. In: Advances in Cryptology \u2013 EUROCRYPT 2023. pp. 128\u2013156. Springer (2023)","DOI":"10.1007\/978-3-031-30589-4_5"},{"key":"1_CR29","unstructured":"Schwabe, P., Avanzi, R., Bos, J., Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schanck, J.M., Seiler, G., Stehl\u00e9, D., Ding, J.: CRYSTALS-KYBER. Tech. rep., National Institute of Standards and Technology (2022), available at https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/selected-algorithms-2022"},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Xagawa, K.: Anonymity of NIST PQC round 3 KEMs. In: Advances in Cryptology \u2013 EUROCRYPT 2022. pp. 551\u2013581. Springer (2022)","DOI":"10.1007\/978-3-031-07082-2_20"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0935-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,8]],"date-time":"2024-12-08T18:01:52Z","timestamp":1733680912000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0935-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,9]]},"ISBN":["9789819609345","9789819609352"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0935-2_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,9]]},"assertion":[{"value":"9 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}