{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T23:52:24Z","timestamp":1747180344127,"version":"3.40.5"},"reference-count":33,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Computer Mathematics: Computer Systems Theory"],"published-print":{"date-parts":[[2021,10,2]]},"DOI":"10.1080\/23799927.2021.1873192","type":"journal-article","created":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T08:38:36Z","timestamp":1610613516000},"page":"313-336","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":3,"title":["Efficient single round attribute-based authenticated key exchange protocol"],"prefix":"10.1080","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5352-4946","authenticated-orcid":false,"given":"Suvradip","family":"Chakraborty","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Indian Institute of Technology, Madras, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8701-0209","authenticated-orcid":false,"given":"Sreenivasa Y.","family":"Rao","sequence":"additional","affiliation":[{"name":"Department of Mathematics, National Institute of Technology, Warangal, India"}]},{"given":"C.","family":"Pandu Rangan","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Indian Institute of Technology, Madras, India"}]}],"member":"301","published-online":{"date-parts":[[2021,1,28]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.5220\/0006469202120225"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14081-5_18"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-02641-7_24"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1504\/IJACT.2012.045589"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15317-4_11"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36334-4_19"},{"key":"CIT0008","first-page":"929","volume":"2014","author":"Gentry C.","year":"2014","journal-title":"IACR Cryptology EPrint Archive"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14081-5_19"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"CIT0011","doi-asserted-by":"crossref","unstructured":"H. Krawczyk, Cryptographic extraction and key derivation: The hkdf scheme, CRYPTO, Vol. 6223, Springer, 2010, pp. 631\u2013648.","DOI":"10.1007\/978-3-642-14623-7_34"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75670-5_1"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755697"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.10.014"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19074-2_24"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052987"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53008-5_22"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2016.05.002"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44586-2_8"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2014.2353053"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315270"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12475-9_19"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.07.019"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.07.019"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-015-0289-6"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02384-2_13"},{"key":"CIT0028","first-page":"235","volume":"2010","author":"Steinwandt R.","year":"2010","journal-title":"IACR Cryptology EPrint Archive"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47422-9_13"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17455-1_10"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31912-9_31"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1664"}],"container-title":["International Journal of Computer Mathematics: Computer Systems Theory"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/23799927.2021.1873192","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,7]],"date-time":"2022-01-07T09:45:19Z","timestamp":1641548719000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/23799927.2021.1873192"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,28]]},"references-count":33,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,10,2]]}},"alternative-id":["10.1080\/23799927.2021.1873192"],"URL":"https:\/\/doi.org\/10.1080\/23799927.2021.1873192","relation":{},"ISSN":["2379-9927","2379-9935"],"issn-type":[{"type":"print","value":"2379-9927"},{"type":"electronic","value":"2379-9935"}],"subject":[],"published":{"date-parts":[[2021,1,28]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tcom20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tcom20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2020-07-17","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-12-06","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-12-31","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-01-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}