{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T18:42:27Z","timestamp":1767292947993,"version":"3.48.0"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2021YFA1000600"],"award-info":[{"award-number":["2021YFA1000600"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62472255"],"award-info":[{"award-number":["62472255"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62302271"],"award-info":[{"award-number":["62302271"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Youth Innovation Team of Shandong Province","award":["2024KJH79"],"award-info":[{"award-number":["2024KJH79"]}]},{"name":"Natural Science Foundation of Shandong Province, China","award":["ZR2023MF045"],"award-info":[{"award-number":["ZR2023MF045"]}]},{"name":"Natural Science Foundation of Shandong Province, China","award":["ZR2023QF088"],"award-info":[{"award-number":["ZR2023QF088"]}]},{"DOI":"10.13039\/501100014761","name":"Natural Science Foundation of Qingdao, China","doi-asserted-by":"publisher","award":["23-2-1-152-zyyd-jch"],"award-info":[{"award-number":["23-2-1-152-zyyd-jch"]}],"id":[{"id":"10.13039\/501100014761","id-type":"DOI","asserted-by":"publisher"}]},{"name":"CCF-Huawei Populus Grove Fund","award":["CCF-HuaweiTC202506"],"award-info":[{"award-number":["CCF-HuaweiTC202506"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Consumer Electron."],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1109\/tce.2025.3611598","type":"journal-article","created":{"date-parts":[[2025,9,18]],"date-time":"2025-09-18T17:45:55Z","timestamp":1758217555000},"page":"11215-11227","source":"Crossref","is-referenced-by-count":0,"title":["QT-PAKE: Secure Messaging via Quantum-Safe Threshold PAKE"],"prefix":"10.1109","volume":"71","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0758-7230","authenticated-orcid":false,"given":"Zengpeng","family":"Li","sequence":"first","affiliation":[{"name":"School of Cyber Science and Technology, and the State Key Laboratory of Cryptography and Digital Economy Security, Shandong University, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-3225-4829","authenticated-orcid":false,"given":"Hao","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology and the National Graduate School for Elite Engineers, Shandong University, Qingdao, China"}]},{"given":"Guangyu","family":"Liao","sequence":"additional","affiliation":[{"name":"College of Computer and Science and Technology, Harbin Engineering University, Harbin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7658-3797","authenticated-orcid":false,"given":"Mei","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, and the State Key Laboratory of Cryptography and Digital Economy Security, Shandong University, Qingdao, China"}]},{"given":"Peiran","family":"Li","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology and the National Graduate School for Elite Engineers, Shandong University, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2786-0273","authenticated-orcid":false,"given":"Prosanta","family":"Gope","sequence":"additional","affiliation":[{"name":"Department of Computer Science (Cyber Security), University of Sheffield, Sheffield, U.K."}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00037"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3314209"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2015.7389804"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2020.3035566"},{"volume-title":"SRP-6: Improvements and refinements to the secure remote password protocol","year":"2002","author":"Wu","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485877"},{"volume-title":"HarmonyOS Security Guidelines","year":"2021","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2246"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1992.213269"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168618"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/11818175_9"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-96-0935-2_2"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78372-7_15"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_17"},{"key":"ref15","first-page":"1","article-title":"Secure account recovery for a privacy-preserving Web service","volume-title":"Proc. 33rd USENIX Secur. Symp. (USENIX)","author":"Little"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78372-3_17"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61204-1_3"},{"key":"ref18","first-page":"1831","article-title":"Might I get Pwned: A second generation compromised credential checking service","volume-title":"Proc. 31st USENIX Secur. Symp. (USENIX Secur.)","author":"Pal"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45608-8_13"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-07085-3_23"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1137\/s0036144598347011"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_37"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-52153-4_11"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-96-0894-2_7"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-96-0935-2_3"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_24"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-38554-4_20"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2001.959888"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.30"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46035-7_4"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_12"},{"article-title":"The PAK suite: Protocols for password-authenticated key exchange","year":"2002","author":"MacKenzie","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-75160-3_8"},{"key":"ref37","first-page":"1","article-title":"The secure remote password protocol","volume-title":"Proc. Netw. Distrib. Syst. Secur. Symp. (NDSS)","author":"Wu"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30574-3_14"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_20"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46035-7_22"},{"key":"ref41","first-page":"546","article-title":"HMQV: A high-performance secure Diffie-Hellman protocol","volume-title":"Proc. 25th Annu. Int. Cryptol. Conf.","author":"Krawczyk"},{"article-title":"Lattice-based techniques for accountable anonymity: composition of abstract Stern\u2019s protocols and weak PRF with efficient protocols from LWR","year":"2017","author":"Yang","key":"ref42"},{"volume-title":"Security estimates for lattice problems","year":"2025","key":"ref43"}],"container-title":["IEEE Transactions on Consumer Electronics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/30\/11306167\/11172320.pdf?arnumber=11172320","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T18:37:14Z","timestamp":1767292634000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11172320\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":43,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tce.2025.3611598","relation":{},"ISSN":["0098-3063","1558-4127"],"issn-type":[{"type":"print","value":"0098-3063"},{"type":"electronic","value":"1558-4127"}],"subject":[],"published":{"date-parts":[[2025,11]]}}}