{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T02:57:07Z","timestamp":1769741827550,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,10,30]],"date-time":"2006-10-30T00:00:00Z","timestamp":1162166400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,10,30]]},"DOI":"10.1145\/1180405.1180454","type":"proceedings-article","created":{"date-parts":[[2007,1,17]],"date-time":"2007-01-17T01:15:56Z","timestamp":1168996556000},"page":"400-409","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":68,"title":["Deniable authentication and key exchange"],"prefix":"10.1145","author":[{"given":"Mario","family":"Di Raimondo","sequence":"first","affiliation":[{"name":"Universit\u00e0 di Catania, Italy"}]},{"given":"Rosario","family":"Gennaro","sequence":"additional","affiliation":[{"name":"IBM T.J.Watson Research Center"}]},{"given":"Hugo","family":"Krawczyk","sequence":"additional","affiliation":[{"name":"IBM T.J.Watson Research Center"}]}],"member":"320","published-online":{"date-parts":[[2006,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/276698.276854"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/646763.706331"},{"key":"e_1_3_2_1_3_1","first-page":"273","article-title":"The Knowledge of Exponent Assumptions and 3-Round Zero-Knowledge Protocols. CRYPTO '04","volume":"3152","author":"Bellare M.","year":"2004","journal-title":"LNCS"},{"key":"e_1_3_2_1_4_1","first-page":"48","article-title":"Towards Plaintext-Aware Public-Key Encryption without Random Oracles. ASIACRYPT '04","volume":"3329","author":"Bellare M.","year":"2004","journal-title":"LNCS"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/646758.705706"},{"key":"e_1_3_2_1_6_1","volume-title":"EUROCRYPT '94","year":"1994"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029179.1029200"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24852-1_18"},{"key":"e_1_3_2_1_9_1","volume-title":"Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. EUROCRYPT '01, LNCS 2045, 453--474","author":"Canetti R.","year":"2001"},{"key":"e_1_3_2_1_10_1","first-page":"337","article-title":"Universally Composable Notions of Key Exchange and Secure Channels.EUROCRYPT '02","volume":"2332","author":"Krawczyk H.","year":"2002","journal-title":"LNCS"},{"key":"e_1_3_2_1_11_1","first-page":"143","article-title":"Security Analysis of IKE 's Signature-based Key-Exchange Protocol.CRYPTO '02","volume":"2442","author":"Canetti R.","year":"2002","journal-title":"LNCS"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_1_13_1","volume-title":"Blind Signatures for Untraceable Payments. CRYPTO '82","author":"Chaum D.","year":"1982"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/4372.4373"},{"key":"e_1_3_2_1_15_1","volume-title":"Antwerpen. Undeniable Signatures. CRYPTO '89","author":"Chaum D.","year":"1990"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_20"},{"key":"e_1_3_2_1_17_1","unstructured":"B. Chor O. Goldreich E. Kushilevitz and M. Sudan. Private Information Retrieval. FOCS '95 41--50 IEEE 1995.]]   B. Chor O. Goldreich E. Kushilevitz and M. Sudan. Private Information Retrieval. FOCS '95 41--50 IEEE 1995.]]"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/646763.706340"},{"key":"e_1_3_2_1_19_1","first-page":"445","article-title":"Towards Practical Public Key Systems Secure Against Chosen Ciphertext Attacks.CRYPTO '91","volume":"576","author":"Damgard I.","year":"1992","journal-title":"LNCS"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_18"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102137"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102216"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795291562"},{"key":"e_1_3_2_1_24_1","first-page":"528","article-title":"Privacy-Preserving Datamining on Vertically Partitioned Databases. CRYPTO '04","volume":"3152","author":"Dwork C.","year":"2004","journal-title":"LNCS"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1039488.1039489"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00124891"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1137\/0218012"},{"key":"e_1_3_2_1_28_1","first-page":"408","article-title":"On the Existence of 3-Round Zero-Knowledge Protocols.CRYPTO '98","volume":"1462","author":"Hada S.","year":"1998","journal-title":"LNCS"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"D. Harkins and D. Carrel eds. The Internet Key Exchange (IKE). RFC 2409 November 1998.]]   D. Harkins and D. Carrel eds. The Internet Key Exchange (IKE). RFC 2409 November 1998.]]","DOI":"10.17487\/rfc2409"},{"key":"e_1_3_2_1_30_1","unstructured":"ISO\/IEC IS 9798-3 \"Entity authentication mechanisms \u00bf Part 3: Entity authentication using asymmetric techniques \" 1993.]]  ISO\/IEC IS 9798-3 \"Entity authentication mechanisms \u00bf Part 3: Entity authentication using asymmetric techniques \" 1993.]]"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68339-9_13"},{"key":"e_1_3_2_1_32_1","first-page":"211","volume":"2656","author":"Katz J.","year":"2003","journal-title":"LNCS"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"C. Kaufman ed. Internet Key Exchange (IKEv2) Protocol draft-ietf-ipsec-ikev2-17. txt September 2004 (pending RFC).]]  C. Kaufman ed. Internet Key Exchange (IKEv2) Protocol draft-ietf-ipsec-ikev2-17. txt September 2004 (pending RFC).]]","DOI":"10.17487\/rfc4306"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/525423.830460"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_24"},{"issue":"3","key":"e_1_3_2_1_36_1","first-page":"177","volume":"15","author":"Lindell Y.","year":"2002","journal-title":"Privacy Preserving Data Mining. J. of Cryptology"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/646762.759589"},{"key":"e_1_3_2_1_38_1","unstructured":"W. Mao and K. G. Paterson. On the Plausible Deniability Feature of Internet Protocols. Manuscript.]]  W. Mao and K. G. Paterson. On the Plausible Deniability Feature of Internet Protocols. Manuscript.]]"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_19"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/647097.717015"},{"key":"e_1_3_2_1_41_1","unstructured":"V. Shoup. On Formal Models for Secure Key Exchange. IBM Research Report RZ 3120 April 1999.]]  V. Shoup. On Formal Models for Secure Key Exchange. IBM Research Report RZ 3120 April 1999.]]"}],"event":{"name":"CCS06: 13th ACM Conference on Computer and Communications Security 2006","location":"Alexandria Virginia USA","acronym":"CCS06","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 13th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1180405.1180454","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T09:14:45Z","timestamp":1673082885000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1180405.1180454"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,10,30]]},"references-count":41,"alternative-id":["10.1145\/1180405.1180454","10.1145\/1180405"],"URL":"https:\/\/doi.org\/10.1145\/1180405.1180454","relation":{},"subject":[],"published":{"date-parts":[[2006,10,30]]},"assertion":[{"value":"2006-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}