{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:34:38Z","timestamp":1750307678989,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,3,10]],"date-time":"2009-03-10T00:00:00Z","timestamp":1236643200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["DP0773348"],"award-info":[{"award-number":["DP0773348"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,3,10]]},"DOI":"10.1145\/1533057.1533079","type":"proceedings-article","created":{"date-parts":[[2009,4,28]],"date-time":"2009-04-28T14:57:19Z","timestamp":1240930639000},"page":"146-156","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Universally composable contributory group key exchange"],"prefix":"10.1145","author":[{"given":"M. Choudary","family":"Gorantla","sequence":"first","affiliation":[{"name":"Queensland University of Technology, Brisbane, QLD, Australia"}]},{"given":"Colin","family":"Boyd","sequence":"additional","affiliation":[{"name":"Queensland University of Technology, Brisbane, QLD, Australia"}]},{"given":"Juan Manuel Gonz\u00e1lez","family":"Nieto","sequence":"additional","affiliation":[{"name":"Queensland University of Technology, Brisbane, QLD, Australia"}]}],"member":"320","published-online":{"date-parts":[[2009,3,10]]},"reference":[{"key":"e_1_3_2_1_1_1","series-title":"LNCS","first-page":"335","volume-title":"Topics in Cryptology--CT-RSA'08","author":"Abdalla M.","year":"2008","unstructured":"M. Abdalla , D. Catalano , C. Chevalier , and D. Pointcheval . Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework . In Topics in Cryptology--CT-RSA'08 , volume 4964 of LNCS , pages 335 -- 351 . Springer , 2008 . M. Abdalla, D. Catalano, C. Chevalier, and D. Pointcheval. Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework. In Topics in Cryptology--CT-RSA'08, volume 4964 of LNCS, pages 335--351. Springer, 2008."},{"key":"e_1_3_2_1_3_1","series-title":"LNCS","first-page":"139","volume-title":"Advances in Cryptology--EUROCRYPT'00","author":"Bellare M.","year":"2000","unstructured":"M. Bellare , D. Pointcheval , and P. Rogaway . Authenticated Key Exchange Secure against Dictionary Attacks . In Advances in Cryptology--EUROCRYPT'00 , volume 1807 of LNCS , pages 139 -- 155 . Springer , 2000 . M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated Key Exchange Secure against Dictionary Attacks. In Advances in Cryptology--EUROCRYPT'00, volume 1807 of LNCS, pages 139--155. Springer, 2000."},{"key":"e_1_3_2_1_4_1","series-title":"LNCS","first-page":"232","volume-title":"Advances in Cryptology---CRYPTO'93","author":"Bellare M.","year":"1993","unstructured":"M. Bellare and P. Rogaway . Entity Authentication and Key Distribution . In Advances in Cryptology---CRYPTO'93 , volume 773 of LNCS , pages 232 -- 249 . Springer , 1993 . M. Bellare and P. Rogaway. Entity Authentication and Key Distribution. In Advances in Cryptology---CRYPTO'93, volume 773 of LNCS, pages 232--249. Springer, 1993."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-007-0018-x"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-09527-0"},{"key":"e_1_3_2_1_7_1","series-title":"LNCS","first-page":"290","volume-title":"Advances in Cryptology--ASIACRYPT'01","author":"Bresson E.","year":"2001","unstructured":"E. Bresson , O. Chevassut , and D. Pointcheval . Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case . In Advances in Cryptology--ASIACRYPT'01 , volume 2248 of LNCS , pages 290 -- 309 . Springer , 2001 . E. Bresson, O. Chevassut, and D. Pointcheval. Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case. In Advances in Cryptology--ASIACRYPT'01, volume 2248 of LNCS, pages 290--309. Springer, 2001."},{"key":"e_1_3_2_1_8_1","series-title":"LNCS","first-page":"321","volume-title":"Advances in Cryptology--EUROCRYPT'02","author":"Bresson E.","year":"2002","unstructured":"E. Bresson , O. Chevassut , and D. Pointcheval . Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions . In Advances in Cryptology--EUROCRYPT'02 , volume 2332 of LNCS , pages 321 -- 336 . Springer , 2002 . E. Bresson, O. Chevassut, and D. Pointcheval. Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions. In Advances in Cryptology--EUROCRYPT'02, volume 2332 of LNCS, pages 321--336. Springer, 2002."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502018"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368310.1368347"},{"key":"e_1_3_2_1_11_1","first-page":"275","volume-title":"EUROCRYPT","author":"Burmester M.","year":"1994","unstructured":"M. Burmester and Y. Desmedt . A Secure and Efficient Conference Key Distribution System (Extended Abstract) . In EUROCRYPT , pages 275 -- 286 , 1994 . M. Burmester and Y. Desmedt. A Secure and Efficient Conference Key Distribution System (Extended Abstract). In EUROCRYPT, pages 275--286, 1994."},{"key":"e_1_3_2_1_13_1","series-title":"LNCS","first-page":"453","volume-title":"Advances in Cryptology - EUROCRYPT'01","author":"Canetti R.","year":"2001","unstructured":"R. Canetti and H. Krawczyk . Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels . In Advances in Cryptology - EUROCRYPT'01 , volume 2045 of LNCS , pages 453 -- 474 . Springer , 2001 . R. Canetti and H. Krawczyk. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In Advances in Cryptology - EUROCRYPT'01, volume 2045 of LNCS, pages 453--474. Springer, 2001."},{"key":"e_1_3_2_1_14_1","series-title":"LNCS","first-page":"143","volume-title":"Advances in Cryptology--CRYPTO'02","author":"Canetti R.","year":"2002","unstructured":"R. Canetti and H. Krawczyk . Security Analysis of IKE's Signature-Based Key-Exchange Protocol . In Advances in Cryptology--CRYPTO'02 , volume 2442 of LNCS , pages 143 -- 161 . Springer , 2002 . R. Canetti and H. Krawczyk. Security Analysis of IKE's Signature-Based Key-Exchange Protocol. In Advances in Cryptology--CRYPTO'02, volume 2442 of LNCS, pages 143--161. Springer, 2002."},{"key":"e_1_3_2_1_15_1","series-title":"LNCS","first-page":"337","volume-title":"Advances in Cryptology - EUROCRYPT'02","author":"Canetti R.","year":"2002","unstructured":"R. Canetti and H. Krawczyk . Universally Composable Notions of Key Exchange and Secure Channels . In Advances in Cryptology - EUROCRYPT'02 , volume 2332 of LNCS , pages 337 -- 351 . Springer , 2002 . Full Version at http:\/\/eprint.iacr.org\/2002\/059. R. Canetti and H. Krawczyk. Universally Composable Notions of Key Exchange and Secure Channels. In Advances in Cryptology - EUROCRYPT'02, volume 2332 of LNCS, pages 337--351. Springer, 2002. Full Version at http:\/\/eprint.iacr.org\/2002\/059."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/509907.509980"},{"key":"e_1_3_2_1_17_1","series-title":"LNCS","first-page":"265","volume-title":"Advances in Cryptology--CRYPTO'03","author":"Canetti R.","year":"2003","unstructured":"R. Canetti and T. Rabin . Universal Composition with Joint State . In Advances in Cryptology--CRYPTO'03 , volume 2729 of LNCS , pages 265 -- 281 . Springer , 2003 . R. Canetti and T. Rabin. Universal Composition with Joint State. In Advances in Cryptology--CRYPTO'03, volume 2729 of LNCS, pages 265--281. Springer, 2003."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/12130.12168"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11836810_33"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.920224"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85855-3_26"},{"key":"e_1_3_2_1_22_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1007\/978-3-540-24638-1_4","volume-title":"Theory of Cryptography---TCC'04","author":"Hofheinz D.","year":"2004","unstructured":"D. Hofheinz and J. M\u00fcller-Quade . Universally Composable Commitments Using Random Oracles . In Theory of Cryptography---TCC'04 , volume 2951 of LNCS , pages 58 -- 76 . Springer , 2004 . D. Hofheinz and J. M\u00fcller-Quade. Universally Composable Commitments Using Random Oracles. In Theory of Cryptography---TCC'04, volume 2951 of LNCS, pages 58--76. Springer, 2004."},{"key":"e_1_3_2_1_23_1","series-title":"LNCS","first-page":"61","volume-title":"Computer Security - ESORICS'03","author":"Hofheinz D.","year":"2003","unstructured":"D. Hofheinz , J. M\u00fcller-Quade , and R. Steinwandt . Initiator-Resilient Universally Composable Key Exchange . In Computer Security - ESORICS'03 , volume 2808 of LNCS , pages 61 -- 84 . Springer , 2003 . D. Hofheinz, J. M\u00fcller-Quade, and R. Steinwandt. Initiator-Resilient Universally Composable Key Exchange. In Computer Security - ESORICS'03, volume 2808 of LNCS, pages 61--84. Springer, 2003."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102146"},{"key":"e_1_3_2_1_25_1","series-title":"LNCS","first-page":"110","volume-title":"Advances in Cryptology--CRYPTO'03","author":"Katz J.","year":"2003","unstructured":"J. Katz and M. Yung . Scalable Protocols for Authenticated Group Key Exchange . In Advances in Cryptology--CRYPTO'03 , volume 2729 of LNCS , pages 110 -- 125 . Springer , 2003 . J. Katz and M. Yung. Scalable Protocols for Authenticated Group Key Exchange. In Advances in Cryptology--CRYPTO'03, volume 2729 of LNCS, pages 110--125. Springer, 2003."},{"key":"e_1_3_2_1_26_1","series-title":"LNCS","first-page":"245","volume-title":"Advances in Cryptology--ASIACRYPT'04","author":"Kim H.-J.","year":"2004","unstructured":"H.-J. Kim , S.-M. Lee , and D. H. Lee . Constant-Round Authenticated Group Key Exchange for Dynamic Groups . In Advances in Cryptology--ASIACRYPT'04 , volume 3329 of LNCS , pages 245 -- 259 . Springer , 2004 . H.-J. Kim, S.-M. Lee, and D. H. Lee. Constant-Round Authenticated Group Key Exchange for Dynamic Groups. In Advances in Cryptology--ASIACRYPT'04, volume 3329 of LNCS, pages 245--259. Springer, 2004."},{"key":"e_1_3_2_1_27_1","series-title":"IT Security","volume-title":"Provably Secure Group Key Exchange","author":"Manulis M.","year":"2007","unstructured":"M. Manulis . Provably Secure Group Key Exchange , volume 5 of IT Security . Europ\u00e4ischer Universit\u00e4tsverlag , Berlin, Bochum , D\u00fclmen, London, Paris, August 2007 . M. Manulis. Provably Secure Group Key Exchange, volume 5 of IT Security. Europ\u00e4ischer Universit\u00e4tsverlag, Berlin, Bochum, D\u00fclmen, London, Paris, August 2007."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1049\/el:19980686"},{"key":"e_1_3_2_1_29_1","volume-title":"Key Control in Multi-party Key Agreement Protocols. In Workshop on Coding, Cryptography and Combinatorics (CCC 2003","volume":"23","author":"Pieprzyk J.","year":"2003","unstructured":"J. Pieprzyk and H. Wang . Key Control in Multi-party Key Agreement Protocols. In Workshop on Coding, Cryptography and Combinatorics (CCC 2003 ), volume 23 of Progress in Computer Science and Applied Logic (PCS), pages 277--288 , 2003 . J. Pieprzyk and H. Wang. Key Control in Multi-party Key Agreement Protocols. In Workshop on Coding, Cryptography and Combinatorics (CCC 2003), volume 23 of Progress in Computer Science and Applied Logic (PCS), pages 277--288, 2003."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-7643-7394-6_4"}],"event":{"name":"Asia CCS 09: Asia CCS 2009 ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Sydney Australia","acronym":"Asia CCS 09"},"container-title":["Proceedings of the 4th International Symposium on Information, Computer, and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1533057.1533079","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1533057.1533079","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:44Z","timestamp":1750253384000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1533057.1533079"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3,10]]},"references-count":28,"alternative-id":["10.1145\/1533057.1533079","10.1145\/1533057"],"URL":"https:\/\/doi.org\/10.1145\/1533057.1533079","relation":{},"subject":[],"published":{"date-parts":[[2009,3,10]]},"assertion":[{"value":"2009-03-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}