{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T06:13:54Z","timestamp":1768284834195,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978350","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"1464-1479","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Identity-Concealed Authenticated Encryption and Key Exchange"],"prefix":"10.1145","author":[{"given":"Yunlei","family":"Zhao","sequence":"first","affiliation":[{"name":"Software School, Fudan University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"On the Security of Joint Signature and Encryption. EUROCRYPT 2002:  83--107","author":"An J.","unstructured":"J. An , Y. Dodis , and T. Rabin . On the Security of Joint Signature and Encryption. EUROCRYPT 2002: 83--107 . J. An, Y. Dodis, and T. Rabin. On the Security of Joint Signature and Encryption. EUROCRYPT 2002: 83--107."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-0211-0"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180453"},{"key":"e_1_3_2_1_4_1","volume-title":"Bellare and P. Rogaway. Entity Authentication and Key Distribution. CRYPTO 1993:  273--289","unstructured":". Bellare and P. Rogaway. Entity Authentication and Key Distribution. CRYPTO 1993: 273--289 . . Bellare and P. Rogaway. Entity Authentication and Key Distribution. CRYPTO 1993: 273--289."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046716"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516748"},{"key":"e_1_3_2_1_7_1","volume-title":"Canetti.Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information. CRYPTO 1997:  455--469","author":"R.","unstructured":"R. Canetti.Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information. CRYPTO 1997: 455--469 . R. Canetti.Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information. CRYPTO 1997: 455--469."},{"key":"e_1_3_2_1_8_1","volume-title":"EUROCRYPT 2001:  453--474","author":"Canetti R.","unstructured":"R. Canetti and H. Krawczyk . Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels . EUROCRYPT 2001: 453--474 . R. Canetti and H. Krawczyk.Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. EUROCRYPT 2001: 453--474."},{"key":"e_1_3_2_1_9_1","volume-title":"CRYPTO 2002:  143--161","author":"Canetti R.","unstructured":"R. Canetti and H. Krawczyk . Security Analysis of IKE's Signature-Based Key-Exchange Protocol . CRYPTO 2002: 143--161 . R. Canetti and H. Krawczyk.Security Analysis of IKE's Signature-Based Key-Exchange Protocol. CRYPTO 2002: 143--161."},{"key":"e_1_3_2_1_10_1","unstructured":"A.W. Dent. Hybrid Cryptography. Cryptology ePrint Archive Report No. 2004\/210.  A.W. Dent. Hybrid Cryptography. Cryptology ePrint Archive Report No. 2004\/210."},{"key":"e_1_3_2_1_11_1","volume-title":"EUROCRYPT 2003:  312--329","author":"An Dodis","unstructured":". Dodis and J.H. An . Concealment and Its Applications to Authenticated Encryption . EUROCRYPT 2003: 312--329 . . Dodis and J.H. An. Concealment and Its Applications to Authenticated Encryption. EUROCRYPT 2003: 312--329."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813653"},{"key":"e_1_3_2_1_13_1","volume-title":"Draft-12","author":"Rescorla E.","year":"2016","unstructured":"E. Rescorla . The Transport Layer Security (TLS) Protocol Version 1.3 , Draft-12 , 2016 .https:\/\/tools.ietf.org\/html\/draft-ietf-tls-tls13--12 E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.3, Draft-12, 2016.https:\/\/tools.ietf.org\/html\/draft-ietf-tls-tls13--12"},{"key":"e_1_3_2_1_14_1","volume-title":"ACISP 2011:  371--388","author":"Fan J.","unstructured":"J. Fan , Y. Zheng , and X. Tang . A Single Key Pair is Adequate for the Zheng Signcryption . ACISP 2011: 371--388 . J. Fan, Y. Zheng, and X. Tang. A Single Key Pair is Adequate for the Zheng Signcryption. ACISP 2011: 371--388."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660308"},{"key":"e_1_3_2_1_16_1","first-page":"277","article-title":"On the Connection Between Signcryption and One-Pass Key Establishment","volume":"2007","author":"Gorantla M.","unstructured":"M. Gorantla , C. Boyd , J. Gonzalez Nieto . On the Connection Between Signcryption and One-Pass Key Establishment . Cryptography and Coding 2007 : 277 -- 301 . M. Gorantla, C. Boyd, J. Gonzalez Nieto. On the Connection Between Signcryption and One-Pass Key Establishment. Cryptography and Coding 2007: 277--301.","journal-title":"Cryptography and Coding"},{"key":"e_1_3_2_1_17_1","volume-title":"Halevi and H. Krawczyk. One-Pass HMQV andAsymmetric Key-Wrapping. PKC 2011:  317--334","unstructured":". Halevi and H. Krawczyk. One-Pass HMQV andAsymmetric Key-Wrapping. PKC 2011: 317--334 . . Halevi and H. Krawczyk. One-Pass HMQV andAsymmetric Key-Wrapping. PKC 2011: 317--334."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88733-1_14"},{"key":"e_1_3_2_1_19_1","volume-title":"CRYPTO 2003:  400--425","author":"Krawczyk H.","unstructured":"H. Krawczyk .uppercaseSIGMA : The \"Sign-and-Mac\" Approach to Authenticated Diffie-Hellman and Its Use in the IKE-protocols . CRYPTO 2003: 400--425 . H. Krawczyk.uppercaseSIGMA: The \"Sign-and-Mac\" Approach to Authenticated Diffie-Hellman and Its Use in the IKE-protocols. CRYPTO 2003: 400--425."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_33"},{"key":"e_1_3_2_1_21_1","volume-title":"On the Security of the TLS Protocol: A Systematic Analysis. CRYPTO 2013:  429--448","author":"Paterson K.G.","unstructured":". Krawczyk, K.G. Paterson and H. Wee . On the Security of the TLS Protocol: A Systematic Analysis. CRYPTO 2013: 429--448 . . Krawczyk, K.G. Paterson and H. Wee. On the Security of the TLS Protocol: A Systematic Analysis. CRYPTO 2013: 429--448."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Hugo Krawczyk and Hoeteck Wee.The OPTLS Protocol and TLS 1.3. EuroS&P 2016: 81--96.  Hugo Krawczyk and Hoeteck Wee.The OPTLS Protocol and TLS 1.3. EuroS&P 2016: 81--96.","DOI":"10.1109\/EuroSP.2016.18"},{"key":"e_1_3_2_1_23_1","volume-title":"PKC 2004:  187--200","author":"Libert B.","unstructured":"B. Libert and J.-J. Quisquater . Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups . PKC 2004: 187--200 . B. Libert and J.-J. Quisquater. Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups. PKC 2004: 187--200."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.21"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/11586821_1"},{"key":"e_1_3_2_1_26_1","volume-title":"EUROCRYPT 1998:  72--84","author":"Maurer U.","unstructured":"U. Maurer and S. Wolf . Lower Bounds on Generic Algorithms in Groups . EUROCRYPT 1998: 72--84 . U. Maurer and S. Wolf.Lower Bounds on Generic Algorithms in Groups. EUROCRYPT 1998: 72--84."},{"key":"e_1_3_2_1_27_1","volume-title":"Some New Key Agreement Protocols Providing Mutual Implicit Authentication. SAC 1995:  70--88","author":"Menezes A.","unstructured":"A. Menezes , M. Qu , and S. Vanstone . Some New Key Agreement Protocols Providing Mutual Implicit Authentication. SAC 1995: 70--88 . A. Menezes, M. Qu, and S. Vanstone. Some New Key Agreement Protocols Providing Mutual Implicit Authentication. SAC 1995: 70--88."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25385-0_20"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586125"},{"key":"e_1_3_2_1_30_1","volume-title":"Multiplexed Stream Transport over UDP","author":"Roskind J.","year":"2012","unstructured":"J. Roskind . Quick UDP Internet Connections : Multiplexed Stream Transport over UDP . 2012 . J. Roskind. Quick UDP Internet Connections: Multiplexed Stream Transport over UDP. 2012."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(00)00173-3"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/322217.322225"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2006.01.015"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/11556992_16"},{"key":"e_1_3_2_1_35_1","volume-title":"Shoup. Lower Bounds for Discrete Logarithms and Related Problems. EUROCRYPT 1997:  256--266","unstructured":". Shoup. Lower Bounds for Discrete Logarithms and Related Problems. EUROCRYPT 1997: 256--266 . . Shoup. Lower Bounds for Discrete Logarithms and Related Problems. EUROCRYPT 1997: 256--266."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516695"},{"key":"e_1_3_2_1_37_1","volume-title":"CRYPTO 1997:  165--179","unstructured":". Zheng. Digital signcryption or how to achieve cost(Signature & encryption) \u0142l cost(Signature)+cost(Encryption) . CRYPTO 1997: 165--179 . . Zheng. Digital signcryption or how to achieve cost(Signature & encryption) \u0142l cost(Signature)+cost(Encryption). CRYPTO 1997: 165--179."}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978350","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978350","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:40:14Z","timestamp":1750218014000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978350"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":37,"alternative-id":["10.1145\/2976749.2978350","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978350","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}