{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T20:55:45Z","timestamp":1767992145028,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134006","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"1343-1360","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["No-Match Attacks and Robust Partnering Definitions"],"prefix":"10.1145","author":[{"given":"Yong","family":"Li","sequence":"first","affiliation":[{"name":"Huawei Technologies D\u00fcsseldorf, D\u00fcsseldorf, Germany"}]},{"given":"Sven","family":"Sch\u00e4ge","sequence":"additional","affiliation":[{"name":"Ruhr-Universit\u00e4t Bochum, Bochum, Germany"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08344-5_17"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590317"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-013-9167-4"},{"key":"e_1_3_2_1_5_1","volume-title":"Bart Preneel (Ed.)","author":"Bellare Mihir","unstructured":"Mihir Bellare, David Pointcheval, and Phillip Rogaway. 2000. Authenticated Key Exchange Secure against Dictionary Attacks EUROCRYPT 2000 (LNCS), Bart Preneel (Ed.), Vol. Vol. 1807. Springer, Heidelberg, 139--155."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48329-2_21"},{"key":"e_1_3_2_1_7_1","volume-title":"Provably Secure Session Key Distribution: The Three Party Case 27th ACM STOC","author":"Bellare Mihir","unstructured":"Mihir Bellare and Phillip Rogaway 1995. Provably Secure Session Key Distribution: The Three Party Case 27th ACM STOC. ACM Press, 57--66."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1992.213269"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46447-2_21"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45760-7_9"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_23"},{"key":"e_1_3_2_1_12_1","volume-title":"Provably Authenticated Group Diffie-Hellman Key Exchange ACM CCS 01","author":"Bresson Emmanuel","unstructured":"Emmanuel Bresson, Olivier Chevassut, David Pointcheval, and Jean-Jacques Quisquater 2001. Provably Authenticated Group Diffie-Hellman Key Exchange ACM CCS 01. ACM Press, 255--264."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75651-4_20"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-013-0192-y"},{"key":"e_1_3_2_1_15_1","volume-title":"Williams","author":"Brzuska Christina","year":"2011","unstructured":"Christina Brzuska, Marc Fischlin, Bogdan Warinschi, and Stephen C. Williams 2011. Composability of Bellare-Rogaway key exchange protocols ACM CCS 11, Yan Chen, George Danezis, and Vitaly Shmatikov (Eds.). ACM Press, 51--62."},{"key":"e_1_3_2_1_16_1","volume-title":"Watson","author":"Brzuska Christina","year":"2013","unstructured":"Christina Brzuska, Nigel P. Smart, Bogdan Warinschi, and Gaven J. Watson 2013. An analysis of the EMV channel establishment protocol ACM CCS 13, Ahmad-Reza Sadeghi, Virgil D. Gligor, and Moti Yung (Eds.). ACM Press, 373--386."},{"key":"e_1_3_2_1_17_1","volume-title":"Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels EUROCRYPT 2001 (LNCS), Birgit Pfitzmann (Ed.)","volume":"2045","author":"Canetti Ran","year":"2001","unstructured":"Ran Canetti and Hugo Krawczyk 2001. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels EUROCRYPT 2001 (LNCS), Birgit Pfitzmann (Ed.), Vol. Vol. 2045. Springer, Heidelberg, 453--474."},{"key":"e_1_3_2_1_18_1","volume-title":"Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols. ACISP 05 (LNCS), Colin Boyd and Juan Manuel Gonz\u00e1lez Nieto (Eds.)","author":"Raymond Choo Kim-Kwang","unstructured":"Kim-Kwang Raymond Choo and Yvonne Hitchcock 2005. Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols. ACISP 05 (LNCS), Colin Boyd and Juan Manuel Gonz\u00e1lez Nieto (Eds.), Vol. Vol. 3574. Springer, Heidelberg, 429--442."},{"key":"e_1_3_2_1_19_1","volume-title":"CK-HMQV, and eCK. ASIACCS 11, Bruce S","author":"Cremers Cas","unstructured":"Cas Cremers. 2011. Examining indistinguish ability-based security models for key exchange protocols: the case of CK, CK-HMQV, and eCK. ASIACCS 11, Bruce S. N. Cheung, Lucas Chi Kwong Hui, Ravi S. Sandhu, and Duncan S. Wong (Eds.). ACM Press, 80--91."},{"key":"e_1_3_2_1_20_1","volume-title":"Cremers and Michele Feltz","author":"Cas J.","year":"2012","unstructured":"Cas J. F. Cremers and Michele Feltz 2012. Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal ESORICS 2012 (LNCS), Sara Foresti, Moti Yung, and Fabio Martinelli (Eds.), Vol. Vol. 7459. Springer, Heidelberg, 734--751."},{"key":"e_1_3_2_1_21_1","volume-title":"Revisited. In EUROCRYPT 2012 (LNCS), David Pointcheval and Thomas Johansson (Eds.)","volume":"7237","author":"Dodis Yevgeniy","year":"2012","unstructured":"Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, and Daniel Wichs 2012. Message Authentication, Revisited. In EUROCRYPT 2012 (LNCS), David Pointcheval and Thomas Johansson (Eds.), Vol. Vol. 7237. Springer, Heidelberg, 355--374."},{"key":"e_1_3_2_1_22_1","volume-title":"Dong Hoon Lee and Xiaoyun Wang (Eds.)","author":"Dziembowski Stefan","unstructured":"Stefan Dziembowski and Sebastian Faust 2011. Leakage-Resilient Cryptography from the Inner-Product Extractor ASIACRYPT 2011 (LNCS), Dong Hoon Lee and Xiaoyun Wang (Eds.), Vol. Vol. 7073. Springer, Heidelberg, 702--721."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28914-9_36"},{"key":"e_1_3_2_1_24_1","volume-title":"Gail-Joon Ahn","author":"Fischlin Marc","unstructured":"Marc Fischlin and Felix G\u00fcnther 2014. Multi-Stage Key Exchange and the Case of Google's QUIC Protocol ACM CCS 14, Gail-Joon Ahn, Moti Yung, and Ninghui Li (Eds.). ACM Press, 1193--1204."},{"key":"e_1_3_2_1_25_1","volume-title":"The Foundations of Cryptography -","author":"Goldreich Oded","unstructured":"Oded Goldreich. 2001. The Foundations of Cryptography - Volume 1, Basic Techniques. Cambridge University Press."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"e_1_3_2_1_27_1","volume-title":"Rivest","author":"Goldwasser Shafi","year":"1984","unstructured":"Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest. 1984. A \"Paradoxical\" Solution to the Signature Problem (Abstract) (Impromptu Talk) CRYPTO'84 (LNCS), G. R. Blakley and David Chaum (Eds.), Vol. Vol. 196. Springer, Heidelberg, 467."},{"key":"e_1_3_2_1_28_1","volume-title":"CRYPTO'92 (LNCS), Ernest F","author":"Goldwasser Shafi","unstructured":"Shafi Goldwasser and Rafail Ostrovsky 1993. Invariant Signatures and Non-Interactive Zero-Knowledge Proofs are Equivalent (Extended Abstract). In CRYPTO'92 (LNCS), Ernest F. Brickell (Ed.), Vol. Vol. 740. Springer, Heidelberg, 228--245."},{"key":"e_1_3_2_1_29_1","volume-title":"On the Security of TLS-DHE in the Standard Model CRYPTO 2012 (LNCS), Reihaneh Safavi-Naini and Ran Canetti (Eds.)","volume":"7417","author":"Jager Tibor","year":"2012","unstructured":"Tibor Jager, Florian Kohlar, Sven Sch\"age, and J\u00f6rg Schwenk 2012. On the Security of TLS-DHE in the Standard Model CRYPTO 2012 (LNCS), Reihaneh Safavi-Naini and Ran Canetti (Eds.), Vol. Vol. 7417. Springer, Heidelberg, 273--293."},{"key":"e_1_3_2_1_30_1","volume-title":"Markus Jakobsson","author":"Jeong Ik Rae","unstructured":"Ik Rae Jeong, Jonathan Katz, and Dong Hoon Lee. 2004. One-Round Protocols for Two-Party Authenticated Key Exchange ACNS 04 (LNCS), Markus Jakobsson, Moti Yung, and Jianying Zhou (Eds.), Vol. Vol. 3089. Springer, Heidelberg, 220--232."},{"key":"e_1_3_2_1_31_1","volume-title":"Jeong Ok Kwon, and Dong Hoon Lee","author":"Jeong Ik Rae","year":"2006","unstructured":"Ik Rae Jeong, Jeong Ok Kwon, and Dong Hoon Lee. 2006. A Diffie-Hellman Key Exchange Protocol Without Random Oracles CANS 06 (LNCS), David Pointcheval, Yi Mu, and Kefei Chen (Eds.), Vol. Vol. 4301. Springer, Heidelberg, 37--54."},{"key":"e_1_3_2_1_32_1","volume-title":"Introduction to Modern Cryptography","author":"Katz Jonathan","unstructured":"Jonathan Katz and Yehuda Lindell 2007. Introduction to Modern Cryptography. Chapman and Hall\/CRC Press."},{"key":"e_1_3_2_1_33_1","volume-title":"ASIACCS 09, Wanqing Li, Willy Susilo, Udaya Kiran Tupakula, Reihaneh Safavi-Naini","author":"Kobara Kazukuni","unstructured":"Kazukuni Kobara, SeongHan Shin, and Mario Strefler. 2009. Partnership in key exchange protocols. In ASIACCS 09, Wanqing Li, Willy Susilo, Udaya Kiran Tupakula, Reihaneh Safavi-Naini, and Vijay Varadharajan (Eds.). ACM Press, 161--170."},{"key":"e_1_3_2_1_35_1","volume-title":"HMQV: A High-Performance Secure Diffie-Hellman Protocol CRYPTO 2005 (LNCS), Victor Shoup (Ed.)","volume":"3621","author":"Krawczyk Hugo","year":"2005","unstructured":"Hugo Krawczyk. 2005. HMQV: A High-Performance Secure Diffie-Hellman Protocol CRYPTO 2005 (LNCS), Victor Shoup (Ed.), Vol. Vol. 3621. Springer, Heidelberg, 546--566."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_24"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75670-5_1"},{"key":"e_1_3_2_1_38_1","volume-title":"Security Analysis of KEA Authenticated Key Exchange Protocol PKC 2006 (LNCS), Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, and Tal Malkin (Eds.)","volume":"3958","author":"Lauter Kristin","year":"2006","unstructured":"Kristin Lauter and Anton Mityagin 2006. Security Analysis of KEA Authenticated Key Exchange Protocol PKC 2006 (LNCS), Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, and Tal Malkin (Eds.), Vol. Vol. 3958. Springer, Heidelberg, 378--394."},{"key":"e_1_3_2_1_39_1","volume-title":"Juan A. Garay and Roberto De Prisco (Eds.)","author":"Sarr Augustin P.","unstructured":"Augustin P. Sarr, Philippe Elbaz-Vincent, and Jean-Claude Bajard. 2010. A New Security Model for Authenticated Key Agreement SCN 10 (LNCS), Juan A. Garay and Roberto De Prisco (Eds.), Vol. Vol. 6280. Springer, Heidelberg, 219--234."},{"key":"e_1_3_2_1_40_1","volume-title":"Florian Kohlar and J\u00f6rg Schwenk","author":"Tibor Jager Sven Sch\u00e4ge","year":"2011","unstructured":"Sven Sch\u00e4ge Tibor Jager, Florian Kohlar and J\u00f6rg Schwenk 2011. On the Security of TLS-DHE in the Standard Model. Cryptology ePrint Archive, Report 2011\/219. (2011). http:\/\/eprint.iacr.org\/2011\/219.y"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134006","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134006","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:26Z","timestamp":1750212806000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134006"}},"subtitle":["Defining Trivial Attacks for Security Protocols is Not Trivial"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":38,"alternative-id":["10.1145\/3133956.3134006","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134006","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}