{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T02:54:55Z","timestamp":1768704895532,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["61772383, U1836202, 62172303, 62076187"],"award-info":[{"award-number":["61772383, U1836202, 62172303, 62076187"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484746","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"2618-2631","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Biometrics-Authenticated Key Exchange for Secure Messaging"],"prefix":"10.1145","author":[{"given":"Mei","family":"Wang","sequence":"first","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Kun","family":"He","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Jing","family":"Chen","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Zengpeng","family":"Li","sequence":"additional","affiliation":[{"name":"Shandong University, Qingdao, China"}]},{"given":"Wei","family":"Zhao","sequence":"additional","affiliation":[{"name":"Science and Technology on Communication Security Laboratory, Chengdu, China"}]},{"given":"Ruiying","family":"Du","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Proc. of FOCS. IEEE Computer Society.","author":"Aggarwal Divesh","year":"2015","unstructured":"Divesh Aggarwal, Daniel Dadush, and Noah Stephens-Davidowitz. 2015. Solving the Closest Vector Problem in 2n Time - The Discrete Gaussian Strikes Again!. In Proc. of FOCS. IEEE Computer Society."},{"key":"e_1_3_2_2_2_1","volume-title":"Proc. of USENIX Security Symposium. USENIX Association.","author":"Ahmed Muhammad Ejaz","year":"2020","unstructured":"Muhammad Ejaz Ahmed, Il-Youp Kwak, Jun Ho Huh, Iljoo Kim, Taekkyung Oh, and Hyoungshick Kim. 2020. Void: A Fast and Light Voice Liveness Detection System. In Proc. of USENIX Security Symposium. USENIX Association."},{"key":"e_1_3_2_2_3_1","first-page":"1","article-title":"On Lov\u00e1sz","volume":"6","author":"Babai L\u00e1szl\u00f3","year":"1986","unstructured":"L\u00e1szl\u00f3 Babai. 1986. On Lov\u00e1sz' Lattice Reduction and the Nearest Lattice Point Problem. Comb., Vol. 6, 1 (1986), 1--13.","journal-title":"Lattice Reduction and the Nearest Lattice Point Problem. Comb."},{"key":"e_1_3_2_2_4_1","volume-title":"Nascimento","author":"Barreto Paulo S. L. M.","year":"2017","unstructured":"Paulo S. L. M. Barreto, Bernardo David, Rafael Dowsley, Kirill Morozov, and Anderson C. A. Nascimento. 2017. A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM. IACR Cryptol. ePrint Arch. (2017). http:\/\/eprint.iacr.org\/2017\/993."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01446-9_21"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/276698.276854"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_11"},{"key":"e_1_3_2_2_8_1","volume-title":"Anderson","author":"Bond Mike","year":"2014","unstructured":"Mike Bond, Omar Choudary, Steven J. Murdoch, Sergei P. Skorobogatov, and Ross J. Anderson. 2014. Chip and Skim: Cloning EMV Cards with the Pre-play Attack. In Proc. of S & P. IEEE Computer Society."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030096"},{"key":"e_1_3_2_2_10_1","volume-title":"Smith","author":"Boyen Xavier","year":"2005","unstructured":"Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafail Ostrovsky, and Adam D. Smith. 2005. Secure Remote Authentication Using Biometric Data. Proc. of EUROCRYPT. Springer."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-020-09367-8"},{"key":"e_1_3_2_2_12_1","volume-title":"Proc. of CCS. ACM.","author":"Chase Melissa","year":"2019","unstructured":"Melissa Chase, Apoorvaa Deshpande, Esha Ghosh, and Harjasleen Malvai. 2019. SEEMless: Secure End-to-End Encrypted Messaging with lesstextless\/textgreater Trust. In Proc. of CCS. ACM."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-020-09360-1"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243747"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423354"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.244676"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2500196"},{"key":"e_1_3_2_2_18_1","volume-title":"Smith","author":"Dodis Yevgeniy","year":"2004","unstructured":"Yevgeniy Dodis, Leonid Reyzin, and Adam D. Smith. 2004. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In Proc. of EUROCRYPT. Springer."},{"key":"e_1_3_2_2_19_1","volume-title":"Proc","author":"Dupont Pierre-Alain","unstructured":"Pierre-Alain Dupont, Julia Hesse, David Pointcheval, Leonid Reyzin, and Sophia Yakoubov. 2018. Fuzzy Password-Authenticated Key Exchange. In Proc. of EUROCRYPT. Springer."},{"key":"e_1_3_2_2_20_1","volume-title":"Vincent Lenders, and Ivan Martinovic.","author":"Eberz Simon","year":"2015","unstructured":"Simon Eberz, Kasper Bonne Rasmussen, Vincent Lenders, and Ivan Martinovic. 2015. Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics. In Proc. of NDSS. The Internet Society."},{"key":"e_1_3_2_2_21_1","volume-title":"Proc","author":"Erwig Andreas","unstructured":"Andreas Erwig, Julia Hesse, Maximilian Orlt, and Siavash Riahi. 2020. Fuzzy Asymmetric Password-Authenticated Key Exchange. In Proc. of ASIACRYPT. Springer."},{"key":"e_1_3_2_2_22_1","volume-title":"Technical Whitepaper. https:\/\/about.fb.com\/wp-content\/uploads\/2016\/07\/messenger-secret-conversations-technical-whitepaper.pdf.","year":"2017","unstructured":"Facebook. 2017. Messenger Secret Conversatinos, Technical Whitepaper. https:\/\/about.fb.com\/wp-content\/uploads\/2016\/07\/messenger-secret-conversations-technical-whitepaper.pdf. (2017)."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1987.4"},{"key":"e_1_3_2_2_24_1","volume-title":"Proc","author":"Fuller Benjamin","unstructured":"Benjamin Fuller, Xianrui Meng, and Leonid Reyzin. 2013. Computational Fuzzy Extractors. In Proc. of ASIACRYPT. Springer."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351239"},{"key":"e_1_3_2_2_26_1","volume-title":"Proc","author":"Gilbert Henri","unstructured":"Henri Gilbert, Matthew J. B. Robshaw, and Yannick Seurin. 2008. HB(^# ): Increasing the Security and Efficiency of HB(+). In Proc. of EUROCRYPT. Springer."},{"key":"e_1_3_2_2_27_1","unstructured":"Wire Swiss GmbH. 2018. Wire Security Whitepaper. https:\/\/wire-docs.wire.com\/download\/Wire+Security+Whitepaper.pdf. (2018)."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPEC51340.2021.9421103"},{"key":"e_1_3_2_2_29_1","volume-title":"Silverman","author":"Hoffstein Jeffrey","year":"2008","unstructured":"Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman. 2008. An Introduction to Mathematical Cryptography .Springer."},{"key":"e_1_3_2_2_30_1","volume-title":"Hopper and Manuel Blum","author":"Nicholas","year":"2001","unstructured":"Nicholas J. Hopper and Manuel Blum. 2001. Secure Human Identification Protocols. In Proc. of ASIACRYPT. Springer."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.1999.784628"},{"key":"e_1_3_2_2_32_1","volume-title":"OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks. In Proc","author":"Jarecki Stanislaw","year":"2018","unstructured":"Stanislaw Jarecki, Hugo Krawczyk, and Jiayu Xu. 2018. OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks. In Proc. of EUROCRYPT. Springer."},{"key":"e_1_3_2_2_33_1","volume-title":"Weis","author":"Juels Ari","year":"2005","unstructured":"Ari Juels and Stephen A. Weis. 2005. Authenticating Pervasive Devices with Human Protocols. In Proc. of CRYPTO. Springer."},{"key":"e_1_3_2_2_34_1","volume-title":"Proc","author":"Liu Xiangyu","unstructured":"Xiangyu Liu, Shengli Liu, Dawu Gu, and Jian Weng. 2020. Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security. In Proc. of ASIACRYPT. Springer."},{"key":"e_1_3_2_2_35_1","volume-title":"Handbook of Fingerprint Recognition","author":"Maltoni Davide","unstructured":"Davide Maltoni, Dario Maio, Anil K. Jain, and Salil Prabhakar. 2009. Handbook of Fingerprint Recognition, Second Edition. Springer."},{"key":"e_1_3_2_2_36_1","volume-title":"Fingerprint Verification Competition","author":"Biometric System Lab-University of Bologna. 2004.","year":"2004","unstructured":"Biometric System Lab-University of Bologna. 2004. Fingerprint Verification Competition 2004. http:\/\/bias.csr.unibo.it\/fvc2004\/. (2004)."},{"key":"e_1_3_2_2_37_1","volume-title":"Proc","author":"Pasini Sylvain","unstructured":"Sylvain Pasini and Serge Vaudenay. 2006. SAS-Based Authenticated Key Agreement. In Proc. of PKC. Springer."},{"key":"e_1_3_2_2_38_1","volume-title":"Proc","author":"Pointcheval David","unstructured":"David Pointcheval and S\u00e9 bastien Zimmer. 2008. Multi-factor Authenticated Key Exchange. In Proc. of ACNS. Springer."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2018.07.008"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386901.3388939"},{"key":"e_1_3_2_2_41_1","volume-title":"Seamons","author":"Reese Ken","year":"2019","unstructured":"Ken Reese, Trevor Smith, Jonathan Dutson, Jonathan Armknecht, Jacob Cameron, and Kent E. Seamons. 2019. A Usability Study of Five Two-Factor Authentication Methods. In Proc. of SOUPS. USENIX Association."},{"key":"e_1_3_2_2_42_1","volume-title":"Statistical, Optimal. In Proc","author":"Rotem Lior","unstructured":"Lior Rotem and Gil Segev. 2018. Out-of-Band Authentication in Group Messaging: Computational, Statistical, Optimal. In Proc. of CRYPTO. Springer."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417878"},{"key":"e_1_3_2_2_44_1","unstructured":"Signal. 2021. Signal Technical Information. https:\/\/signal.org\/docs\/. (2021)."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24203"},{"key":"e_1_3_2_2_46_1","volume-title":"Most popular global mobile messenger apps as of","year":"2021","unstructured":"Statista. 2021. Most popular global mobile messenger apps as of January 2021, based on number of monthly active users. https:\/\/www.statista.com\/statistics\/258749\/most-popular-global-mobile-messenger-apps\/. (2021)."},{"key":"e_1_3_2_2_47_1","volume-title":"Proc","author":"Tyagi Nirvan","unstructured":"Nirvan Tyagi, Paul Grubbs, Julia Len, Ian Miers, and Thomas Ristenpart. 2019. Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption. In Proc. of CRYPTO. Springer."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.22"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00031"},{"key":"e_1_3_2_2_50_1","volume-title":"Proc","author":"Vaudenay Serge","unstructured":"Serge Vaudenay. 2005. Secure Communications over Insecure Channels Based on Short Authenticated Strings. In Proc. of CRYPTO. Springer."},{"key":"e_1_3_2_2_51_1","unstructured":"WhatsApp. 2016. WhatsApp Encryption Overview. https: \/\/www.whatsapp.com\/security\/WhatsApp- Security- Whitepaper.pdf. (2016)."},{"key":"e_1_3_2_2_52_1","unstructured":"Wikipedia. 2021. Public Key Infrasstructure. https:\/\/en.wikipedia.org\/wiki\/Public_key_infrastructure. (2021)."},{"key":"e_1_3_2_2_53_1","volume-title":"Proc. of USENIX Security Symposium. USENIX Association.","author":"Wu Cong","year":"2020","unstructured":"Cong Wu, Kun He, Jing Chen, Ziming Zhao, and Ruiying Du. 2020. Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks. In Proc. of USENIX Security Symposium. USENIX Association."},{"key":"e_1_3_2_2_54_1","volume-title":"Man Ho Au, and Song Tian","author":"Xu Xiu","year":"2019","unstructured":"Xiu Xu, Haiyang Xue, Kunpeng Wang, Man Ho Au, and Song Tian. 2019. Strongly Secure Authenticated Key Exchange from Supersingular Isogenies. In Proc. of ASIACRYPT. Springer."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354248"},{"key":"e_1_3_2_2_56_1","volume-title":"Proc","author":"Zhang Jiang","unstructured":"Jiang Zhang, Zhenfeng Zhang, Jintai Ding, Michael Snook, and \u00d6zg\u00fcr Dagdelen. 2015. Authenticated Key Exchange from Ideal Lattices. In Proc. of EUROCRYPT. Springer."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241575"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2838540"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484746","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484746","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:49:38Z","timestamp":1763498978000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484746"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":58,"alternative-id":["10.1145\/3460120.3484746","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484746","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}