{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T21:30:39Z","timestamp":1769808639443,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["390781972"],"award-info":[{"award-number":["390781972"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["16KIS0901K"],"award-info":[{"award-number":["16KIS0901K"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["101054911"],"award-info":[{"award-number":["101054911"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3560632","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"69-82","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Server-Aided Continuous Group Key Agreement"],"prefix":"10.1145","author":[{"given":"Jo\u00ebl","family":"Alwen","sequence":"first","affiliation":[{"name":"AWS-Wickr, New York, NY, USA"}]},{"given":"Dominik","family":"Hartmann","sequence":"additional","affiliation":[{"name":"Ruhr-University Bochum, Bochum, Germany"}]},{"given":"Eike","family":"Kiltz","sequence":"additional","affiliation":[{"name":"Ruhr-University Bochum, Bochum, Germany"}]},{"given":"Marta","family":"Mularczyk","sequence":"additional","affiliation":[{"name":"AWS-Wickr, New York, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Miguel Cueto Noval, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, and Michael Walter.","author":"Alwen Jo\u00ebl","year":"2021","unstructured":"Jo\u00ebl Alwen , Benedikt Auerbach , Mirza Ahad Baig , Miguel Cueto Noval, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, and Michael Walter. 2021 a. Grafting Key Trees: Efficient Key Management for Overlapping Groups . In Theory of Cryptography -- TCC 2021. Full version: https:\/\/ia.cr\/2021\/1158. Jo\u00ebl Alwen, Benedikt Auerbach, Mirza Ahad Baig, Miguel Cueto Noval, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, and Michael Walter. 2021a. Grafting Key Trees: Efficient Key Management for Overlapping Groups. In Theory of Cryptography -- TCC 2021. Full version: https:\/\/ia.cr\/2021\/1158."},{"key":"e_1_3_2_1_2_1","volume-title":"Zagreb","author":"Alwen Jo\u00ebl","year":"2021","unstructured":"Jo\u00ebl Alwen , Bruno Blanchet , Eduard Hauck , Eike Kiltz , Benjamin Lipp , and Doreen Riepel . 2021 b. Analysing the HPKE Standard. In Advances in Cryptology - EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques , Zagreb , Croatia, October 17-21, 2021, Proceedings, Part I. 87--116. https:\/\/doi.org\/10.1007\/978-3-030-77870-5_4 Full Version : https:\/\/ia.cr\/2020\/1499. 10.1007\/978-3-030-77870-5_4 Jo\u00ebl Alwen, Bruno Blanchet, Eduard Hauck, Eike Kiltz, Benjamin Lipp, and Doreen Riepel. 2021b. Analysing the HPKE Standard. In Advances in Cryptology - EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part I. 87--116. https:\/\/doi.org\/10.1007\/978-3-030-77870-5_4 Full Version: https:\/\/ia.cr\/2020\/1499."},{"key":"e_1_3_2_1_3_1","volume-title":"42nd IEEE Symposium on Security and Privacy. (2021","author":"Alwen Jo\u00ebl","year":"2021","unstructured":"Jo\u00ebl Alwen , Margarita Capretto , Miguel Cueto , Chethan Kamath , Karen Klein , Ilia Markov , Guillermo Pascual-Perez , Krzysztof Pietrzak , Michael Walter , and Michelle Yeo . 2021 c. Keep the Dirt: Tainted TreeKEM, an Efficient and Provably Secure Continuous Group Key Agreement Protocol . 42nd IEEE Symposium on Security and Privacy. (2021 ). Full Version : https:\/\/ia.cr\/2019\/1489. Jo\u00ebl Alwen, Margarita Capretto, Miguel Cueto, Chethan Kamath, Karen Klein, Ilia Markov, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter, and Michelle Yeo. 2021c. Keep the Dirt: Tainted TreeKEM, an Efficient and Provably Secure Continuous Group Key Agreement Protocol. 42nd IEEE Symposium on Security and Privacy. (2021). Full Version: https:\/\/ia.cr\/2019\/1489."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17653-2_5"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56784-2_9"},{"key":"e_1_3_2_1_6_1","volume-title":"Modular Design of Secure Group Messaging Protocols and the Security of MLS. In ACM CCS 2021 (to appear). Full version: https:\/\/ia.cr\/2021\/1083","author":"Alwen Jo\u00ebl","year":"2021","unstructured":"Jo\u00ebl Alwen , Sandro Coretti , Yevgeniy Dodis , and Yiannis Tselekounis . 2021 . Modular Design of Secure Group Messaging Protocols and the Security of MLS. In ACM CCS 2021 (to appear). Full version: https:\/\/ia.cr\/2021\/1083 .pdf. Jo\u00ebl Alwen, Sandro Coretti, Yevgeniy Dodis, and Yiannis Tselekounis. 2021. Modular Design of Secure Group Messaging Protocols and the Security of MLS. In ACM CCS 2021 (to appear). Full version: https:\/\/ia.cr\/2021\/1083.pdf."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64378-2_10"},{"key":"e_1_3_2_1_10_1","unstructured":"Richard Barnes. 06 August2018 13:01UTC. Subject: [MLS] Remove without double-join (in TreeKEM). MLS Mailing List. ( 06 August2018 13:01UTC). https:\/\/mailarchive.ietf.org\/arch\/msg\/mls\/Zzw2tqZC1FCbVZA9LKERsMIQXik.  Richard Barnes. 06 August2018 13:01UTC. Subject: [MLS] Remove without double-join (in TreeKEM). MLS Mailing List. ( 06 August2018 13:01UTC). https:\/\/mailarchive.ietf.org\/arch\/msg\/mls\/Zzw2tqZC1FCbVZA9LKERsMIQXik."},{"key":"e_1_3_2_1_11_1","volume-title":"[MLS] Proposal: Proposals (was: Laziness). MLS Mailing List. (","author":"Barnes Richard","year":"2019","unstructured":"Richard Barnes . 22 August 2019 22:17UTC. Subject : [MLS] Proposal: Proposals (was: Laziness). MLS Mailing List. ( 22 August 2019 22:17UTC). https:\/\/mailarchive.ietf.org\/arch\/msg\/mls\/5dmrkULQeyvNu5k3MV_sXreybj0\/. Richard Barnes. 22 August 2019 22:17UTC. Subject: [MLS] Proposal: Proposals (was: Laziness). MLS Mailing List. ( 22 August 2019 22:17UTC). https:\/\/mailarchive.ietf.org\/arch\/msg\/mls\/5dmrkULQeyvNu5k3MV_sXreybj0\/."},{"key":"e_1_3_2_1_12_1","unstructured":"R. Barnes B. Beurdouche J. Millican E. Omara K. Cohn-Gordon and R. Robert. 2020. The Messaging Layer Security (MLS) Protocol (draft-ietf-mls-protocol-latest). Technical Report. IETF. https:\/\/messaginglayersecurity.rocks\/mls-protocol\/draft-ietf-mls-protocol.html.  R. Barnes B. Beurdouche J. Millican E. Omara K. Cohn-Gordon and R. Robert. 2020. The Messaging Layer Security (MLS) Protocol (draft-ietf-mls-protocol-latest). Technical Report. IETF. https:\/\/messaginglayersecurity.rocks\/mls-protocol\/draft-ietf-mls-protocol.html."},{"key":"e_1_3_2_1_13_1","unstructured":"Richard Barnes Jon Millican Emad Omara Katriel Cohn-Gordon and Raphael Robert. 2018. Message Layer Security (mls) WG. https:\/\/datatracker.ietf.org\/wg\/mls\/about\/. (2018).  Richard Barnes Jon Millican Emad Omara Katriel Cohn-Gordon and Raphael Robert. 2018. Message Layer Security (mls) WG. https:\/\/datatracker.ietf.org\/wg\/mls\/about\/. (2018)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.907471"},{"key":"e_1_3_2_1_15_1","volume-title":"Randomness Re-use in Multi-recipient Encryption Schemeas. In PKC 2003 (LNCS ), Yvo Desmedt (Ed.)","volume":"2567","author":"Bellare Mihir","year":"2003","unstructured":"Mihir Bellare , Alexandra Boldyreva , and Jessica Staddon . 2003 . Randomness Re-use in Multi-recipient Encryption Schemeas. In PKC 2003 (LNCS ), Yvo Desmedt (Ed.) , Vol. 2567 . Springer, Heidelberg, 85--99. https:\/\/doi.org\/10.1007\/3-540-36288-6_7 10.1007\/3-540-36288-6_7 Mihir Bellare, Alexandra Boldyreva, and Jessica Staddon. 2003. Randomness Re-use in Multi-recipient Encryption Schemeas. In PKC 2003 (LNCS ), Yvo Desmedt (Ed.), Vol. 2567. Springer, Heidelberg, 85--99. https:\/\/doi.org\/10.1007\/3-540-36288-6_7"},{"key":"e_1_3_2_1_16_1","volume-title":"TreeKEM: Asynchronous Decentralized Key Management for Large Dynamic Groups. (May","author":"Bhargavan Karthikeyan","year":"2018","unstructured":"Karthikeyan Bhargavan , Richard Barnes , and Eric Rescorla . 2018. TreeKEM: Asynchronous Decentralized Key Management for Large Dynamic Groups. (May 2018 ). http:\/\/prosecco.inria.fr\/personal\/karthik\/pubs\/treekem.pdf Published at https:\/\/mailarchive.ietf.org\/arch\/msg\/mls\/e3ZKNzPC7Gxrm3Wf0q96dsLZoD8. Karthikeyan Bhargavan, Richard Barnes, and Eric Rescorla. 2018. TreeKEM: Asynchronous Decentralized Key Management for Large Dynamic Groups. (May 2018). http:\/\/prosecco.inria.fr\/personal\/karthik\/pubs\/treekem.pdf Published at https:\/\/mailarchive.ietf.org\/arch\/msg\/mls\/e3ZKNzPC7Gxrm3Wf0q96dsLZoD8."},{"key":"e_1_3_2_1_17_1","unstructured":"Karthikeyan Bhargavan Benjamin Beurdouche and Prasad Naldurg. 2019. Formal Models and Verified Protocols for Group Messaging: Attacks and Proofs for IETF MLS. Research Report. Inria Paris. https:\/\/hal.inria.fr\/hal-02425229  Karthikeyan Bhargavan Benjamin Beurdouche and Prasad Naldurg. 2019. Formal Models and Verified Protocols for Group Messaging: Attacks and Proofs for IETF MLS. Research Report. Inria Paris. https:\/\/hal.inria.fr\/hal-02425229"},{"key":"e_1_3_2_1_20_1","volume-title":"Relaxing Chosen-Ciphertext Security. In CRYPTO 2003 (LNCS ),, Dan Boneh (Ed.)","volume":"2729","author":"Canetti Ran","year":"2003","unstructured":"Ran Canetti , Hugo Krawczyk , and Jesper Buus Nielsen . 2003 . Relaxing Chosen-Ciphertext Security. In CRYPTO 2003 (LNCS ),, Dan Boneh (Ed.) , Vol. 2729 . Springer, Heidelberg, 565--582. https:\/\/doi.org\/10.1007\/978-3-540-45146-4_33 10.1007\/978-3-540-45146-4_33 Ran Canetti, Hugo Krawczyk, and Jesper Buus Nielsen. 2003. Relaxing Chosen-Ciphertext Security. In CRYPTO 2003 (LNCS ),, Dan Boneh (Ed.), Vol. 2729. Springer, Heidelberg, 565--582. https:\/\/doi.org\/10.1007\/978-3-540-45146-4_33"},{"key":"e_1_3_2_1_21_1","volume-title":"ICICS 18 (LNCS ),","author":"Cheng Haitao","year":"1950","unstructured":"Haitao Cheng , Xiangxue Li , Haifeng Qian , and Di Yan . 2018. CCA Secure Multi-recipient KEM from LPN . In ICICS 18 (LNCS ), , David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang, and Ahmed Meddahi (Eds.), Vol. 11149 . Springer , Heidelberg , 513--529. https:\/\/doi.org\/10.1007\/978-3-030-0 1950 -1_30 10.1007\/978-3-030-01950-1_30 Haitao Cheng, Xiangxue Li, Haifeng Qian, and Di Yan. 2018. CCA Secure Multi-recipient KEM from LPN. In ICICS 18 (LNCS ),, David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang, and Ahmed Meddahi (Eds.), Vol. 11149. Springer, Heidelberg, 513--529. https:\/\/doi.org\/10.1007\/978-3-030-01950-1_30"},{"key":"e_1_3_2_1_22_1","unstructured":"Cisco. 2021. Zero-Trust Security for Webex. (2021). https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/collaboration\/white-paper-c11-744553.pdf.  Cisco. 2021. Zero-Trust Security for Webex. (2021). https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/collaboration\/white-paper-c11-744553.pdf."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243747"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96884-1_6"},{"key":"e_1_3_2_1_25_1","volume-title":"CSCML","author":"Drucker Nir","year":"2019","unstructured":"Nir Drucker and Shay Gueron . 2019. Continuous Key Agreement with Reduced Bandwidth. Cyber Security Cryptography and Machine Learning - Third International Symposium , CSCML 2019 , Beer-Sheva, Israel, June 27-28, 2019, Proceedings (Lecture Notes in Computer Science), Shlomi Dolev, Danny Hendler, Sachin Lodha, and Moti Yung (Eds.), Vol. 11527 . Springer , 33--46. https:\/\/doi.org\/10.1007\/978-3-030-20951-3_3 10.1007\/978-3-030-20951-3_3 Nir Drucker and Shay Gueron. 2019. Continuous Key Agreement with Reduced Bandwidth. Cyber Security Cryptography and Machine Learning - Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27-28, 2019, Proceedings (Lecture Notes in Computer Science), Shlomi Dolev, Danny Hendler, Sachin Lodha, and Moti Yung (Eds.), Vol. 11527. Springer, 33--46. https:\/\/doi.org\/10.1007\/978-3-030-20951-3_3"},{"key":"e_1_3_2_1_26_1","volume-title":"CRYPTO'84 (LNCS )","author":"ElGamal Taher","unstructured":"Taher ElGamal . 1984. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms . In CRYPTO'84 (LNCS ) , G. R. Blakley and David Chaum (Eds.), Vol. 196 . Springer , Heidelberg , 10--18. Taher ElGamal. 1984. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In CRYPTO'84 (LNCS ), G. R. Blakley and David Chaum (Eds.), Vol. 196. Springer, Heidelberg, 10--18."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484817"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64837-4_10"},{"key":"e_1_3_2_1_30_1","volume-title":"Multi-recipient Public-Key Encryption with Shortened Ciphertext. In PKC 2002 (LNCS ), David Naccache and Pascal Paillier (Eds.)","volume":"2274","author":"Kurosawa Kaoru","year":"2002","unstructured":"Kaoru Kurosawa . 2002 . Multi-recipient Public-Key Encryption with Shortened Ciphertext. In PKC 2002 (LNCS ), David Naccache and Pascal Paillier (Eds.) , Vol. 2274 . Springer, Heidelberg, 48--63. https:\/\/doi.org\/10.1007\/3-540-45664-3_4 10.1007\/3-540-45664-3_4 Kaoru Kurosawa. 2002. Multi-recipient Public-Key Encryption with Shortened Ciphertext. In PKC 2002 (LNCS ), David Naccache and Pascal Paillier (Eds.), Vol. 2274. Springer, Heidelberg, 48--63. https:\/\/doi.org\/10.1007\/3-540-45664-3_4"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"A. Langley M. Hamburg and S. Turner. 2016. Elliptic curves for security. RFC 7748 RFC Editor. (2016).  A. Langley M. Hamburg and S. Turner. 2016. Elliptic curves for security. RFC 7748 RFC Editor. (2016).","DOI":"10.17487\/RFC7748"},{"key":"e_1_3_2_1_32_1","volume-title":"Schuldt","author":"Pinto Alexandre","year":"2014","unstructured":"Alexandre Pinto , Bertram Poettering , and Jacob C. N . Schuldt . 2014 . Multi-recipient encryption, revisited. In ASIACCS 14,, Shiho Moriai, Trent Jaeger, and Kouichi Sakurai (Eds.). ACM Press , 229--238. Alexandre Pinto, Bertram Poettering, and Jacob C. N. Schuldt. 2014. Multi-recipient encryption, revisited. In ASIACCS 14,, Shiho Moriai, Trent Jaeger, and Kouichi Sakurai (Eds.). ACM Press, 229--238."},{"key":"e_1_3_2_1_33_1","volume-title":"[MLS] TreeKEM: An alternative to ART. MLS Mailing List. (","author":"Rescorla Eric","year":"2018","unstructured":"Eric Rescorla . 03 May 2018 14:27UTC. Subject : [MLS] TreeKEM: An alternative to ART. MLS Mailing List. ( 03 May 2018 14:27UTC). https:\/\/mailarchive.ietf.org\/arch\/msg\/mls\/WRdXVr8iUwibaQu0tH6sDnqU1no. Eric Rescorla. 03 May 2018 14:27UTC. Subject: [MLS] TreeKEM: An alternative to ART. MLS Mailing List. ( 03 May 2018 14:27UTC). https:\/\/mailarchive.ietf.org\/arch\/msg\/mls\/WRdXVr8iUwibaQu0tH6sDnqU1no."},{"key":"e_1_3_2_1_34_1","volume-title":"Smart","author":"Nigel","year":"2005","unstructured":"Nigel P. Smart . 2005 . Efficient Key Encapsulation to Multiple Parties. SCN 04 (LNCS ), , Carlo Blundo and Stelvio Cimato (Eds.), Vol. 3352 . Springer , Heidelberg, 208--219. https:\/\/doi.org\/10.1007\/978-3-540-30598-9_15 10.1007\/978-3-540-30598-9_15 Nigel P. Smart. 2005. Efficient Key Encapsulation to Multiple Parties. SCN 04 (LNCS ), , Carlo Blundo and Stelvio Cimato (Eds.), Vol. 3352. Springer, Heidelberg, 208--219. https:\/\/doi.org\/10.1007\/978-3-540-30598-9_15"},{"key":"e_1_3_2_1_35_1","volume-title":"[MLS] Virtual interim minutes. MLS Mailing List. (","author":"Sullivan Nick","year":"2020","unstructured":"Nick Sullivan . 29 January 2020 21:39UTC. Subject : [MLS] Virtual interim minutes. MLS Mailing List. ( 29 January 2020 21:39UTC). https:\/\/mailarchive.ietf.org\/arch\/msg\/mls\/ZZAz6tXj-jQ8nccf7SyIwSnhivQ\/. Nick Sullivan. 29 January 2020 21:39UTC. Subject: [MLS] Virtual interim minutes. MLS Mailing List. ( 29 January 2020 21:39UTC). https:\/\/mailarchive.ietf.org\/arch\/msg\/mls\/ZZAz6tXj-jQ8nccf7SyIwSnhivQ\/."},{"key":"e_1_3_2_1_36_1","volume-title":"MPhil Dissertation","author":"Weidner Matthew","year":"2019","unstructured":"Matthew Weidner . 2019 . Group messaging for secure asynchronous collaboration . MPhil Dissertation , 2019. Advisors : A. Beresford and M. Kleppmann. (2019). https:\/\/mattweidner.com\/acs-dissertation.pdf. Matthew Weidner. 2019. Group messaging for secure asynchronous collaboration. MPhil Dissertation, 2019. Advisors: A. Beresford and M. Kleppmann. (2019). https:\/\/mattweidner.com\/acs-dissertation.pdf."}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","location":"Los Angeles CA USA","acronym":"CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560632","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560632","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:59Z","timestamp":1750182539000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560632"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":31,"alternative-id":["10.1145\/3548606.3560632","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3560632","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}