{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:10:12Z","timestamp":1755882612180,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["871403"],"award-info":[{"award-number":["871403"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Austrian Federal Ministry for Climate Action, Environment, Energy, Mobility, Innovation and Technology","award":["876019"],"award-info":[{"award-number":["876019"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,30]]},"DOI":"10.1145\/3664476.3669925","type":"proceedings-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T12:35:50Z","timestamp":1721910950000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["PAKA: Pseudonymous Authenticated Key Agreement without bilinear cryptography"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-6238-8778","authenticated-orcid":false,"given":"Raphael","family":"Schermann","sequence":"first","affiliation":[{"name":"Institute of Technical Informatics, Graz University of Technology, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-2563-1074","authenticated-orcid":false,"given":"Simone","family":"Bussa","sequence":"additional","affiliation":[{"name":"Department of Control and Computer Engineering, Politecnico di Torino, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-6969-9034","authenticated-orcid":false,"given":"Rainer","family":"Urian","sequence":"additional","affiliation":[{"name":"Infineon Technologies AG, Augsburg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0012-7162","authenticated-orcid":false,"given":"Ronald","family":"Toegl","sequence":"additional","affiliation":[{"name":"Infineon Technologies Austria AG, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4441-266X","authenticated-orcid":false,"given":"Christian","family":"Steger","sequence":"additional","affiliation":[{"name":"Institute of Technical Informatics, Graz University of Technology, Austria"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security","author":"Arthur Will","unstructured":"Will Arthur and David Challener. 2015. A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security (1st ed.). Apress, USA.","edition":"1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.3390\/bdcc2020010"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-40186-3_10"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-018-9280-5"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33383-5_7"},{"key":"e_1_3_2_1_6_1","volume-title":"automatic cryptographic protocol verifier, user manual and tutorial. Version from","author":"Blanchet Bruno","year":"2018","unstructured":"Bruno Blanchet, Ben Smyth, Vincent Cheval, and Marc Sylvestre. 2018. ProVerif 2.00: automatic cryptographic protocol verifier, user manual and tutorial. Version from (2018), 05\u201316."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik(BSI). 2023. Kryptographische Verfahren: Empfehlungen und Schl\u00fcssell\u00e4ngen (BSI TR-02102-1). https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Publikationen\/TechnischeRichtlinien\/TR02102\/BSI-TR-02102.pdf?__blob=publicationFile&v=9. [Online; accessed 29-January-2023].","DOI":"10.1007\/978-3-658-23669-4_104-1"},{"volume-title":"Security in Communication Networks","author":"Camenisch Jan","key":"e_1_3_2_1_8_1","unstructured":"Jan Camenisch and Anna Lysyanskaya. 2003. A Signature Scheme with Efficient Protocols. In Security in Communication Networks, Stelvio Cimato, Giuseppe Persiano, and Clemente Galdi (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 268\u2013289."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-5906-5_443"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516729"},{"key":"e_1_3_2_1_11_1","volume-title":"Smart","author":"Chen Liqun","year":"2010","unstructured":"Liqun Chen, Dan Page, and Nigel\u00a0P. Smart. 2010. On the Design and Implementation of an Efficient DAA Scheme. In Smart Card Research and Advanced Application, Dieter Gollmann, Jean-Louis Lanet, and Julien Iguchi-Cartigny (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 223\u2013237."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD.2017.8066699"},{"key":"e_1_3_2_1_13_1","unstructured":"Federal Office for Information Security. 2016. Advanced Security Mechanisms for Machine Readable Travel Documents and eIDAS Token \u2013 Part 2: Protocols for electronic IDentification Authentication and trust Services (eIDAS). Technical Guideline TR-03110 Part 2. Federal Office for Information Security."},{"volume-title":"Privacy-Preserving Authenticated Key Exchange for\u00a0Constrained Devices","author":"Ferreira Lo\u00efc","key":"e_1_3_2_1_14_1","unstructured":"Lo\u00efc Ferreira. 2022. Privacy-Preserving Authenticated Key Exchange for\u00a0Constrained Devices. In Applied Cryptography and Network Security, Giuseppe Ateniese and Daniele Venturi (Eds.). Springer International Publishing, Cham, 293\u2013312."},{"key":"e_1_3_2_1_15_1","unstructured":"Trusted\u00a0Computing Group. 2019. Trusted Platform Module (TPM). https:\/\/trustedcomputinggroup.org\/work-groups\/trusted-platform-module. Accessed: 2023-03-15."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3241882"},{"volume-title":"Advances in Cryptology \u2014 CRYPTO","author":"Okamoto Tatsuaki","key":"e_1_3_2_1_17_1","unstructured":"Tatsuaki Okamoto. 1993. Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. In Advances in Cryptology \u2014 CRYPTO\u2019 92, Ernest\u00a0F. Brickell (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 31\u201353."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom56396.2022.00093"},{"volume-title":"Advances in Cryptology \u2014 CRYPTO","author":"Schnorr P.","key":"e_1_3_2_1_19_1","unstructured":"C.\u00a0P. Schnorr. 1990. Efficient Identification and Signatures for Smart Cards. In Advances in Cryptology \u2014 CRYPTO\u2019 89 Proceedings, Gilles Brassard (Ed.). Springer New York, New York, NY, 239\u2013252."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2016.2579198"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3372197"}],"event":{"name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security","acronym":"ARES 2024","location":"Vienna Austria"},"container-title":["Proceedings of the 19th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3669925","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664476.3669925","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:50:04Z","timestamp":1755881404000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3669925"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":21,"alternative-id":["10.1145\/3664476.3669925","10.1145\/3664476"],"URL":"https:\/\/doi.org\/10.1145\/3664476.3669925","relation":{},"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}