{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:15:40Z","timestamp":1725549340059},"publisher-location":"Berlin, Heidelberg","reference-count":36,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540283898"},{"type":"electronic","value":"9783540318361"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11542322_31","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T12:53:57Z","timestamp":1127825637000},"page":"255-271","source":"Crossref","is-referenced-by-count":12,"title":["Deniable Authenticated Key Establishment for Internet Protocols"],"prefix":"10.1007","author":[{"given":"Colin","family":"Boyd","sequence":"first","affiliation":[]},{"given":"Wenbo","family":"Mao","sequence":"additional","affiliation":[]},{"given":"Kenneth G.","family":"Paterson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/3-540-45708-9_23","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"P.S.L.M. Barreto","year":"2002","unstructured":"Barreto, P.S.L.M., Kim, H.Y., Lynn, B., Scott, M.: Efficient algorithms for pairing-based cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, p. 354. Springer, Heidelberg (2002)"},{"key":"31_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/3-540-36413-7_19","volume-title":"Security in Communication Networks","author":"P.S.L.M. Barreto","year":"2003","unstructured":"Barreto, P.S.L.M., Lynn, B., Scott, M.: Constructing elliptic curves with prescribed embedding degrees. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol.\u00a02576, pp. 263\u2013273. Springer, Heidelberg (2003)"},{"key":"31_CR3","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1145\/276698.276854","volume-title":"Proceedings of the thirtieth annual ACM symposium on Theory of computing","author":"M. Bellare","year":"1998","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: A modular approach to the design and analysis of authentication and key exchange protocols. In: Proceedings of the thirtieth annual ACM symposium on Theory of computing, pp. 419\u2013428. ACM Press, New York (1998), Full version at, http:\/\/www-cse.ucsd.edu\/users\/mihir\/papers\/key-distribution.html"},{"key":"31_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1007\/3-540-48329-2_21","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"M. Bellare","year":"1994","unstructured":"Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 232\u2013249. Springer, Heidelberg (1994), Full version at, www-cse.ucsd.edu\/users\/mihir"},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Provably secure session key distribution \u2013 the three party case. In: Proceedings of the 27th ACM Symposium on the Theory of Computing (1995)","DOI":"10.1145\/225058.225084"},{"key":"31_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"issue":"3","key":"31_CR7","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D. Boneh","year":"2003","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. SIAM J. Computing\u00a032(3), 586\u2013615 (2003), http:\/\/www.crypto.stanford.edu\/~dabo\/abstracts\/ibe.html full version of [6]","journal-title":"SIAM J. Computing"},{"key":"31_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Shacham, H., Lynn, B.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 514\u2013532. Springer, Heidelberg (2001)"},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"Borella, M.S.: Methods and protocols for secure key negotiation using IKE. IEEE Network, 18\u201329 (July\/August 2000)","DOI":"10.1109\/65.855476"},{"key":"31_CR10","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1098\/rspa.1989.0125","volume":"426","author":"M. Burrows","year":"1989","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. Proceedings of the Royal Society\u00a0A426, 233\u2013271 (1989)","journal-title":"Proceedings of the Royal Society"},{"key":"31_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/3-540-44987-6_28","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"R. Canetti","year":"2001","unstructured":"Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 453\u2013474. Springer, Heidelberg (2001), http:\/\/eprint.iacr.org\/2001\/040.pg.gz"},{"key":"31_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/3-540-45708-9_10","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"R. Canetti","year":"2002","unstructured":"Canetti, R., Krawczyk, H.: Security analysis of iKE\u2019s signature-based key-exchange protocol. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, p. 143. Springer, Heidelberg (2002)"},{"issue":"3","key":"31_CR13","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1147\/sj.403.0721","volume":"40","author":"P.-C. Cheng","year":"2001","unstructured":"Cheng, P.-C.: An architecture for the Internet Key Exchange protocol. IBM Systems Journal\u00a040(3), 721\u2013745 (2001)","journal-title":"IBM Systems Journal"},{"key":"31_CR14","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transaction on Information Theory\u00a022, 644\u2013654 (1976)","journal-title":"IEEE Transaction on Information Theory"},{"key":"31_CR15","unstructured":"Dupont, R., Enge, A.: Practical non-interactive key distribution based on pairings. Cryptology ePrint Archive, Report 2002\/136 (2002), http:\/\/eprint.iacr.org\/"},{"key":"31_CR16","unstructured":"Dupont, R., Enge, A., Morain, F.: Building curves with arbitrary small MOV degree over finite prime fields. Cryptology ePrint Archive, Report 2002\/094 (2002), http:\/\/eprint.iacr.org\/"},{"key":"31_CR17","unstructured":"Ferguson, N., Schneier, B.: A cryptographic evaluation of IPsec. (2000), http:\/\/www.counterpane.com\/ipsec.html"},{"key":"31_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/3-540-45682-1_29","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"S.D. Galbraith","year":"2001","unstructured":"Galbraith, S.D.: Supersingular curves in cryptography. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 495\u2013513. Springer, Heidelberg (2001)"},{"key":"31_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/3-540-45455-1_26","volume-title":"Algorithmic Number Theory","author":"S.D. Galbraith","year":"2002","unstructured":"Galbraith, S.D., Harrison, K., Soldera, D.: Implementing the Tate pairing. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol.\u00a02369, pp. 324\u2013337. Springer, Heidelberg (2002)"},{"key":"31_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"490","DOI":"10.1007\/3-540-46416-6_42","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"M. Girault","year":"1991","unstructured":"Girault, M.: Self-certified public keys. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 490\u2013497. Springer, Heidelberg (1991)"},{"key":"31_CR21","doi-asserted-by":"crossref","unstructured":"Harkins, D., Carrel, D.: The Internet Key Exchange (IKE). Internet RFC 2409 (November 1998)","DOI":"10.17487\/rfc2409"},{"key":"31_CR22","unstructured":"Harkins, D., Kaufman, C., Kivinen, T., Kent, S., Perlman, R.: Design Rationale for IKEv2. Internet Draft (February 2002)"},{"key":"31_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/10722028_23","volume-title":"Algorithmic Number Theory","author":"A. Joux","year":"2000","unstructured":"Joux, A.: A one round protocol for tripartite Diffie-Hellman. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol.\u00a01838, pp. 385\u2013394. Springer, Heidelberg (2000)"},{"key":"31_CR24","unstructured":"Krawczyk, H.: SIGMA: The SIGn and MAc approach to authenticated Diffie-Hellman and its use in the IKE protocols, http:\/\/www.ee.technion.ac.il\/~hugo\/sigma.html"},{"key":"31_CR25","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1109\/CSFW.1996.503701","volume-title":"9th IEEE Computer Security Foundations Workshop","author":"G. Lowe","year":"1996","unstructured":"Lowe, G.: Some new attacks upon security protocols. In: 9th IEEE Computer Security Foundations Workshop, pp. 162\u2013169. IEEE Computer Society Press, Los Alamitos (1996)"},{"key":"31_CR26","unstructured":"Mao, W., Paterson, K.G.: On the plausible deniability feature of Internet protocols (2002), http:\/\/www.isg.rhul.ac.uk\/~kp\/IKE.ps"},{"key":"31_CR27","first-page":"1636","volume":"39","author":"A.J. Menezes","year":"1983","unstructured":"Menezes, A.J., Okamoto, T., Vanstone, S.A.: Reducing elliptic curve logarithms to a finite field. IEEE Trans. Info. Theory\u00a039, 1636\u20131646 (1983)","journal-title":"IEEE Trans. Info. Theory"},{"issue":"12","key":"31_CR28","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R.M. Needham","year":"1978","unstructured":"Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Communications of the ACM\u00a021(12), 993\u2013999 (1978)","journal-title":"Communications of the ACM"},{"key":"31_CR29","doi-asserted-by":"crossref","unstructured":"Paterson, K.G.: Cryptography from pairings: A snapshot of current research. Information Security Technical Report 7(3), 41\u201354 (2002), http:\/\/www.isg.rhul.ac.uk\/~kp\/pairings.ps","DOI":"10.1016\/S1363-4127(02)00306-0"},{"key":"31_CR30","doi-asserted-by":"crossref","unstructured":"Perlman, R., Kaufman, C.: Key exchange in IPSec: Analysis of IKE. IEEE Internet Computing, 50\u201356 (November-December 2000)","DOI":"10.1109\/4236.895016"},{"key":"31_CR31","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/S0020-0190(03)00203-5","volume":"86","author":"S. Saeednia","year":"2003","unstructured":"Saeednia, S.: A note on Girault\u2019s self-certified model. Information Processing Letters\u00a086, 323\u2013327 (2003)","journal-title":"Information Processing Letters"},{"key":"31_CR32","unstructured":"Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing. In: The 2000 Sympoium on Cryptography and Information Security, Okinawa, Japan (January 2000)"},{"key":"31_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"31_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/3-540-44987-6_13","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"E.R. Verheul","year":"2001","unstructured":"Verheul, E.R.: Evidence that XTR is more secure than supersingular elliptic curve cryptosystems. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 195\u2013210. Springer, Heidelberg (2001)"},{"issue":"13","key":"31_CR35","doi-asserted-by":"publisher","first-page":"1072","DOI":"10.1049\/el:19990747","volume":"35","author":"J. Zhou","year":"1999","unstructured":"Zhou, J.: Fixing a security flaw in IKE protocols. Electronics Letters\u00a035(13), 1072\u20131073 (1999)","journal-title":"Electronics Letters"},{"key":"31_CR36","doi-asserted-by":"publisher","first-page":"1606","DOI":"10.1016\/S0140-3664(00)00246-2","volume":"23","author":"J. Zhou","year":"2000","unstructured":"Zhou, J.: Further analysis of the Internet key exchange protocol. Computer Communications\u00a023, 1606\u20131612 (2000)","journal-title":"Computer Communications"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11542322_31.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:18:20Z","timestamp":1605644300000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11542322_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540283898","9783540318361"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/11542322_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}