{"id":"https://openalex.org/W3089351364","doi":"https://doi.org/10.1007/978-3-030-64834-3_27","title":"Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security","display_name":"Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3089351364","doi":"https://doi.org/10.1007/978-3-030-64834-3_27","mag":"3089351364"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-64834-3_27","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-64834-3_27","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100331370","display_name":"Xiangyu Liu","orcid":"https://orcid.org/0000-0002-9733-3017"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangyu Liu","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, 200240, China","State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","State Key Laboratory of Cryptology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, 200240, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101899981","display_name":"Shengli Liu","orcid":"https://orcid.org/0000-0003-1366-8256"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shengli Liu","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, 200240, China","State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","Westone Cryptologic Research Center, Beijing, 100070, China","Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","Westone Cryptologic Research Center, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, 200240, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Westone Cryptologic Research Center, Beijing, 100070, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"Westone Cryptologic Research Center, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008204306","display_name":"Dawu Gu","orcid":"https://orcid.org/0000-0002-0504-9538"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dawu Gu","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, 200240, China","Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, 200240, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082041657","display_name":"Jian Weng","orcid":null},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Weng","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, 510632, China","College of Cyber Security, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, 510632, China","institution_ids":["https://openalex.org/I159948400"]},{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101899981"],"corresponding_institution_ids":["https://openalex.org/I183067930","https://openalex.org/I4210132990"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":8.6005,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.98133595,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"785","last_page":"814"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8385378122329712},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.754224956035614},{"id":"https://openalex.org/keywords/authenticated-key-exchange","display_name":"Authenticated Key Exchange","score":0.5690062046051025},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4918644428253174},{"id":"https://openalex.org/keywords/key-encapsulation","display_name":"Key encapsulation","score":0.4575878381729126},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41207098960876465},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.328265905380249},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.32333776354789734},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.22652754187583923},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.18197831511497498}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8385378122329712},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.754224956035614},{"id":"https://openalex.org/C2777572472","wikidata":"https://www.wikidata.org/wiki/Q4825878","display_name":"Authenticated Key Exchange","level":5,"score":0.5690062046051025},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4918644428253174},{"id":"https://openalex.org/C35181327","wikidata":"https://www.wikidata.org/wiki/Q6398156","display_name":"Key encapsulation","level":5,"score":0.4575878381729126},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41207098960876465},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.328265905380249},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32333776354789734},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.22652754187583923},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.18197831511497498}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-030-64834-3_27","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-64834-3_27","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W151792660","https://openalex.org/W1502931931","https://openalex.org/W1542059364","https://openalex.org/W1597922576","https://openalex.org/W1772901473","https://openalex.org/W2117455301","https://openalex.org/W2135654420","https://openalex.org/W2161850389","https://openalex.org/W2165549155","https://openalex.org/W2174925257","https://openalex.org/W2227653143","https://openalex.org/W2293388233","https://openalex.org/W2394843291","https://openalex.org/W2733667569","https://openalex.org/W2765240973","https://openalex.org/W2883305949","https://openalex.org/W2915352631","https://openalex.org/W2947303283","https://openalex.org/W2947797347","https://openalex.org/W2953468955","https://openalex.org/W2968515856","https://openalex.org/W3006038233"],"related_works":["https://openalex.org/W2948977325","https://openalex.org/W2096532495","https://openalex.org/W3175334233","https://openalex.org/W2949225884","https://openalex.org/W3000282663","https://openalex.org/W3095589423","https://openalex.org/W2611228024","https://openalex.org/W1517710990","https://openalex.org/W2153281696","https://openalex.org/W2949365815"],"abstract_inverted_index":null,"counts_by_year":[{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
