{"id":"https://openalex.org/W2737766275","doi":"https://doi.org/10.1007/978-3-319-64200-0_14","title":"IND-PCA Secure KEM Is Enough for Password-Based Authenticated Key Exchange (Short Paper)","display_name":"IND-PCA Secure KEM Is Enough for Password-Based Authenticated Key Exchange (Short Paper)","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2737766275","doi":"https://doi.org/10.1007/978-3-319-64200-0_14","mag":"2737766275"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-64200-0_14","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-64200-0_14","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100711252","display_name":"Haiyang Xue","orcid":"https://orcid.org/0000-0002-0173-7894"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haiyang Xue","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","Science and Technology on Communication Security Laboratory, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"raw_affiliation_string":"Science and Technology on Communication Security Laboratory, Chengdu, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101525541","display_name":"Bao Li","orcid":null},"institutions":[{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bao Li","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","Science and Technology on Communication Security Laboratory, Chengdu, China","University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"raw_affiliation_string":"Science and Technology on Communication Security Laboratory, Chengdu, China","institution_ids":[]},{"raw_affiliation_string":"University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007991015","display_name":"Xianhui Lu","orcid":"https://orcid.org/0000-0001-7091-5810"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xianhui Lu","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","Science and Technology on Communication Security Laboratory, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"raw_affiliation_string":"Science and Technology on Communication Security Laboratory, Chengdu, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100711252"],"corresponding_institution_ids":["https://openalex.org/I4210126530","https://openalex.org/I4210156404"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.5608,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.65761006,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"231","last_page":"241"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authenticated-key-exchange","display_name":"Authenticated Key Exchange","score":0.7624717354774475},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7573248147964478},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6765921115875244},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.6553592681884766},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.6026842594146729},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4382716715335846},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4374960660934448},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4165996313095093},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33112800121307373},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2528246343135834},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.06427761912345886}],"concepts":[{"id":"https://openalex.org/C2777572472","wikidata":"https://www.wikidata.org/wiki/Q4825878","display_name":"Authenticated Key Exchange","level":5,"score":0.7624717354774475},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7573248147964478},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6765921115875244},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.6553592681884766},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.6026842594146729},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4382716715335846},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4374960660934448},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4165996313095093},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33112800121307373},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2528246343135834},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.06427761912345886}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-319-64200-0_14","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-64200-0_14","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:ink.library.smu.edu.sg:sis_research-10196","is_oa":false,"landing_page_url":"https://ink.library.smu.edu.sg/sis_research/9191","pdf_url":null,"source":{"id":"https://openalex.org/S4306401925","display_name":"Singapore Management University Institutional Knowledge (InK) (Singapore Management University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79891267","host_organization_name":"Singapore Management University","host_organization_lineage":["https://openalex.org/I79891267"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://doi.org/10.1007/978-3-319-64200-0_14","raw_type":"Conference Proceeding Article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W203500824","https://openalex.org/W1516161674","https://openalex.org/W1536074886","https://openalex.org/W1552333418","https://openalex.org/W1601218083","https://openalex.org/W1801447676","https://openalex.org/W1998784354","https://openalex.org/W2097885210","https://openalex.org/W2124926080","https://openalex.org/W2134475940","https://openalex.org/W2149674197","https://openalex.org/W2152688060","https://openalex.org/W2153971105","https://openalex.org/W2157604883","https://openalex.org/W2165111290","https://openalex.org/W2186096729","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W3000282663","https://openalex.org/W2387820617","https://openalex.org/W3114726515","https://openalex.org/W4310479289","https://openalex.org/W2951601527","https://openalex.org/W2949854368","https://openalex.org/W2132206706","https://openalex.org/W2534969147","https://openalex.org/W2790635691","https://openalex.org/W2990233860"],"abstract_inverted_index":null,"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
