{"id":"https://openalex.org/W2917762379","doi":"https://doi.org/10.1109/jsyst.2019.2896132","title":"An Identity-Based Authenticated Key Exchange Protocol Resilient to Continuous Key Leakage","display_name":"An Identity-Based Authenticated Key Exchange Protocol Resilient to Continuous Key Leakage","publication_year":2019,"publication_date":"2019-02-18","ids":{"openalex":"https://openalex.org/W2917762379","doi":"https://doi.org/10.1109/jsyst.2019.2896132","mag":"2917762379"},"language":"en","primary_location":{"id":"doi:10.1109/jsyst.2019.2896132","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2019.2896132","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060128730","display_name":"Jui\u2010Di Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I70522481","display_name":"National Changhua University of Education","ror":"https://ror.org/005gkfa10","country_code":"TW","type":"education","lineage":["https://openalex.org/I70522481"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Jui-Di Wu","raw_affiliation_strings":["Department of Mathematics, National Changhua University of Education, Changhua City, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, National Changhua University of Education, Changhua City, Taiwan","institution_ids":["https://openalex.org/I70522481"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056286081","display_name":"Yuh\u2010Min Tseng","orcid":"https://orcid.org/0000-0003-0860-7766"},"institutions":[{"id":"https://openalex.org/I70522481","display_name":"National Changhua University of Education","ror":"https://ror.org/005gkfa10","country_code":"TW","type":"education","lineage":["https://openalex.org/I70522481"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Yuh-Min Tseng","raw_affiliation_strings":["Department of Mathematics, National Changhua University of Education, Changhua City, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, National Changhua University of Education, Changhua City, Taiwan","institution_ids":["https://openalex.org/I70522481"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086091397","display_name":"Sen\u2010Shan Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I70522481","display_name":"National Changhua University of Education","ror":"https://ror.org/005gkfa10","country_code":"TW","type":"education","lineage":["https://openalex.org/I70522481"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Sen-Shan Huang","raw_affiliation_strings":["Department of Mathematics, National Changhua University of Education, Changhua City, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, National Changhua University of Education, Changhua City, Taiwan","institution_ids":["https://openalex.org/I70522481"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5060128730"],"corresponding_institution_ids":["https://openalex.org/I70522481"],"apc_list":null,"apc_paid":null,"fwci":3.0066,"has_fulltext":false,"cited_by_count":30,"citation_normalized_percentile":{"value":0.91856161,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"13","issue":"4","first_page":"3968","last_page":"3979"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.78293377161026},{"id":"https://openalex.org/keywords/authenticated-key-exchange","display_name":"Authenticated Key Exchange","score":0.7823427319526672},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5775474905967712},{"id":"https://openalex.org/keywords/ephemeral-key","display_name":"Ephemeral key","score":0.537487804889679},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.49292826652526855},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4112556576728821},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.36529791355133057},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.33184361457824707},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.08158665895462036}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.78293377161026},{"id":"https://openalex.org/C2777572472","wikidata":"https://www.wikidata.org/wiki/Q4825878","display_name":"Authenticated Key Exchange","level":5,"score":0.7823427319526672},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5775474905967712},{"id":"https://openalex.org/C76947770","wikidata":"https://www.wikidata.org/wiki/Q4533181","display_name":"Ephemeral key","level":2,"score":0.537487804889679},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.49292826652526855},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4112556576728821},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.36529791355133057},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.33184361457824707},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.08158665895462036}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jsyst.2019.2896132","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2019.2896132","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3266621645","display_name":null,"funder_award_id":"MOST106-2221-E-007-MY2","funder_id":"https://openalex.org/F4320322108","funder_display_name":"Ministry of Science and Technology"}],"funders":[{"id":"https://openalex.org/F4320322108","display_name":"Ministry of Science and Technology","ror":"https://ror.org/032e49973"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1483290420","https://openalex.org/W1500578148","https://openalex.org/W1518187966","https://openalex.org/W1537808739","https://openalex.org/W1547517307","https://openalex.org/W1569083856","https://openalex.org/W1588518948","https://openalex.org/W1657424849","https://openalex.org/W1800093586","https://openalex.org/W1829732909","https://openalex.org/W1975783211","https://openalex.org/W2032412223","https://openalex.org/W2088161125","https://openalex.org/W2091299352","https://openalex.org/W2099044346","https://openalex.org/W2107691219","https://openalex.org/W2116556172","https://openalex.org/W2124926080","https://openalex.org/W2131381553","https://openalex.org/W2135654420","https://openalex.org/W2139449170","https://openalex.org/W2141407428","https://openalex.org/W2146813141","https://openalex.org/W2152924492","https://openalex.org/W2153281696","https://openalex.org/W2154909745","https://openalex.org/W2156186849","https://openalex.org/W2164988972","https://openalex.org/W2169985476","https://openalex.org/W2296137340","https://openalex.org/W2510457680","https://openalex.org/W2547497046","https://openalex.org/W2565441728","https://openalex.org/W2606775873","https://openalex.org/W2790384695","https://openalex.org/W2913844835","https://openalex.org/W2962773084","https://openalex.org/W6671828919","https://openalex.org/W6682554491"],"related_works":["https://openalex.org/W3000282663","https://openalex.org/W1515922132","https://openalex.org/W2387820617","https://openalex.org/W3114726515","https://openalex.org/W4310479289","https://openalex.org/W2949854368","https://openalex.org/W2951601527","https://openalex.org/W2534969147","https://openalex.org/W2132206706","https://openalex.org/W1595798248"],"abstract_inverted_index":{"Identity-based":[0],"authenticated":[1],"key":[2,18,118,137],"exchange":[3],"(ID-AKE)":[4],"protocol":[5,87,133,156,189],"is":[6,12,139,157,181,190],"an":[7],"important":[8],"cryptographic":[9],"primitive,":[10],"which":[11],"used":[13],"to":[14,64,91,135,151,183],"establish":[15],"a":[16,73,104],"session":[17],"between":[19],"two":[20],"communication":[21],"participants":[22],"while":[23],"authenticating":[24],"each":[25],"other.":[26],"Indeed,":[27],"most":[28],"of":[29,49,53,84,94,126,167],"the":[30,41,76,81,85,101,117,122,130,154,160,174,186,195],"existing":[31],"ID-AKE":[32,58,163],"protocols":[33,60,71,164],"do":[34],"not":[35],"concern":[36],"with":[37],"side-channel":[38],"attacks":[39],"in":[40,165,194],"sense":[42],"that":[43,75,153,185],"adversaries":[44,193],"could":[45],"obtain":[46],"partial":[47],"information":[48,79],"ephemeral/permanent":[50,95],"secret":[51,96,128],"keys":[52],"users.":[54],"Recently,":[55],"several":[56],"leakage-resilient":[57],"(LR-ID-AKE)":[59],"have":[61,72],"been":[62],"proposed":[63,155,162,187],"address":[65],"such":[66],"attacks.":[67],"However,":[68],"these":[69],"LR-ID-AKE":[70,86,132,188],"restriction":[74],"total":[77],"leakage":[78,138,146,171],"during":[80],"life":[82],"time":[83],"must":[88],"be":[89],"bounded":[90],"some":[92],"ratio":[93],"keys.":[97],"In":[98],"this":[99],"paper,":[100],"authors":[102],"define":[103],"new":[105,196],"adversary":[106],"model,":[107,178],"termed":[108],"as":[109],"identity-based":[110],"continuous-leakage":[111],"extended":[112],"Canetti-Krawczyk":[113],"(ID-CL-eCK)":[114],"model.":[115,198],"Using":[116],"refreshing":[119],"procedure":[120],"(i.e.,":[121],"multiplicative":[123],"blinding":[124],"technique)":[125],"permanent":[127],"keys,":[129],"first":[131],"resilient":[134],"continuous":[136],"proposed,":[140],"and":[141,170],"it":[142],"possesses":[143],"overall":[144],"unbounded":[145],"property.":[147],"Comparisons":[148],"are":[149],"given":[150],"demonstrate":[152],"better":[158],"than":[159],"previously":[161],"terms":[166],"security":[168,179],"models":[169],"properties.":[172],"Under":[173],"generic":[175],"bilinear":[176],"group":[177],"analysis":[180],"made":[182],"show":[184],"secure":[191],"against":[192],"ID-CL-eCK":[197]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
