{"id":"https://openalex.org/W4415800215","doi":"https://doi.org/10.1145/3774642","title":"Password-Authenticated Key Exchange Protocols: A Survey","display_name":"Password-Authenticated Key Exchange Protocols: A Survey","publication_year":2025,"publication_date":"2025-11-03","ids":{"openalex":"https://openalex.org/W4415800215","doi":"https://doi.org/10.1145/3774642"},"language":"en","primary_location":{"id":"doi:10.1145/3774642","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3774642","pdf_url":null,"source":{"id":"https://openalex.org/S157921468","display_name":"ACM Computing Surveys","issn_l":"0360-0300","issn":["0360-0300","1557-7341"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Computing Surveys","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030674762","display_name":"Ding Wang","orcid":"https://orcid.org/0000-0002-1667-2237"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ding Wang","raw_affiliation_strings":["College of Cryptology and Cyber Science, Nankai University"],"affiliations":[{"raw_affiliation_string":"College of Cryptology and Cyber Science, Nankai University","institution_ids":["https://openalex.org/I205237279"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004259879","display_name":"Guanling Li","orcid":"https://orcid.org/0009-0007-7090-1970"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guanling Li","raw_affiliation_strings":["College of Cryptology and Cyber Science, Nankai University"],"affiliations":[{"raw_affiliation_string":"College of Cryptology and Cyber Science, Nankai University","institution_ids":["https://openalex.org/I205237279"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5115467726","display_name":"Jingwei Jiang","orcid":null},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingwei Jiang","raw_affiliation_strings":["College of Cryptology and Cyber Science, Nankai University"],"affiliations":[{"raw_affiliation_string":"College of Cryptology and Cyber Science, Nankai University","institution_ids":["https://openalex.org/I205237279"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5030674762"],"corresponding_institution_ids":["https://openalex.org/I205237279"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.39760141,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"58","issue":"6","first_page":"1","last_page":"37"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.8852999806404114,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.8852999806404114,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.08470000326633453,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.00839999970048666,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5839999914169312},{"id":"https://openalex.org/keywords/session","display_name":"Session (web analytics)","score":0.48240000009536743},{"id":"https://openalex.org/keywords/authenticated-key-exchange","display_name":"Authenticated Key Exchange","score":0.42719998955726624},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.3589000105857849},{"id":"https://openalex.org/keywords/systematic-review","display_name":"Systematic review","score":0.31630000472068787},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.31040000915527344}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7616999745368958},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5839999914169312},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.48240000009536743},{"id":"https://openalex.org/C2777572472","wikidata":"https://www.wikidata.org/wiki/Q4825878","display_name":"Authenticated Key Exchange","level":5,"score":0.42719998955726624},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.3589000105857849},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.32519999146461487},{"id":"https://openalex.org/C189708586","wikidata":"https://www.wikidata.org/wiki/Q1504425","display_name":"Systematic review","level":3,"score":0.31630000472068787},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.31040000915527344},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2750999927520752},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2743000090122223},{"id":"https://openalex.org/C2777362162","wikidata":"https://www.wikidata.org/wiki/Q5594431","display_name":"Grand Challenges","level":2,"score":0.2727000117301941},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.27219998836517334},{"id":"https://openalex.org/C189693848","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information exchange","level":2,"score":0.25780001282691956},{"id":"https://openalex.org/C58642233","wikidata":"https://www.wikidata.org/wiki/Q8269924","display_name":"Taxonomy (biology)","level":2,"score":0.25440001487731934},{"id":"https://openalex.org/C15845906","wikidata":"https://www.wikidata.org/wiki/Q1172338","display_name":"Data exchange","level":2,"score":0.2524999976158142}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3774642","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3774642","pdf_url":null,"source":{"id":"https://openalex.org/S157921468","display_name":"ACM Computing Surveys","issn_l":"0360-0300","issn":["0360-0300","1557-7341"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Computing Surveys","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1612401216","https://openalex.org/W1967308747","https://openalex.org/W1988640034","https://openalex.org/W1992506132","https://openalex.org/W1994386233","https://openalex.org/W2036378739","https://openalex.org/W2054857924","https://openalex.org/W2055319984","https://openalex.org/W2068513923","https://openalex.org/W2108834246","https://openalex.org/W2111303254","https://openalex.org/W2124371582","https://openalex.org/W2133432179","https://openalex.org/W2147883419","https://openalex.org/W2156186849","https://openalex.org/W2218132318","https://openalex.org/W2245614479","https://openalex.org/W2297450820","https://openalex.org/W2313413906","https://openalex.org/W2734150319","https://openalex.org/W2781738013","https://openalex.org/W2799341537","https://openalex.org/W2890503685","https://openalex.org/W2915352631","https://openalex.org/W2923584227","https://openalex.org/W2925438923","https://openalex.org/W2963204447","https://openalex.org/W3011045328","https://openalex.org/W3108801278","https://openalex.org/W3119411075","https://openalex.org/W3201954451","https://openalex.org/W3215903849","https://openalex.org/W4232214274","https://openalex.org/W4232836212","https://openalex.org/W4249844008","https://openalex.org/W4381786393","https://openalex.org/W4388505084","https://openalex.org/W4392405613","https://openalex.org/W4392405738"],"related_works":[],"abstract_inverted_index":{"Password-authenticated":[0],"key":[1,26,144],"exchange":[2],"(PAKE)":[3],"protocols":[4,78,87,140,198],"tackle":[5],"the":[6,45,121,175,211],"important":[7],"problem":[8],"of":[9,41,47,64,72,76,81,125,149,174,178,194,214],"how":[10],"to":[11,20,38,44,88,111],"enable":[12],"two":[13],"parties,":[14],"who":[15],"share":[16],"a":[17,22,61,70,93,99,190,200,206],"low-entropy":[18],"password,":[19],"establish":[21],"cryptographically":[23],"strong":[24],"session":[25],"for":[27,101,210],"secure":[28],"data":[29],"communication.":[30],"Although":[31],"considerable":[32],"research":[33],"efforts":[34],"have":[35,51],"been":[36,52],"devoted":[37],"designing":[39],"hundreds":[40],"PAKE":[42,65,77,86,102,139,179,197,215],"protocols,":[43,103,128],"best":[46],"our":[48],"knowledge,":[49],"there":[50],"few":[53,207],"systematic":[54,201],"reviews.":[55],"In":[56],"this":[57],"work,":[58],"we":[59,119,188,204],"provide":[60,98],"comprehensive":[62],"overview":[63],"research.":[66,180],"We":[67,96,135],"first":[68],"propose":[69],"list":[71],"13":[73,183],"desirable":[74],"properties":[75,184],"in":[79,199],"terms":[80],"security":[82,153],"and":[83,104,129,133,155,158,171,185],"usability,":[84],"enabling":[85],"be":[89],"systematically":[90],"rated":[91],"across":[92],"common":[94],"spectrum.":[95],"then":[97],"taxonomy":[100],"classify":[105,137],"them":[106],"into":[107],"seven":[108],"types":[109],"according":[110],"their":[112,131,160],"underlying":[113],"design":[114,213],"strategies.":[115],"For":[116],"each":[117,164],"type,":[118],"investigate":[120],"inner":[122],"working":[123],"mechanisms":[124],"various":[126],"representative":[127,196],"identify":[130],"pros,":[132],"cons.":[134],"further":[136],"existing":[138],"from":[141],"five":[142],"other":[143],"perspectives":[145],"(i.e.,":[146],"symmetry,":[147],"number":[148],"participants,":[150],"hardness":[151],"assumptions,":[152],"goals,":[154],"round":[156],"complexity)":[157],"review":[159],"development":[161],"history":[162],"under":[163],"classification,":[165],"aiming":[166],"at":[167],"providing":[168],"an":[169],"in-depth":[170],"thorough":[172],"understanding":[173],"status":[176],"quo":[177],"Based":[181],"on":[182],"six":[186],"perspectives,":[187],"conduct":[189],"large-scale":[191],"comparative":[192],"evaluation":[193],"71":[195],"manner.":[202],"Finally,":[203],"highlight":[205],"potential":[208],"directions":[209],"future":[212],"protocols.":[216]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-03T00:00:00"}
