Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2015

AUTHORS

Suvradip Chakraborty , Goutam Paul , C. Pandu Rangan

ABSTRACT

While a lot of work has been done on the design and security analysis of PKI-based authenticated key exchange (AKE) protocols, very few exist in the symmetric key setting. The first provably secure symmetric AKE was proposed by Bellare and Rogaway (BR) in CRYPTO 1994 and so far this stands out as the most prominent one for symmetric key setting. In line with the significant progress done for PKI based system, we propose a stronger model than the BR model for symmetric key based system. We assume that the adversary can launch active attacks. In addition, the adversary can also obtain long term secret keys of the parties and the internal states of parties by getting access to their ephemeral secrets (or internal randomness) by means of appropriate oracle queries. The salient feature of our model is the way we handle active adversaries even in the test session. We also design a symmetric key AKE construction that is provably secure against active adversaries in our new model using weak primitives. Dodis et al. (EUROCRYPT 2012) used weak Pseudo Random Functions (wPRF) and weak Almost-XOR Universal hash function family (wAXU) to design a three-pass one-sided authentication protocol in the symmetric key paradigm. A direct application of their techniques yields a four-pass (two-round) symmetric key AKE protocol with mutual authentication. Our construction uses particular instances of these weak primitives and introduces a novel technique called input-swapping to achieve a three-pass symmetric key AKE protocol with mutual authentication resisting active attacks (even in the test session). Our construction is proven secure in the Random oracle Model under the DDH assumption. More... »

PAGES

149-166

References to SciGraph publications

  • 2005. HMQV: A High-Performance Secure Diffie-Hellman Protocol in ADVANCES IN CRYPTOLOGY – CRYPTO 2005
  • 2003-03. An Efficient Protocol for Authenticated Key Agreement in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2001-07-13. Entity Authentication and Key Distribution in ADVANCES IN CRYPTOLOGY — CRYPTO’ 93
  • 2007. Stronger Security of Authenticated Key Exchange in PROVABLE SECURITY
  • 2008-07. EKAES: An efficient key agreement and encryption scheme for wireless sensor networks in JOURNAL OF ELECTRONICS (CHINA)
  • 2001-04-15. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels in ADVANCES IN CRYPTOLOGY — EUROCRYPT 2001
  • 1992-06. Authentication and authenticated key exchanges in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2008. Comparing the Pre- and Post-specified Peer Models for Key Agreement in INFORMATION SECURITY AND PRIVACY
  • 2004. One-Round Protocols for Two-Party Authenticated Key Exchange in ROBOCUP 2005: ROBOT SOCCER WORLD CUP IX
  • 2008-03. Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2012. Message Authentication, Revisited in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2012
  • 2010. A New Security Model for Authenticated Key Agreement in SECURITY AND CRYPTOGRAPHY FOR NETWORKS
  • 2001-05-18. An Identity-Based Key-Exchange Protocol in ADVANCES IN CRYPTOLOGY — EUROCRYPT ’89
  • Book

    TITLE

    Provable Security

    ISBN

    978-3-319-26058-7
    978-3-319-26059-4

    From Grant

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-319-26059-4_8

    DOI

    http://dx.doi.org/10.1007/978-3-319-26059-4_8

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1013634419


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "name": [
                "Department of Computer Science and Engineering, Indian Institute of Technology Madras"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Chakraborty", 
            "givenName": "Suvradip", 
            "id": "sg:person.011456504673.86", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011456504673.86"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "name": [
                "Cryptology and Security Research Unit (CSRU), R. C. Bose Centre for Cryptology and Security, Indian Statistical Institute"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Paul", 
            "givenName": "Goutam", 
            "id": "sg:person.012131006407.38", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012131006407.38"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "name": [
                "Department of Computer Science and Engineering, Indian Institute of Technology Madras"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Rangan", 
            "givenName": "C. Pandu", 
            "id": "sg:person.016366027737.61", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016366027737.61"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/978-3-642-15317-4_15", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1010829539", 
              "https://doi.org/10.1007/978-3-642-15317-4_15"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-15317-4_15", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1010829539", 
              "https://doi.org/10.1007/978-3-642-15317-4_15"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-46885-4_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1011426218", 
              "https://doi.org/10.1007/3-540-46885-4_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-46885-4_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1011426218", 
              "https://doi.org/10.1007/3-540-46885-4_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/j.csi.2007.04.002", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1016685909"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/359657.359659", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1016850143"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/24592.24594", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1018840751"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s11767-006-0259-2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1019439759", 
              "https://doi.org/10.1007/s11767-006-0259-2"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/j.ins.2007.03.024", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1021670087"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44987-6_28", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1024352177", 
              "https://doi.org/10.1007/3-540-44987-6_28"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44987-6_28", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1024352177", 
              "https://doi.org/10.1007/3-540-44987-6_28"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-70500-0_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1026532497", 
              "https://doi.org/10.1007/978-3-540-70500-0_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-48329-2_21", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027269192", 
              "https://doi.org/10.1007/3-540-48329-2_21"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-48329-2_21", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027269192", 
              "https://doi.org/10.1007/3-540-48329-2_21"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-24852-1_16", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027540822", 
              "https://doi.org/10.1007/978-3-540-24852-1_16"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-24852-1_16", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027540822", 
              "https://doi.org/10.1007/978-3-540-24852-1_16"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-24852-1_16", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027540822", 
              "https://doi.org/10.1007/978-3-540-24852-1_16"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11535218_33", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027574053", 
              "https://doi.org/10.1007/11535218_33"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11535218_33", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027574053", 
              "https://doi.org/10.1007/11535218_33"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.3233/jcs-130472", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029949999"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-29011-4_22", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1037442067", 
              "https://doi.org/10.1007/978-3-642-29011-4_22"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-75670-5_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041988575", 
              "https://doi.org/10.1007/978-3-540-75670-5_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-75670-5_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041988575", 
              "https://doi.org/10.1007/978-3-540-75670-5_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bf00124891", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1042906947", 
              "https://doi.org/10.1007/bf00124891"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bf00124891", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1042906947", 
              "https://doi.org/10.1007/bf00124891"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1023/a:1022595222606", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1050148117", 
              "https://doi.org/10.1023/a:1022595222606"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10623-007-9159-1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1052246950", 
              "https://doi.org/10.1007/s10623-007-9159-1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10623-007-9159-1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1052246950", 
              "https://doi.org/10.1007/s10623-007-9159-1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1049/ip-e.1990.0054", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1056849017"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/2.53351", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061105650"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/tdsc.2007.70226", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061585153"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/tit.1976.1055638", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061647862"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/risp.1990.63854", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1086265061"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2015", 
        "datePublishedReg": "2015-01-01", 
        "description": "While a lot of work has been done on the design and security analysis of PKI-based authenticated key exchange (AKE) protocols, very few exist in the symmetric key setting. The first provably secure symmetric AKE was proposed by Bellare and Rogaway (BR) in CRYPTO 1994 and so far this stands out as the most prominent one for symmetric key setting. In line with the significant progress done for PKI based system, we propose a stronger model than the BR model for symmetric key based system. We assume that the adversary can launch active attacks. In addition, the adversary can also obtain long term secret keys of the parties and the internal states of parties by getting access to their ephemeral secrets (or internal randomness) by means of appropriate oracle queries. The salient feature of our model is the way we handle active adversaries even in the test session. We also design a symmetric key AKE construction that is provably secure against active adversaries in our new model using weak primitives. Dodis et al. (EUROCRYPT 2012) used weak Pseudo Random Functions (wPRF) and weak Almost-XOR Universal hash function family (wAXU) to design a three-pass one-sided authentication protocol in the symmetric key paradigm. A direct application of their techniques yields a four-pass (two-round) symmetric key AKE protocol with mutual authentication. Our construction uses particular instances of these weak primitives and introduces a novel technique called input-swapping to achieve a three-pass symmetric key AKE protocol with mutual authentication resisting active attacks (even in the test session). Our construction is proven secure in the Random oracle Model under the DDH assumption.", 
        "editor": [
          {
            "familyName": "Au", 
            "givenName": "Man-Ho", 
            "type": "Person"
          }, 
          {
            "familyName": "Miyaji", 
            "givenName": "Atsuko", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-319-26059-4_8", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isFundedItemOf": [
          {
            "id": "sg:grant.4058066", 
            "type": "MonetaryGrant"
          }
        ], 
        "isPartOf": {
          "isbn": [
            "978-3-319-26058-7", 
            "978-3-319-26059-4"
          ], 
          "name": "Provable Security", 
          "type": "Book"
        }, 
        "name": "Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction", 
        "pagination": "149-166", 
        "productId": [
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-319-26059-4_8"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "40f39f65ac446b2f6eaeb27db1e66f25d83608f4fc1ad4e340a22f4e01721ec8"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1013634419"
            ]
          }
        ], 
        "publisher": {
          "location": "Cham", 
          "name": "Springer International Publishing", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-319-26059-4_8", 
          "https://app.dimensions.ai/details/publication/pub.1013634419"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-15T20:04", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8687_00000251.jsonl", 
        "type": "Chapter", 
        "url": "http://link.springer.com/10.1007/978-3-319-26059-4_8"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-26059-4_8'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-26059-4_8'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-26059-4_8'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-26059-4_8'


     

    This table displays all metadata directly associated to this object as RDF triples.

    171 TRIPLES      23 PREDICATES      50 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-319-26059-4_8 schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author N2cef25767ae74d8c9f6901f5aa775b89
    4 schema:citation sg:pub.10.1007/11535218_33
    5 sg:pub.10.1007/3-540-44987-6_28
    6 sg:pub.10.1007/3-540-46885-4_5
    7 sg:pub.10.1007/3-540-48329-2_21
    8 sg:pub.10.1007/978-3-540-24852-1_16
    9 sg:pub.10.1007/978-3-540-70500-0_5
    10 sg:pub.10.1007/978-3-540-75670-5_1
    11 sg:pub.10.1007/978-3-642-15317-4_15
    12 sg:pub.10.1007/978-3-642-29011-4_22
    13 sg:pub.10.1007/bf00124891
    14 sg:pub.10.1007/s10623-007-9159-1
    15 sg:pub.10.1007/s11767-006-0259-2
    16 sg:pub.10.1023/a:1022595222606
    17 https://doi.org/10.1016/j.csi.2007.04.002
    18 https://doi.org/10.1016/j.ins.2007.03.024
    19 https://doi.org/10.1049/ip-e.1990.0054
    20 https://doi.org/10.1109/2.53351
    21 https://doi.org/10.1109/risp.1990.63854
    22 https://doi.org/10.1109/tdsc.2007.70226
    23 https://doi.org/10.1109/tit.1976.1055638
    24 https://doi.org/10.1145/24592.24594
    25 https://doi.org/10.1145/359657.359659
    26 https://doi.org/10.3233/jcs-130472
    27 schema:datePublished 2015
    28 schema:datePublishedReg 2015-01-01
    29 schema:description While a lot of work has been done on the design and security analysis of PKI-based authenticated key exchange (AKE) protocols, very few exist in the symmetric key setting. The first provably secure symmetric AKE was proposed by Bellare and Rogaway (BR) in CRYPTO 1994 and so far this stands out as the most prominent one for symmetric key setting. In line with the significant progress done for PKI based system, we propose a stronger model than the BR model for symmetric key based system. We assume that the adversary can launch active attacks. In addition, the adversary can also obtain long term secret keys of the parties and the internal states of parties by getting access to their ephemeral secrets (or internal randomness) by means of appropriate oracle queries. The salient feature of our model is the way we handle active adversaries even in the test session. We also design a symmetric key AKE construction that is provably secure against active adversaries in our new model using weak primitives. Dodis et al. (EUROCRYPT 2012) used weak Pseudo Random Functions (wPRF) and weak Almost-XOR Universal hash function family (wAXU) to design a three-pass one-sided authentication protocol in the symmetric key paradigm. A direct application of their techniques yields a four-pass (two-round) symmetric key AKE protocol with mutual authentication. Our construction uses particular instances of these weak primitives and introduces a novel technique called input-swapping to achieve a three-pass symmetric key AKE protocol with mutual authentication resisting active attacks (even in the test session). Our construction is proven secure in the Random oracle Model under the DDH assumption.
    30 schema:editor N74f1fec51fe74e79b8a5c94b568d0072
    31 schema:genre chapter
    32 schema:inLanguage en
    33 schema:isAccessibleForFree false
    34 schema:isPartOf N36e7f7b27edc4e82980963922c00a14f
    35 schema:name Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction
    36 schema:pagination 149-166
    37 schema:productId N1a3a4e4176f84a4ca76bf00bde1a1169
    38 N94f4c80c297b4438b29ff904818072d6
    39 Nd93f9b470ebc4074840f8e421c701289
    40 schema:publisher Nf67ec0183d9a4bb5be90945ba319eb9e
    41 schema:sameAs https://app.dimensions.ai/details/publication/pub.1013634419
    42 https://doi.org/10.1007/978-3-319-26059-4_8
    43 schema:sdDatePublished 2019-04-15T20:04
    44 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    45 schema:sdPublisher N65ae5fbf1ab44778882c1b796d75adaf
    46 schema:url http://link.springer.com/10.1007/978-3-319-26059-4_8
    47 sgo:license sg:explorer/license/
    48 sgo:sdDataset chapters
    49 rdf:type schema:Chapter
    50 N19028b9b24004c659a6159673549f2ba rdf:first sg:person.016366027737.61
    51 rdf:rest rdf:nil
    52 N1a3a4e4176f84a4ca76bf00bde1a1169 schema:name readcube_id
    53 schema:value 40f39f65ac446b2f6eaeb27db1e66f25d83608f4fc1ad4e340a22f4e01721ec8
    54 rdf:type schema:PropertyValue
    55 N2cef25767ae74d8c9f6901f5aa775b89 rdf:first sg:person.011456504673.86
    56 rdf:rest Na7477f80582948148fa1cab521bfd545
    57 N31da03c73a8b4135b1446149b1663310 schema:name Department of Computer Science and Engineering, Indian Institute of Technology Madras
    58 rdf:type schema:Organization
    59 N36e7f7b27edc4e82980963922c00a14f schema:isbn 978-3-319-26058-7
    60 978-3-319-26059-4
    61 schema:name Provable Security
    62 rdf:type schema:Book
    63 N65ae5fbf1ab44778882c1b796d75adaf schema:name Springer Nature - SN SciGraph project
    64 rdf:type schema:Organization
    65 N74f1fec51fe74e79b8a5c94b568d0072 rdf:first Na570ef8582c9481fab3ee0f9951c0ee8
    66 rdf:rest Nade474fd350a4149bd6ac4cdf319581d
    67 N91b6c58f60a84eddb619db4038169f12 schema:familyName Miyaji
    68 schema:givenName Atsuko
    69 rdf:type schema:Person
    70 N928f5dc7460f43538306507ab9842099 schema:name Cryptology and Security Research Unit (CSRU), R. C. Bose Centre for Cryptology and Security, Indian Statistical Institute
    71 rdf:type schema:Organization
    72 N94f4c80c297b4438b29ff904818072d6 schema:name dimensions_id
    73 schema:value pub.1013634419
    74 rdf:type schema:PropertyValue
    75 Na570ef8582c9481fab3ee0f9951c0ee8 schema:familyName Au
    76 schema:givenName Man-Ho
    77 rdf:type schema:Person
    78 Na7477f80582948148fa1cab521bfd545 rdf:first sg:person.012131006407.38
    79 rdf:rest N19028b9b24004c659a6159673549f2ba
    80 Nade474fd350a4149bd6ac4cdf319581d rdf:first N91b6c58f60a84eddb619db4038169f12
    81 rdf:rest rdf:nil
    82 Nbcd88148866043b0adcb0eba9125608d schema:name Department of Computer Science and Engineering, Indian Institute of Technology Madras
    83 rdf:type schema:Organization
    84 Nd93f9b470ebc4074840f8e421c701289 schema:name doi
    85 schema:value 10.1007/978-3-319-26059-4_8
    86 rdf:type schema:PropertyValue
    87 Nf67ec0183d9a4bb5be90945ba319eb9e schema:location Cham
    88 schema:name Springer International Publishing
    89 rdf:type schema:Organisation
    90 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    91 schema:name Information and Computing Sciences
    92 rdf:type schema:DefinedTerm
    93 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    94 schema:name Data Format
    95 rdf:type schema:DefinedTerm
    96 sg:grant.4058066 http://pending.schema.org/fundedItem sg:pub.10.1007/978-3-319-26059-4_8
    97 rdf:type schema:MonetaryGrant
    98 sg:person.011456504673.86 schema:affiliation Nbcd88148866043b0adcb0eba9125608d
    99 schema:familyName Chakraborty
    100 schema:givenName Suvradip
    101 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011456504673.86
    102 rdf:type schema:Person
    103 sg:person.012131006407.38 schema:affiliation N928f5dc7460f43538306507ab9842099
    104 schema:familyName Paul
    105 schema:givenName Goutam
    106 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012131006407.38
    107 rdf:type schema:Person
    108 sg:person.016366027737.61 schema:affiliation N31da03c73a8b4135b1446149b1663310
    109 schema:familyName Rangan
    110 schema:givenName C. Pandu
    111 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016366027737.61
    112 rdf:type schema:Person
    113 sg:pub.10.1007/11535218_33 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027574053
    114 https://doi.org/10.1007/11535218_33
    115 rdf:type schema:CreativeWork
    116 sg:pub.10.1007/3-540-44987-6_28 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024352177
    117 https://doi.org/10.1007/3-540-44987-6_28
    118 rdf:type schema:CreativeWork
    119 sg:pub.10.1007/3-540-46885-4_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1011426218
    120 https://doi.org/10.1007/3-540-46885-4_5
    121 rdf:type schema:CreativeWork
    122 sg:pub.10.1007/3-540-48329-2_21 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027269192
    123 https://doi.org/10.1007/3-540-48329-2_21
    124 rdf:type schema:CreativeWork
    125 sg:pub.10.1007/978-3-540-24852-1_16 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027540822
    126 https://doi.org/10.1007/978-3-540-24852-1_16
    127 rdf:type schema:CreativeWork
    128 sg:pub.10.1007/978-3-540-70500-0_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1026532497
    129 https://doi.org/10.1007/978-3-540-70500-0_5
    130 rdf:type schema:CreativeWork
    131 sg:pub.10.1007/978-3-540-75670-5_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1041988575
    132 https://doi.org/10.1007/978-3-540-75670-5_1
    133 rdf:type schema:CreativeWork
    134 sg:pub.10.1007/978-3-642-15317-4_15 schema:sameAs https://app.dimensions.ai/details/publication/pub.1010829539
    135 https://doi.org/10.1007/978-3-642-15317-4_15
    136 rdf:type schema:CreativeWork
    137 sg:pub.10.1007/978-3-642-29011-4_22 schema:sameAs https://app.dimensions.ai/details/publication/pub.1037442067
    138 https://doi.org/10.1007/978-3-642-29011-4_22
    139 rdf:type schema:CreativeWork
    140 sg:pub.10.1007/bf00124891 schema:sameAs https://app.dimensions.ai/details/publication/pub.1042906947
    141 https://doi.org/10.1007/bf00124891
    142 rdf:type schema:CreativeWork
    143 sg:pub.10.1007/s10623-007-9159-1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052246950
    144 https://doi.org/10.1007/s10623-007-9159-1
    145 rdf:type schema:CreativeWork
    146 sg:pub.10.1007/s11767-006-0259-2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1019439759
    147 https://doi.org/10.1007/s11767-006-0259-2
    148 rdf:type schema:CreativeWork
    149 sg:pub.10.1023/a:1022595222606 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050148117
    150 https://doi.org/10.1023/a:1022595222606
    151 rdf:type schema:CreativeWork
    152 https://doi.org/10.1016/j.csi.2007.04.002 schema:sameAs https://app.dimensions.ai/details/publication/pub.1016685909
    153 rdf:type schema:CreativeWork
    154 https://doi.org/10.1016/j.ins.2007.03.024 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021670087
    155 rdf:type schema:CreativeWork
    156 https://doi.org/10.1049/ip-e.1990.0054 schema:sameAs https://app.dimensions.ai/details/publication/pub.1056849017
    157 rdf:type schema:CreativeWork
    158 https://doi.org/10.1109/2.53351 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061105650
    159 rdf:type schema:CreativeWork
    160 https://doi.org/10.1109/risp.1990.63854 schema:sameAs https://app.dimensions.ai/details/publication/pub.1086265061
    161 rdf:type schema:CreativeWork
    162 https://doi.org/10.1109/tdsc.2007.70226 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061585153
    163 rdf:type schema:CreativeWork
    164 https://doi.org/10.1109/tit.1976.1055638 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061647862
    165 rdf:type schema:CreativeWork
    166 https://doi.org/10.1145/24592.24594 schema:sameAs https://app.dimensions.ai/details/publication/pub.1018840751
    167 rdf:type schema:CreativeWork
    168 https://doi.org/10.1145/359657.359659 schema:sameAs https://app.dimensions.ai/details/publication/pub.1016850143
    169 rdf:type schema:CreativeWork
    170 https://doi.org/10.3233/jcs-130472 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029949999
    171 rdf:type schema:CreativeWork
     




    Preview window. Press ESC to close (or click here)


    ...