“…The design and analysis of secure ke protocols has proved to be a non-trivial task, with a large body of work written on the topic, including [15,30,10,7,16,5,6], [26,2,34] and many more. In fact, even today, after two decades of research, some important issues remain without satisfactory treatment.…”