“…Since the PAKE problem was introduced, it has been studied extensively, and many PAKE protocols have been proposed, e.g., [24,23,26,34,48,32]. Many of these protocols have been shown to be insecure [9,45]. More recent protocols, e.g., [3,10,1,37,51,19], have proofs of security, based on certain well-known cryptographic assumptions, in the random oracle and/or ideal cipher models.…”