“…[14,24,15,25,32,37,16], and group KE (GKE), e.g. [10,29,22,12,31,19], reaching out to other flavors such as password-based solutions [8,6,9,3] or flexible combinations of GKE and 2KE [30,1]. The security notion, shared by most KE flavors, takes its roots in [7] and is called authenticated key exchange (AKE) security.…”