presence of an adversary that can corrupt parties adaptively and obtain their internal states.
In this paper, we give a formal definition of contributory protocols and define an ideal
functionality for password-based group key exchange with explicit authentication and
contributiveness in the UC framework. As with previous definitions in the same framework,
our definitions do not assume any particular distribution on passwords or independence …