{"id":7732,"date":"2019-05-06T11:20:49","date_gmt":"2019-05-06T09:20:49","guid":{"rendered":"https:\/\/www.uni.lu\/fr\/events\/phd-defense-provable-security-analysis-for-the-password-authenticated-key-exchange-problem\/"},"modified":"2019-05-06T11:20:49","modified_gmt":"2019-05-06T09:20:49","slug":"phd-defense-provable-security-analysis-for-the-password-authenticated-key-exchange-problem","status":"publish","type":"events","link":"https:\/\/www.uni.lu\/fr\/events\/phd-defense-provable-security-analysis-for-the-password-authenticated-key-exchange-problem\/","title":{"rendered":"PhD Defense: Provable Security Analysis for the Password Authenticated Key-Exchange Problem"},"content":{"rendered":"<section class=\"wp-block-unilux-blocks-free-section section\"><div class=\"container xl:max-w-screen-xl\"><p><strong>Members of the defense committee<\/strong>:<\/p><ul class=\"ulux-list\"><li class=\"ulux-list-item\">Prof Dr. Jean-S\u00e9bastien Coron, Universit\u00e9 du Luxembourg, chairman<\/li><li class=\"ulux-list-item\">Dr Dimiter Ostrev, Universit\u00e9 du Luxembourg, vice-chairman<\/li><li class=\"ulux-list-item\">Prof Dr. Peter Y.A. Ryan, Universit\u00e9 du Luxembourg, supervisor<\/li><li class=\"ulux-list-item\">Prof Dr. Michel Abdalla, \u00a0ENS Paris \u00a0member<\/li><li class=\"ulux-list-item\">Dr Steve Kremer, INRIA Nancy, member<\/li><\/ul><p><strong>Abstract<\/strong>:<\/p><p>Password-based Authenticated Key-Exchange (PAKE) protocols allow the establishment of secure communications despite a human-memorable password being the only secret that is previously shared between the participants. After more than 25 years since the initial proposal, the PAKE problem remains an active area of research, probably due to the vast amount of passwords deployed on the internet as password-based still constitutes the most extensively used method for user authentication. In this thesis, we consider the computational complexity approach to improve the current understanding of the security provided by previously proposed PAKE protocols and their corresponding security models. We expect that this work contributes to the standardization,\u00a0 adoption and more efficient implementation of the considered protocols.<\/p><p>Our first contribution is concerning forward secrecy for the SPAKE2 protocol of Abdalla and Pointcheval (CT-RSA 2005). We prove that the SPAKE2 protocol satisfies the so-called notion of weak forward secrecy. Furthermore,\u00a0 we demonstrate that the incorporation of key-confirmation codes in the original SPAKE2 results in a protocol that provably satisfies the stronger notion of perfect forward secrecy. As forward secrecy is an explicit requirement for cypher suites supported in the TLS handshake, we believe our results fill the gap in the literature and facilitate the adoption of SPAKE2 in the recently approved\u00a0 TLS 1.3.<\/p><p>Our second contribution is regarding tight security reductions for EKE-based protocols. We present a security reduction for the PAK protocol instantiated over Gap Diffie-Hellman groups that is tighter than previously known reductions. We discuss the implications of our results for concrete security. Our proof is the first to show that the PAK protocol can provide meaningful security guarantees for values of the parameters typical in today&rsquo;s world.<\/p><p>Finally, we study the relation between two well-known security models for PAKE protocols. Security models for PAKEs aim to capture the desired security properties that such protocols must satisfy when executed in the presence of an adversary. They are usually classified into i) indistinguishability-based (IND-based) or ii) simulation-based (SIM-based), however, controversy remains within the research community regarding what is the most appropriate security model that better reflects the capabilities that an adversary is supposed to have in real-world scenarios. Furthermore, the relation between these two security notions is unclear and mentioned as a gap in the literature. We prove that SIM-BMP security from Boyko et al. (EUROCRYPT 2000) implies IND-RoR security from Abdalla et al. (PKC 2005) and that IND-RoR security is equivalent to a slightly modified version of SIM-BMP security. We also investigate whether IND-RoR security implies (unmodified) SIM-BMP security.<\/p><\/div><\/section>","protected":false},"excerpt":{"rendered":"<p>Members of the defense committee:Prof Dr. Jean-S\u00e9bastien Coron, Universit\u00e9 du Luxembourg, chairmanDr Dimiter Ostrev, Universit\u00e9 du Luxembourg, vice-chairmanProf Dr. Peter Y.A. Ryan, Universit\u00e9 du Luxembourg, supervisorProf Dr. Michel Abdalla, \u00a0ENS Paris \u00a0memberDr Steve Kremer, INRIA Nancy, member<\/p>\n","protected":false},"author":0,"featured_media":7733,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"featured_image_focal_point":[],"show_featured_caption":false,"ulux_newsletter_groups":"","uluxPostTitle":"","uluxPrePostTitle":"","_trash_the_other_posts":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"event_start_date":"2019-05-14 14:30:00","event_end_date":"2019-05-14 17:30:00","event_speaker_name":"Jos\u00e9 Miguel Lopez Becerra ","event_speaker_link":"","event_is_online":false,"event_location":"Room 1.030 \r\nMaison du Nombre (MNO)\r\nMaison du Nombre\r\n6, Avenue de la Fonte\r\nL-4364 Esch-sur-Alzette","event_street":"","event_location_link":"","event_zip_code":"","event_city":"","event_country":"LU"},"events-topic":[],"events-type":[],"organisation":[184,226],"authorship":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.3 (Yoast SEO v22.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>PhD Defense: Provable Security Analysis for the Password Authenticated Key-Exchange Problem - Universit\u00e9 du Luxembourg<\/title>\n<meta name=\"description\" content=\"Members of the defense committee:Prof Dr. Jean-S\u00e9bastien Coron, Universit\u00e9 du Luxembourg, chairmanDr Dimiter Ostrev, Universit\u00e9 du Luxembourg, vice-chairmanProf Dr. Peter Y.A. Ryan, Universit\u00e9 du Luxembourg, supervisorProf Dr. Michel Abdalla, \u00a0ENS Paris \u00a0memberDr Steve Kremer, INRIA Nancy, member\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.uni.lu\/fr\/events\/phd-defense-provable-security-analysis-for-the-password-authenticated-key-exchange-problem\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PhD Defense: Provable Security Analysis for the Password Authenticated Key-Exchange Problem\" \/>\n<meta property=\"og:description\" content=\"Members of the defense committee:Prof Dr. Jean-S\u00e9bastien Coron, Universit\u00e9 du Luxembourg, chairmanDr Dimiter Ostrev, Universit\u00e9 du Luxembourg, vice-chairmanProf Dr. Peter Y.A. Ryan, Universit\u00e9 du Luxembourg, supervisorProf Dr. Michel Abdalla, \u00a0ENS Paris \u00a0memberDr Steve Kremer, INRIA Nancy, member\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.uni.lu\/fr\/events\/phd-defense-provable-security-analysis-for-the-password-authenticated-key-exchange-problem\/\" \/>\n<meta property=\"og:site_name\" content=\"UNI FR\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/uni.lu\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/03\/03120045\/UNIV_SM-Profile_1600x1600px-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.uni.lu\/fr\/events\/phd-defense-provable-security-analysis-for-the-password-authenticated-key-exchange-problem\/\",\"url\":\"https:\/\/www.uni.lu\/fr\/events\/phd-defense-provable-security-analysis-for-the-password-authenticated-key-exchange-problem\/\",\"name\":\"PhD Defense: Provable Security Analysis for the Password Authenticated Key-Exchange Problem - Universit\u00e9 du Luxembourg\",\"isPartOf\":{\"@id\":\"https:\/\/www.uni.lu\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.uni.lu\/fr\/events\/phd-defense-provable-security-analysis-for-the-password-authenticated-key-exchange-problem\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.uni.lu\/fr\/events\/phd-defense-provable-security-analysis-for-the-password-authenticated-key-exchange-problem\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2019\/05\/default.jpg\",\"datePublished\":\"2019-05-06T09:20:49+00:00\",\"dateModified\":\"2019-05-06T09:20:49+00:00\",\"description\":\"Members of the defense committee:Prof Dr. Jean-S\u00e9bastien Coron, Universit\u00e9 du Luxembourg, chairmanDr Dimiter Ostrev, Universit\u00e9 du Luxembourg, vice-chairmanProf Dr. Peter Y.A. Ryan, Universit\u00e9 du Luxembourg, supervisorProf Dr. Michel Abdalla, \u00a0ENS Paris \u00a0memberDr Steve Kremer, INRIA Nancy, member\",\"breadcrumb\":{\"@id\":\"https:\/\/www.uni.lu\/fr\/events\/phd-defense-provable-security-analysis-for-the-password-authenticated-key-exchange-problem\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.uni.lu\/fr\/events\/phd-defense-provable-security-analysis-for-the-password-authenticated-key-exchange-problem\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.uni.lu\/fr\/events\/phd-defense-provable-security-analysis-for-the-password-authenticated-key-exchange-problem\/#primaryimage\",\"url\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2019\/05\/default.jpg\",\"contentUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2019\/05\/default.jpg\",\"width\":1500,\"height\":1125},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.uni.lu\/fr\/events\/phd-defense-provable-security-analysis-for-the-password-authenticated-key-exchange-problem\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.uni.lu\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Events\",\"item\":\"https:\/\/www.uni.lu\/fr\/events\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"PhD Defense: Provable Security Analysis for the Password Authenticated Key-Exchange Problem\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.uni.lu\/fr\/#website\",\"url\":\"https:\/\/www.uni.lu\/fr\/\",\"name\":\"Uni.lu\",\"description\":\"Universit\u00e9 du Luxembourg\",\"publisher\":{\"@id\":\"https:\/\/www.uni.lu\/fr\/#organization\"},\"alternateName\":\"Universit\u00e9 du Luxembourg\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.uni.lu\/fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.uni.lu\/fr\/#organization\",\"name\":\"Universit\u00e9 du Luxembourg\",\"alternateName\":\"Uni.lu\",\"url\":\"https:\/\/www.uni.lu\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.uni.lu\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/03\/03120045\/UNIV_SM-Profile_1600x1600px-scaled.jpg\",\"contentUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/03\/03120045\/UNIV_SM-Profile_1600x1600px-scaled.jpg\",\"width\":2560,\"height\":2560,\"caption\":\"Universit\u00e9 du Luxembourg\"},\"image\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/04\/24120552\/20200609-Belval-Campus_Henri-Goergen-23.jpg\",\"sameAs\":[\"https:\/\/www.facebook.com\/uni.lu\",\"https:\/\/www.linkedin.com\/school\/university-of-luxembourg\/\",\"https:\/\/www.instagram.com\/uni.lu\",\"https:\/\/www.youtube.com\/@uni_lu\",\"https:\/\/en.wikipedia.org\/wiki\/University_of_Luxembourg\"],\"email\":\"communication@uni.lu\",\"telephone\":\"+352 46 66 44 1\",\"address\":{\"@type\":\"PostalAddress\",\"streetAddress\":\"2, place de l\u2019Universit\u00e9\",\"addressLocality\":\"Esch-sur-Alzette\",\"postalCode\":\"4365\",\"addressCountry\":\"LU\"},\"description\":\"Universit\u00e9 du Luxembourg\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"PhD Defense: Provable Security Analysis for the Password Authenticated Key-Exchange Problem - Universit\u00e9 du Luxembourg","description":"Members of the defense committee:Prof Dr. Jean-S\u00e9bastien Coron, Universit\u00e9 du Luxembourg, chairmanDr Dimiter Ostrev, Universit\u00e9 du Luxembourg, vice-chairmanProf Dr. Peter Y.A. Ryan, Universit\u00e9 du Luxembourg, supervisorProf Dr. Michel Abdalla, \u00a0ENS Paris \u00a0memberDr Steve Kremer, INRIA Nancy, member","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.uni.lu\/fr\/events\/phd-defense-provable-security-analysis-for-the-password-authenticated-key-exchange-problem\/","og_locale":"fr_FR","og_type":"article","og_title":"PhD Defense: Provable Security Analysis for the Password Authenticated Key-Exchange Problem","og_description":"Members of the defense committee:Prof Dr. Jean-S\u00e9bastien Coron, Universit\u00e9 du Luxembourg, chairmanDr Dimiter Ostrev, Universit\u00e9 du Luxembourg, vice-chairmanProf Dr. Peter Y.A. Ryan, Universit\u00e9 du Luxembourg, supervisorProf Dr. Michel Abdalla, \u00a0ENS Paris \u00a0memberDr Steve Kremer, INRIA Nancy, member","og_url":"https:\/\/www.uni.lu\/fr\/events\/phd-defense-provable-security-analysis-for-the-password-authenticated-key-exchange-problem\/","og_site_name":"UNI FR","article_publisher":"https:\/\/www.facebook.com\/uni.lu","og_image":[{"width":2560,"height":2560,"url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/03\/03120045\/UNIV_SM-Profile_1600x1600px-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.uni.lu\/fr\/events\/phd-defense-provable-security-analysis-for-the-password-authenticated-key-exchange-problem\/","url":"https:\/\/www.uni.lu\/fr\/events\/phd-defense-provable-security-analysis-for-the-password-authenticated-key-exchange-problem\/","name":"PhD Defense: Provable Security Analysis for the Password Authenticated Key-Exchange Problem - Universit\u00e9 du Luxembourg","isPartOf":{"@id":"https:\/\/www.uni.lu\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.uni.lu\/fr\/events\/phd-defense-provable-security-analysis-for-the-password-authenticated-key-exchange-problem\/#primaryimage"},"image":{"@id":"https:\/\/www.uni.lu\/fr\/events\/phd-defense-provable-security-analysis-for-the-password-authenticated-key-exchange-problem\/#primaryimage"},"thumbnailUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2019\/05\/default.jpg","datePublished":"2019-05-06T09:20:49+00:00","dateModified":"2019-05-06T09:20:49+00:00","description":"Members of the defense committee:Prof Dr. Jean-S\u00e9bastien Coron, Universit\u00e9 du Luxembourg, chairmanDr Dimiter Ostrev, Universit\u00e9 du Luxembourg, vice-chairmanProf Dr. Peter Y.A. Ryan, Universit\u00e9 du Luxembourg, supervisorProf Dr. Michel Abdalla, \u00a0ENS Paris \u00a0memberDr Steve Kremer, INRIA Nancy, member","breadcrumb":{"@id":"https:\/\/www.uni.lu\/fr\/events\/phd-defense-provable-security-analysis-for-the-password-authenticated-key-exchange-problem\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.uni.lu\/fr\/events\/phd-defense-provable-security-analysis-for-the-password-authenticated-key-exchange-problem\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.uni.lu\/fr\/events\/phd-defense-provable-security-analysis-for-the-password-authenticated-key-exchange-problem\/#primaryimage","url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2019\/05\/default.jpg","contentUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2019\/05\/default.jpg","width":1500,"height":1125},{"@type":"BreadcrumbList","@id":"https:\/\/www.uni.lu\/fr\/events\/phd-defense-provable-security-analysis-for-the-password-authenticated-key-exchange-problem\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.uni.lu\/fr\/"},{"@type":"ListItem","position":2,"name":"Events","item":"https:\/\/www.uni.lu\/fr\/events\/"},{"@type":"ListItem","position":3,"name":"PhD Defense: Provable Security Analysis for the Password Authenticated Key-Exchange Problem"}]},{"@type":"WebSite","@id":"https:\/\/www.uni.lu\/fr\/#website","url":"https:\/\/www.uni.lu\/fr\/","name":"Uni.lu","description":"Universit\u00e9 du Luxembourg","publisher":{"@id":"https:\/\/www.uni.lu\/fr\/#organization"},"alternateName":"Universit\u00e9 du Luxembourg","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.uni.lu\/fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.uni.lu\/fr\/#organization","name":"Universit\u00e9 du Luxembourg","alternateName":"Uni.lu","url":"https:\/\/www.uni.lu\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.uni.lu\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/03\/03120045\/UNIV_SM-Profile_1600x1600px-scaled.jpg","contentUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/03\/03120045\/UNIV_SM-Profile_1600x1600px-scaled.jpg","width":2560,"height":2560,"caption":"Universit\u00e9 du Luxembourg"},"image":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/04\/24120552\/20200609-Belval-Campus_Henri-Goergen-23.jpg","sameAs":["https:\/\/www.facebook.com\/uni.lu","https:\/\/www.linkedin.com\/school\/university-of-luxembourg\/","https:\/\/www.instagram.com\/uni.lu","https:\/\/www.youtube.com\/@uni_lu","https:\/\/en.wikipedia.org\/wiki\/University_of_Luxembourg"],"email":"communication@uni.lu","telephone":"+352 46 66 44 1","address":{"@type":"PostalAddress","streetAddress":"2, place de l\u2019Universit\u00e9","addressLocality":"Esch-sur-Alzette","postalCode":"4365","addressCountry":"LU"},"description":"Universit\u00e9 du Luxembourg"}]}},"_links":{"self":[{"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/events\/7732"}],"collection":[{"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/events"}],"about":[{"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/types\/events"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/comments?post=7732"}],"version-history":[{"count":0,"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/events\/7732\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/media\/7733"}],"wp:attachment":[{"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/media?parent=7732"}],"wp:term":[{"taxonomy":"events-topic","embeddable":true,"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/events-topic?post=7732"},{"taxonomy":"events-type","embeddable":true,"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/events-type?post=7732"},{"taxonomy":"organisation","embeddable":true,"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/organisation?post=7732"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}