{"component": "clause", "props": {"groups": [{"size": 2, "snippet": "CoCoA and Partial Updates", "samples": [{"hash": "4TIUIednlZG", "uri": "/contracts/4TIUIednlZG#the-protocol", "label": "Concurrent Continuous Group Key Agreement", "score": 29.1621241586, "published": true}, {"hash": "lrLp1vGkkG0", "uri": "/contracts/lrLp1vGkkG0#the-protocol", "label": "Concurrent Continuous Group Key Agreement", "score": 25.0752908966, "published": true}], "snippet_links": [], "hash": "aa618adbb1f9100fc6929bf5c58b347b", "id": 1}, {"size": 2, "snippet": "The protocol can be formally speci ed by an e ciently computable function", "samples": [{"hash": "9P0c89xrX71", "uri": "/contracts/9P0c89xrX71#the-protocol", "label": "Authentication and Key Agreement Protocol", "score": 19.0, "published": true}, {"hash": "6cpBkIzd6IG", "uri": "/contracts/6cpBkIzd6IG#the-protocol", "label": "Authentication and Key Agreement Protocol", "score": 19.0, "published": true}], "snippet_links": [{"key": "an-e", "type": "clause", "offset": [41, 45]}], "hash": "db05696a4c52fbcc6c96cdde0a615f87", "id": 2}, {"size": 2, "snippet": "Based on Scheme 1 and the n-DHI assumption, we formulate a two-party key agreement protocol that is secure in the AM. The proof of the security is in fact very similar to the proof of Theorem 8 in [8]. The established session key is often required as a binary string. Since we have no requirements for the representations of the algebras, we assume that for any particular representation of an algebra A, there is an injective public function B that maps elements of the algebra to binary strings. This function can be used to derive a valid session key.\nProtocol 1. Common information: a member (Ak, Bk, Kk) from a family of algebras and homomorphisms An \u2192 B and an injective function B : Bk \u2192 {0, 1}\u2217.\nStep 1: The principal Pi on input (Pi, Pj, s, initiator) \u2022 randomly samples a sequence (a1, a2, . . . , an) of distinct elements of Ak such that Ak is generated by these elements, \u2022 randomly samples a homomorphism \u03b1 \u2208 Kk, \u2022 computes \u03b1(a1), \u03b1(a2), . . . , \u03b1(an), \u2022 transmits (Pi, Pj, s, (a1, \u03b1(a1)), (a2, \u03b1(a2)), . . . , (an, \u03b1(an))) to Pj.\nStep 2: After receiving (Pi, Pj, s, (a1, \u03b1(a1)), (a2, \u03b1(a2)), . . . , (an, \u03b1(an))), the responder Pj randomly applies the finitary operations of Bk on \u03b1(a1), \u03b1(a2), . . . , \u03b1(an) to obtain an element \u03b1(b), applies the corresponding sequence of operations of Ak on a1, a2, . . . , an \u2022 transmits (Pj, Pi, s, b) to Pi, \u2022 computes B(\u03b1(b)), \u2022 erases \u03b1(b), \u2022 outputs the session key B(\u03b1(b)) under the session identifier s.\nStep 3: After receiving (Pj, Pi, s, b), the principal Pi \u2022 computes B(\u03b1(b)), \u2022 outputs the session key B(\u03b1(b)) under the session identifier s.", "samples": [{"hash": "4WPmY7Ihg1G", "uri": "/contracts/4WPmY7Ihg1G#the-protocol", "label": "Key Agreement Protocol", "score": 20.3002496006, "published": true}, {"hash": "G33F4HrGza", "uri": "/contracts/G33F4HrGza#the-protocol", "label": "Key Agreement Protocol", "score": 20.1759069131, "published": true}], "snippet_links": [{"key": "based-on", "type": "clause", "offset": [0, 8]}, {"key": "scheme-1", "type": "definition", "offset": [9, 17]}, {"key": "agreement-protocol", "type": "clause", "offset": [73, 91]}, {"key": "the-security", "type": "clause", "offset": [131, 143]}, {"key": "similar-to", "type": "definition", "offset": [160, 170]}, {"key": "proof-of-theorem", "type": "clause", "offset": [175, 191]}, {"key": "session-key", "type": "definition", "offset": [218, 229]}, {"key": "requirements-for-the", "type": "clause", "offset": [285, 305]}, {"key": "representations-of-the", "type": "clause", "offset": [306, 328]}, {"key": "common-information", "type": "definition", "offset": [567, 585]}, {"key": "a-member", "type": "clause", "offset": [587, 595]}, {"key": "a-family", "type": "definition", "offset": [614, 622]}, {"key": "step-1", "type": "clause", "offset": [704, 710]}, {"key": "the-principal", "type": "definition", "offset": [712, 725]}, {"key": "step-2", "type": "definition", "offset": [1044, 1050]}, {"key": "after-receiving", "type": "clause", "offset": [1052, 1067]}, {"key": "sequence-of-operations", "type": "clause", "offset": [1276, 1298]}, {"key": "step-3", "type": "clause", "offset": [1462, 1468]}], "hash": "b5698e419e42f2941f32dfd51b510996", "id": 3}, {"size": 2, "snippet": "The Protocol for the ShORe Trial (the \u201cShORe Protocol\u201d) existing on the Original Effective Date is set forth on Schedule \u200e2.2.1(a) hereto. The Protocol for the COAST Trial (the \u201cCOAST Protocol\u201d) existing on the Original Effective Date is set forth on Schedule \u200e2.2.1(b) hereto.", "samples": [{"hash": "9vcw86YWfHK", "uri": "/contracts/9vcw86YWfHK#the-protocol", "label": "Development Funding Agreement (Opthea LTD)", "score": 35.6611909651, "published": true}], "snippet_links": [{"key": "original-effective-date", "type": "definition", "offset": [72, 95]}, {"key": "on-schedule", "type": "definition", "offset": [109, 120]}], "hash": "b46494313ccb32f9972b47f091cc88a3", "id": 4}, {"size": 2, "snippet": "The Corporation must issue a Verification Document to \u2587\u2587\u2587 \u2587\u2587\u2587 Wurrung members who propose to carry out any activities pursuant to an instrument referred to in item 1. The Verification Document must comply with the requirements in this Schedule 19. The Verification Document must be indelible and must be issued and administered by the Corporation. The Verification Document shall be sufficient to establish an individual\u2019s entitlement to the terms and conditions of the Authorisation Orders and the Exemption and include the following details of the holder: name residential address date of birth; and a unique emblem or insignia of \u2587\u2587\u2587 \u2587\u2587\u2587 Wurrung membership. The Corporation agrees to maintain an accurate register of those \u2587\u2587\u2587 \u2587\u2587\u2587 Wurrung members to whom the Verification Document has been issued. When requested by Authorised Officers, the Corporation agrees to confirm, by reference to this register, whether or not an individual is the holder of the Verification Document. The State will respect the privacy of the members of the \u2587\u2587\u2587 \u2587\u2587\u2587 Wurrung and will comply with the Information Privacy Act 2000 (Vic) and the Privacy \u2587\u2587\u2587 \u2587\u2587\u2587\u2587 (Cth). When an Authorised Officer encounters an individual asserting entitlement to access and use natural resources or carry out activities in accordance with an Authorisation Order or the Exemption, the Authorised Officer will verify the individual\u2019s membership by inspecting the Verification Document. The Authorised Officer may act to ensure compliance with the Authorisation Order or the exemption. If the individual fails to produce the Verification Document to establish his or her entitlement under the Authorisation Orders or the Exemption, the Authorised Officer may act in accordance with his or her statutory duties. The State and the Corporation agree to review the operation of the verification protocol, when either Party requests this in writing. Variations and new Authorisation Orders etc (Clause (b) and 6.8)", "samples": [{"hash": "ji2MhD5Mvmy", "uri": "/contracts/ji2MhD5Mvmy#the-protocol", "label": "Recognition and Settlement Agreement", "score": 30.7296200809, "published": true}], "snippet_links": [{"key": "pursuant-to", "type": "definition", "offset": [118, 129]}, {"key": "item-1", "type": "definition", "offset": [159, 165]}, {"key": "the-requirements", "type": "clause", "offset": [210, 226]}, {"key": "schedule-19", "type": "definition", "offset": [235, 246]}, {"key": "by-the-corporation", "type": "clause", "offset": [328, 346]}, {"key": "to-establish", "type": "clause", "offset": [394, 406]}, {"key": "an-individual", "type": "clause", "offset": [407, 420]}, {"key": "entitlement-to", "type": "clause", "offset": [423, 437]}, {"key": "terms-and-conditions-of-the", "type": "clause", "offset": [442, 469]}, {"key": "the-holder", "type": "clause", "offset": [546, 556]}, {"key": "residential-address", "type": "definition", "offset": [563, 582]}, {"key": "date-of-birth", "type": "clause", "offset": [583, 596]}, {"key": "to-maintain", "type": "clause", "offset": [684, 695]}, {"key": "requested-by", "type": "definition", "offset": [806, 818]}, {"key": "authorised-officers", "type": "definition", "offset": [819, 838]}, {"key": "reference-to", "type": "definition", "offset": [878, 890]}, {"key": "the-state", "type": "clause", "offset": [979, 988]}, {"key": "the-\u2587", "type": "clause", "offset": [1032, 1037]}, {"key": "act-2000", "type": "clause", "offset": [1097, 1105]}, {"key": "access-and-use", "type": "clause", "offset": [1221, 1235]}, {"key": "natural-resources", "type": "definition", "offset": [1236, 1253]}, {"key": "in-accordance-with", "type": "definition", "offset": [1278, 1296]}, {"key": "the-authorised-officer", "type": "clause", "offset": [1338, 1360]}, {"key": "the-individual", "type": "clause", "offset": [1373, 1387]}, {"key": "compliance-with-the", "type": "clause", "offset": [1483, 1502]}, {"key": "statutory-duties", "type": "clause", "offset": [1748, 1764]}, {"key": "agree-to", "type": "clause", "offset": [1796, 1804]}, {"key": "operation-of-the", "type": "clause", "offset": [1816, 1832]}, {"key": "verification-protocol", "type": "clause", "offset": [1833, 1854]}, {"key": "party-requests", "type": "clause", "offset": [1868, 1882]}, {"key": "in-writing", "type": "clause", "offset": [1888, 1898]}], "hash": "2b089ff396096e125250b7622e580184", "id": 5}, {"size": 1, "snippet": "The Company reserves the right to amend the Protocol at any time, any such amendment submitted by the Company to be pre-approved in writing by C-G and the EC. C-G and the Study Staff shall not deviate from any aspect of the Protocol without the prior written consent of the Company, except where necessary to protect the safety or welfare of Study Subjects. In such event, the Investigator shall promptly notify the Company and its designee of such deviation and any requested changes to the ICF, which changes must be approved by the Company in advance.", "samples": [{"hash": "8ydcf9xe8QU", "uri": "/contracts/8ydcf9xe8QU#the-protocol", "label": "Research Agreement (Enlivex Therapeutics Ltd.)", "score": 31.3271731691, "published": true}], "snippet_links": [{"key": "the-right-to-amend", "type": "clause", "offset": [21, 39]}, {"key": "at-any-time", "type": "clause", "offset": [53, 64]}, {"key": "by-the-company", "type": "clause", "offset": [95, 109]}, {"key": "in-writing", "type": "clause", "offset": [129, 139]}, {"key": "study-staff", "type": "clause", "offset": [171, 182]}, {"key": "consent-of-the-company", "type": "clause", "offset": [259, 281]}, {"key": "where-necessary", "type": "definition", "offset": [290, 305]}, {"key": "the-safety", "type": "clause", "offset": [317, 327]}, {"key": "study-subjects", "type": "definition", "offset": [342, 356]}, {"key": "the-investigator", "type": "clause", "offset": [373, 389]}, {"key": "notify-the", "type": "clause", "offset": [405, 415]}, {"key": "changes-to-the", "type": "definition", "offset": [477, 491]}, {"key": "approved-by", "type": "definition", "offset": [519, 530]}, {"key": "in-advance", "type": "clause", "offset": [543, 553]}], "hash": "b51b28ac819f4fc254779eae6dc1bbad", "id": 6}, {"size": 1, "snippet": "The Montreal Protocol represented a landmark in the international environmentalist movement. For the first time whole countries were legally bound to reducing and eventually phasing out altogether the use of CFCs and other ozone depleting chemicals. Failure to comply was accompanied by stiff penalties. The original Protocol aimed to decrease the use of chemical compounds destructive to ozone in the upper atmosphere by 50% by the year 1999. The agreement was supplemented by agreements made in London in 1990 and in Copenhagen in 1992, by which the same countries promised to stop using CFCs and most of the other chemical compounds destructive to ozone by the end of 1995. The Protocol has been subsequently amended twice more, at Montreal in 1997 and at Beijing in 1999. In most cases it has been fairly easy to develop and introduce compounds and methods to replace CFC compounds. CFC use in aerosols and foam plastic packaging has already been abandoned in most countries. On the other hand, compounds capable of replacing CFC compounds in cooling devices and insulating materials are still under development. In order to deal with the special difficulties experienced by developing countries it was agreed that they would be given 10 years grace, so long as their use of CFCs did not grow significantly. China and India, for example, are strongly increasing the use of air conditioning and cooling devices. Using CFC compounds in these devices would be cheaper than using replacement compounds harmless to ozone. An international fund has therefore been set up to help these countries to introduce new and environmentally more friendly technologies and chemicals. The depletion of the ozone layer is a world-wide problem which does not respect the frontiers between different countries. It can only be affected through determined international co-operation. CFCs (11, 12, 113, 114, 115): Phase down 1986 levels by 20% by 1994; 50% by 1999. CFCs 13, 111, 112, 211, 212, 213, 214, 215, 216, 217: Phase down 1989 levels 20% by 1993; 85% by 1997; 100% by 2000. Halons (1211, 1301, 2402): Phase down 1986 levels 50% by 1995; 100% by 2000. Carbon Tetrachloride: Phase down 1989 levels 85% by 1995; 100% by 2000.", "samples": [{"hash": "jRehUvRuBVg", "uri": "/contracts/jRehUvRuBVg#the-protocol", "label": "Montreal Protocol", "score": 16.0, "published": true}], "snippet_links": [{"key": "montreal-protocol", "type": "definition", "offset": [4, 21]}, {"key": "first-time", "type": "definition", "offset": [101, 111]}, {"key": "legally-bound", "type": "clause", "offset": [133, 146]}, {"key": "ozone-depleting-chemicals", "type": "clause", "offset": [223, 248]}, {"key": "failure-to-comply", "type": "definition", "offset": [250, 267]}, {"key": "the-original", "type": "definition", "offset": [304, 316]}, {"key": "the-year", "type": "definition", "offset": [429, 437]}, {"key": "the-agreement", "type": "clause", "offset": [444, 457]}, {"key": "to-develop", "type": "definition", "offset": [814, 824]}, {"key": "foam-plastic", "type": "definition", "offset": [911, 923]}, {"key": "the-other-hand", "type": "clause", "offset": [983, 997]}, {"key": "capable-of", "type": "definition", "offset": [1009, 1019]}, {"key": "under-development", "type": "clause", "offset": [1098, 1115]}, {"key": "in-order-to", "type": "clause", "offset": [1117, 1128]}, {"key": "the-special", "type": "definition", "offset": [1139, 1150]}, {"key": "developing-countries", "type": "definition", "offset": [1179, 1199]}, {"key": "agreed-that", "type": "clause", "offset": [1207, 1218]}, {"key": "for-example", "type": "definition", "offset": [1329, 1340]}, {"key": "air-conditioning", "type": "clause", "offset": [1377, 1393]}, {"key": "replacement-compounds", "type": "clause", "offset": [1480, 1501]}, {"key": "international-fund", "type": "clause", "offset": [1524, 1542]}, {"key": "the-ozone-layer", "type": "definition", "offset": [1689, 1704]}, {"key": "phase-down", "type": "definition", "offset": [1896, 1906]}], "hash": "834920e9d59c63a35b1ebcc39c1dc1c9", "id": 7}, {"size": 1, "snippet": "2.2.1 Sets out the principles that underpin the sharing of information between the Project Sponsors.\n2.2.2 Defines the purposes for which the Project Sponsors have agreed to share information and the types of information that may be shared.\n2.2.3 Describes the join procedures that will be developed and maintained to support implementation of this protocol.\n2.2.4 Describes the security arrangements necessary to ensure confidentially of information.\n2.2.5 Sets out the responsibilities of the organisation to meet the requirements of this protocol.\n2.2.6 Describes how the protocol will be implements, monitored and reviewed.", "samples": [{"hash": "5DsXKrgr5Xk", "uri": "/contracts/5DsXKrgr5Xk#the-protocol", "label": "European Structural Fund Grant Agreement", "score": 22.704312115, "published": true}], "snippet_links": [{"key": "the-principles", "type": "clause", "offset": [15, 29]}, {"key": "sharing-of-information", "type": "clause", "offset": [48, 70]}, {"key": "project-sponsors", "type": "definition", "offset": [83, 99]}, {"key": "purposes-for-which-the", "type": "clause", "offset": [119, 141]}, {"key": "agreed-to", "type": "clause", "offset": [164, 173]}, {"key": "share-information", "type": "clause", "offset": [174, 191]}, {"key": "types-of-information", "type": "clause", "offset": [200, 220]}, {"key": "security-arrangements", "type": "definition", "offset": [379, 400]}, {"key": "to-ensure", "type": "clause", "offset": [411, 420]}, {"key": "responsibilities-of-the-organisation", "type": "clause", "offset": [471, 507]}, {"key": "the-requirements", "type": "clause", "offset": [516, 532]}], "hash": "93666bb073064ccc9ed8f1586dbd951c", "id": 8}, {"size": 1, "snippet": "Each party i distributes all messages Mi it re- ceived from s. Then all parties except s run Ph recursively to agree on Mi and form trust graphs based on the agreed Mi\u2019s. Let n be the minimal number of parties for which the guarantee for Ph can fail. Then the agreement on Mi succeeds unless s is compliant and i faulty. Thus, the compliant parties always form a clique, and if s is not among them, the graphs are identical. Then each party with a path to Sm outputs m, or 0, if no such paths exist. The agreement can fail only if a path connects both Sm. As per Section 4.1, this contradicts 2f < kh. References [STOC] Proceedings of the Annual ACM Sym- posium on Theory of Computing. [1] \u2587. \u2587\u2587\u2587\u2587\u2587\u2587\u2587. Local and Global Properties in Networks of Processors. [STOC], 1980. pp. 82-93.", "samples": [{"hash": "efT9jJ14uEV", "uri": "/contracts/efT9jJ14uEV#the-protocol", "label": "Byzantine Agreement With Faulty Majority Using Bounded Broadcast", "score": 23.4120465435, "published": true}], "snippet_links": [{"key": "each-party", "type": "clause", "offset": [0, 10]}, {"key": "all-parties", "type": "definition", "offset": [68, 79]}, {"key": "based-on", "type": "clause", "offset": [145, 153]}, {"key": "number-of-parties", "type": "clause", "offset": [192, 209]}, {"key": "the-guarantee", "type": "clause", "offset": [220, 233]}, {"key": "the-agreement", "type": "clause", "offset": [256, 269]}, {"key": "form-a", "type": "clause", "offset": [356, 362]}, {"key": "section-41", "type": "clause", "offset": [563, 574]}, {"key": "the-annual", "type": "clause", "offset": [635, 645]}], "hash": "ef48e08f1c982970fb1db18efd8ed90e", "id": 9}, {"size": 1, "snippet": "\u2194 { } A,i,b K ... K B,i,b K ... K A,i,b k' A,i,b B,i,b k' B,i,b \u2192\n1. (exchange of the first parts of CSig) A B: RA, SigA(M, RA),\nB A: RB, \u2587\u2587\u2587\u2587(M, RB).\n2. (exchange of encrypted parts of CSig)", "samples": [{"hash": "cnn4PP2uEwn", "uri": "/contracts/cnn4PP2uEwn#the-protocol", "label": "Oblivious Transfer Protocol", "score": 17.0, "published": true}], "snippet_links": [], "hash": "c67c3ea9da18a346878b72a525dfcc23", "id": 10}], "next_curs": "ClUST2oVc35sYXdpbnNpZGVyY29udHJhY3RzcjELEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2IhV0aGUtcHJvdG9jb2wjMDAwMDAwMGEMogECZW4YACAA", "clause": {"title": "The Protocol", "size": 24, "children": [["the-protocol", "The Protocol"], ["changes-to-the-protocol", "Changes to the Protocol"], ["protocol-approval", "Protocol Approval"], ["", ""], ["comparing-oblivious-transfer-implementations", "Comparing Oblivious Transfer Implementations"]], "parents": [["the-protocol", "The Protocol"], ["formal-security-of-key-agreement-protocols", "Formal security of key agreement protocols"], ["definitions", "Definitions"], ["conflicts", "Conflicts"], ["batch-oblivious-transfer", "Batch Oblivious Transfer"]], "id": "the-protocol", "related": [["signaling-protocol", "Signaling protocol", "Signaling protocol"], ["protocol", "Protocol", "Protocol"], ["review-protocol", "Review Protocol", "Review Protocol"], ["testing-procedures", "Testing Procedures", "Testing Procedures"], ["posting-procedure", "Posting Procedure", "Posting Procedure"]], "related_snippets": [], "updated": "2025-07-07T12:37:53+00:00", "also_ask": [], "drafting_tip": null, "explanation": "The Protocol clause defines the specific set of rules, procedures, or standards that govern how parties interact or perform under the agreement. In practice, this clause may reference an established industry protocol, such as a communication or data exchange standard, or set out a custom process for handling certain transactions or events. By clearly identifying the applicable protocol, this clause ensures that all parties operate under a common framework, reducing ambiguity and minimizing the risk of disputes arising from inconsistent practices."}, "json": true, "cursor": ""}}