[1] |
DIFFE W, HELLMAN M.New Directions in Cryptography[J]. IEEE Transactions on Information Theory. 1976, 22(6): 644-654.
|
[2] |
LAUTER K, MITYAGIN A.Security Analysis of KEA Authenticated Key Exchange Protocol[C]//IACR. 9th International Conference on Theory and Practice of Public-Key Cryptography, April 24-26, 2006, New York, USA. Berlin: Springer, 2006: 378-394.
|
[3] |
USTAOGLU B.Obtaining a Secure and Efficient Key Agreement Protocol from (H) MQV and NAXOS[J]. Designs, Codes and Cryptography, 2008, 46(3): 329-342.
|
[4] |
SHAMIR A.Identity-based Cryptosystems and Signature Schemes[J]. Lecture Notes in Computer Science, 1985, 21(2): 47-53.
|
[5] |
李强,冯登国,张立武,等. 标准模型下增强的基于属性的认证密钥协商协议[J]. 计算机学报,2013,36(10):2156-2167.
|
[6] |
WATERS B.Ciphertext-policy Attribute-based Encryption: An Expressive, Efficient, and Provably Secure Realization[C]//IACR. 14th International Conference on Practice and Theory in Public Key Cryptography, March 6-9, 2011, Taormina, Italy. Heidelberg: Springer, 2011: 53-70.
|
[7] |
ISLAM S K H, BISWAS G P. A Pairing-free Identity-based Authenticated Group Key Agreement Protocol for Imbalanced Mobile Networks[J]. Annals of Telecommunications-annales Des Télécommunications, 2012, 67(11): 547-558.
|
[8] |
TAN Z.An Efficient Pairing-free Identity,based Authenticated Group Key Agreement Protocol[J]. International Journal of Communication Systems, 2015, 28(3): 534-545.
|
[9] |
WU Zhenyu, LEE Y C, LAI Feipei, et al.A Secure Authentication Scheme for Telecare Medicine Information Systems[J]. Journal of Medical Systems, 2012, 36(3): 1529-1535.
|
[10] |
HE Debiao, CHEN Jianhua, ZHANG Rui.A More Secure Authentication Scheme for Telecare Medicine Information Systems[J]. Journal of Medical Systems, 2012, 36(3): 1989-1995.
|
[11] |
WEI Jianghong, HU Xuexian, LIU Wenfen.An Improved Authentication Scheme for Telecare Medicine Information Systems[J]. Journal of Medical Systems, 2012, 36(6): 3597-3604.
|
[12] |
张延红,陈明. 标准模型下强安全的无证书认证密钥协商协议[J]. 四川大学学报:工程科学版,2013(1):125-132.
|
[13] |
CAO Xuefei, KOU Weidong, YU Yong, et al.Identity-based Authenticated Key Agreement Protocols without Bilinear Pairings[J]. IEICE Transactions on Fundamentals of Electronics Communications& Computer Sciences, 2008, 91(12): 3833-3836.
|
[14] |
袁艳祥,游林. 基于身份加密的可认证密钥协商协议[J]. 信息网络安全,2014(3):1-6.
|
[15] |
SUN Haiyan, WEN Qiaoyan, ZHANG Hua, et al.A Strongly Secure Identity,based Authenticated Key Agreement Protocol without Pairings under the GDH Assumption[J]. Security and Communication Networks, 2015, 8(17): 3167-3179.
|
[16] |
NI Liang, CHEN Gongliang, LI Jianhua, et al. Strongly Secure Identity-based Authenticated Key Agreement Protocols without Bilinear Pairings[EB/OL]. .
|
[17] |
CAO Xuefei, KOU Weidong, DU Xiaoni.A Pairing-free Identity-based Authenticated key Agreement Protocol with Minimal Message Exchanges[J]. Information Sciences, 2010, 180(15): 2895-2903.
|
[18] |
ISLAM S K H, BISWAS G P. An Improved Pairing-free Identity-based Authenticated Key Agreement Protocol Based on ECC[J]. Procedia Engineering, 2012, 30(4): 499-507.
|
[19] |
秦志光,包文意,赵洋,等. 云计算里的一种无双线性对的模糊关键字加密方式[J]. 信息网络安全,2015(11):1-6.
|
[20] |
朱辉,李晖,王育民. 不使用双线性对的无证书签密方案[J]. 计算机研究与发展,2010,47(9):1587-1594.
|
[21] |
赵洋,任化强,熊虎,等. 无双线性对的云数据完整性验证方案[J].信息网络安全,2015(7):7-12.
|