[1] |
DWORK C, NAOR M, SAHAI A.Concurrent zero-knowledge[J]. Journal of the ACM, 1999, 51(6):851-898.
|
[2] |
LIU Dan, LIU Chang, SONG Qiao.Identity-based secure email system[J]. Netinfo Security, 2010,10(5):64-66.
|
|
刘丹,刘畅,宋樵.基于身份的安全电子邮件系统[J].信息网络安全,2010,10(5):64-66.
|
[3] |
CAO Tianjie, LIN Dongdai, XUE Rui.An Efficient ID-Based Deniable Authentication Protocol from Pairings[C]//IEEE. 19th International Conference on Advanced Information Networking and Applications. March 28-30 ,2005, Taipei,China.New York:IEEE, 2005:388-391
|
[4] |
CHOU J S, CHEN Yalin,HUANG Jincheng.A ID-Based Deniable Authentication Protocol on Pairings[J]. Economic Theory, 2006, 26(2):347.
|
[5] |
WANG Bin, SONG Zhaoxia.A Non-interactive Deniable Authentication Scheme Based on Designated Verifier Proofs[J]. Information Sciences, 2009, 179(6):858-865.
|
[6] |
LI F, XIONG P,JIN C.Identity-based Deniable Authentication for Ad-hoc Networks[M].New York:Springer-Verlag New York, Inc, 2014.
|
[7] |
YU Xingjie, GAO Neng, JIANG Weiyu.Research on Identity Authentication Technology in Cloud Computin[J]. Netinfo Security, 2012,12(8):71-74.
|
|
余幸杰, 高能, 江伟玉. 云计算中的身份认证技术研究[J]. 信息网络安全, 2012,12(8):71-74.
|
[8] |
WU Weifeng,LI Fagen.An Efficient Identity-Based Deniable Authenticated Encryption Scheme[J]. Ksii Transactions on Internet & Information Systems, 2015, 9(5):1904-1919.
|
[9] |
LI Fagen, ZHENG Zhaohui, JIN Chunhua.Identity-based Deniable Authenticated Encryption and Its Application to E-mail System[J]. Telecommunication Systems, 2016, 62(4):625-639.
|
[10] |
JIN Chunhua.Resrarch on Authentication Protocols with Special Properties and Their Applictions[D].ChengDu: University of Electronic Science and Technology,2016
|
|
金春花. 具有特殊性质的认证协议设计及应用研究[D].成都:电子科技大,2016.
|
[11] |
JIN Chunhua, ZHAO Jianyang.Efficient and Short Identity-Based Deniable Authenticated Encryption[C]//ICCCS. Cloud Computing and Security: Third International Conference, June 16-18,2017 ,Nanjing, China. New York:IEEE,2017 Part II:244-255.
|
[12] |
CHEN Yameng, CHENG Xiangguo, WANG Shuo, et al.Research on Certificateless Group Signature Scheme Based on Bilinear Pairing[J]. Netinfo Security, 2017,17(3):53-58.
|
|
陈亚萌,程相国,王硕,等.基于双线性对的无证书群签名方案研究[J].信息网络安全,2017,17(3):53-58.
|
[13] |
GENTRY C.Certificate-based Encryption and the Certificate Revocation Problem[C]//EUROCRYPT 2003.International Conference on Theory and Applications of Cryptographic Techniques, May 4-8, 2003,Warsaw, Poland. Berlin, Heidelberg:Springer, 2003:272-293.
|
[14] |
LIU J K, BARK J, SUSILO W, et al.Certificate-Based Signature Schemes without Pairings or Random Oracles[C]// ISC .11th International Conference on Information Security, September 15-18, 2008, Taipei, China. Berlin, Heidelberg:Springer, 2008:285-297.
|
[15] |
POINTCHEVALl D,STERN J.Security Arguments for Digital Signatures and Blind Signatures[J]. Journal of Cryptology, 2000, 13(3):361-396.
|