[1] DIFFIE W, HELLMAN M E. New directions in cryptography[J]. IEEE Transactions on Information Theory,1976,22(6):644-654. [2] INGEMARSSON I, TANG D, WONG C K. A conference key distribution system[J]. IEEE Transactions on Information Theory, 1982, 28(5):714-719. [3] MENEZES A J, VANSTONE S A, OORSCHOT P C V. Handbook of Applied Cryptography[M]. Boca Raton,FL:CRC Press,1997. [4] BURMESTER M, DESMEDT Y. A secure and efficient conference key distribution system[C]//Advances in Cryptology-EUROCRYPT'94. Berlin:Springer, 1995:275-286. [5] STEINER M, TSUDIK G, WAIDNER M. Diffie-Hellman key distribution extended to group communication[C]//Proceedings of the 3rd ACM Conference on Computer and Communications Security. New York:ACM, 1996:31-37. [6] KIM Y, PERRIG A, TSUDIK G. Tree-based group key agreement[J]. ACM Transactions on Information & System Security,2004,7(1):60-96. [7] MAO Y, SUN Y, WU M, et al. JET:dynamic join-exit-tree amortization and scheduling for contributory key management[J]. IEEE/ACM Transactions on Networking, 2006, 14(5):1128-1140. [8] GU X Z, YANG J X, LAN J L, et al. Huffman-based join-exit-tree scheme for contributory key management[J]. Computers & Security, 2009, 28(1):29-39. [9] SHAMIR A. Identity-based cryptosystems and signature schemes[C]//Proceedings of CRYPTO 84. Berlin:Springer,1984:47-53. [10] AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[C]//Proceedings of the 2003 International Conference on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2003:452-473. [11] 张福泰,孙银霞,张磊,等.无证书公钥密码体制研究[J]. 软件学报, 2011, 22(6):1316-1332. (ZHANG F T, SUN Y X, ZHANG L, et al. Research on certificateless public key cryptography[J]. Journal of Software, 2011, 22(6):1316-1332.) [12] SHAO Z H. Efficient authenticated key agreement protocol using self-certified public keys from pairings[J]. Wuhan University Journal of Natural Sciences,2005,10(1):267-270. [13] MANDT T K, TAN C H. Certificateless authenticated two-party key agreement protocols[C]//Proceedings of the 11th Asian Computing Science Conference on Advances in Computer Science:Secure Software and Related Issues. Berlin:Springer, 2006:37-44. [14] WANG S, CAO Z, WANG L. Efficient certificateless authenticated key agreement protocol from pairings[J]. Wuhan University Journal of Natural Sciences, 2006, 11(5):1278-1282. [15] XIA L, WANG S, SHEN J. Breaking and repairing the certificateless key agreement protocol from ASIAN 2006[J]. Wuhan University Journal of Natural Sciences, 2008, 13(5):562. [16] SWANSON C M. Security in key agreement:two-party certificateless schemes[EB/OL].[2018-03-20]. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.843.265&rep=rep1&type=pdf. [17] SWANSON C, JAO D. A study of two-party certificateless authenticated key-agreement protocols[C]//Proceedings of the 10th International Conference on Cryptology in India:Progress in Cryptology. Berlin:Springer, 2009:57-71. [18] LIPPOLD G, BOYD C, NIETO J G. Strongly secure certificateless key agreement[C]//Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography. Berlin:Springer, 2009:206-230. [19] ZHANG L, ZHANG F, WU Q, et al. Simulatable certificateless two-party authenticated key agreement protocol[J]. Information Sciences, 2010, 180(6):1020-1030. [20] 杨浩民,张尧学,周悦芝.基于双线性对的无证书两方认证密钥协商协议[J].清华大学学报(自然科学版),2012,52(9):1293-1297. (YANG H M, ZHANG Y X, ZHOU Y Z. Certificateless two-party authenticated key agreement protocol based on bilinear pairings[J]. Journal of Tsinghua University (Science and Technology), 2012, 52(9):1293-1297.) [21] KERMANSHAHI S K, SALLEH M. An enhanced certificateless cryptosystem for mobile Ad Hoc networks[C]//Proceedings of the 2014 International Symposium on Biometrics and Security Technologies. Piscataway, NJ:IEEE, 2014:176-181. [22] EISSA T. A novel lightweight authentication scheme for mobile Ad Hoc networks[J]. Arabian Journal for Science & Engineering, 2012, 37(8):2179-2192. [23] BAEK J, SAFAVI-NAINI R, SUSILO W. Certificateless public key encryption without pairing[C]//Proceedings of the 8th International Conference on Information Security. Berlin:Springer, 2005:134-148. [24] HE D, CHEN Y, CHEN J, et al. A new two-round certificateless authenticated key agreement protocol without bilinear pairings[J]. Mathematical & Computer Modelling, 2011, 54(11):3143-3152. [25] HE D, PADHYE S, CHEN J. An efficient certificateless two-party authenticated key agreement protocol[J]. Computers & Mathematics with Applications, 2012,64(6):1914-1926. [26] LAMACCHIA B, LAUTER K, MITYAGIN A. Stronger security of authenticated key exchange[C]//Proceedings of the 1st International Conference on Provable Security. Berlin:Springer, 2007:1-16. [27] 刘文浩,许春香.无证书两方密钥协商方案[J]. 软件学报,2011,22(11):2843-2852. (LIU W H, XU C X. Two party certificateless key agreement schemes[J]. Journal of Software, 2011, 22(11):2843-2852.) [28] YANG G, TAN C H. Strongly secure certificateless key exchange without pairing[C]//Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. New York:ACM, 2011:71-79. [29] GENG M, ZHANG F. Provably secure certificateless two-party authenticated key agreement protocol without pairing[C]//Proceedings of the 2009 International Conference on Computational Intelligence and Security. Piscataway, NJ:IEEE, 2010:208-212. [30] HOU M, XU Q. A two-party certificateless authenticated key agreement protocol without pairing[C]//Proceedings of the 20092nd IEEE International Conference on Computer Science and Information Technology. Piscataway, NJ:IEEE, 2009, 3:412-416. [31] SARR A P, ELBAZ-VINCENT P, BAJARD J C. A new security model for authenticated key agreement[C]//Proceedings of the 7th International Conference on Security and Cryptography for Networks. Berlin:Springer, 2010:219-234. [32] SUN H, WEN Q, ZHANG H, et al. A novel pairing-free certificateless authenticated key agreement; protocol with provable security[J]. Frontiers of Computer Science, 2013, 7(4):544-557. [33] HEO S, KIM Z, KIM K. Certificateless authenticated group key agreement protocol for dynamic groups[C]//Proceedings of the 2007 IEEE Global Telecommunications Conference. Piscataway, NJ:IEEE, 2007:464-468. [34] LEE E J, LEE S E, YOO K Y. A certificateless authenticated group key agreement protocol providing forward secrecy[C]//Proceedings of the 2008 International Symposium on Ubiquitous Multimedia Computing. Piscataway, NJ:IEEE, 2008:124-129. [35] SHI Y, LI J. Two-party authenticated key agreement in certificateless public key cryptography[J]. Wuhan University Journal of Natural Sciences, 2007, 12(1):71-74. [36] CAO C, JIANFENG M A, SANGJAE M. Provable efficient certificateless group key exchange protocol[J]. Wuhan University Journal of Natural Sciences, 2007, 12(1):41-45. [37] GENG M, ZHANG F. An improved secure certificateless authenticated group key agreement protocol[C]//Proceedings of the 2009 IEEE International Conference on Intelligent Computing and Intelligent Systems. Piscataway, NJ:IEEE, 2009:337-341. [38] GENG M, ZHANG F, GAO M. A secure certificateless authenticated group key agreement protocol[C]//Proceedings of the 2009 International Conference on Multimedia Information Networking and Security. Washington, DC:IEEE Computer Society, 2009:342-346. [39] GAO M, ZHANG F, GENG M. An efficient certificateless authenticated tripartite key agreement protocol[C]//Proceedings of the 2009 International Conference on Management and Service Science. Piscataway, NJ:IEEE, 2009:1-4. [40] TENG J, WU C. A provable authenticated certificateless group key agreement with constant rounds[J]. Journal of Communications & Networks, 2012, 14(1):104-110. [41] GU X, XU T, ZHOU W, et al. A pairing-free certificateless authenticated group key agreement protocol[C]//Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications. Piscataway, NJ:IEEE, 2014:510-513. [42] GU X, CAO Z, WANG Y. How to get group key efficiently in mobile Ad Hoc networks?[C]//Proceedings of the 2015 IEEE Military Communications Conference. Piscataway, NJ:IEEE, 2015:1009-1014. [43] KUMAR A, TRIPATHI S. A pairing free anonymous certificateless group key agreement protocol for dynamic group[J]. Wireless Personal Communications, 2015, 82(2):1027-1045. |