[1]JABLON D P. Strong password-only authenticated key exchange[J]. ACM Computer Communication Review, 1996, 26(5):5-20.[2]CHEN Y C, YEH L Y. An efficient nonce-based authentication scheme with key agreement[J]. Applied Mathematics and Computation, 2005, 169(2): 982-994.[3]BELLOVIN S, MERRITT M. Encrypted key exchange: Password- based protocols secure against dictionary attacks[C]// Proceedings of the 1992 IEEE Symposium on Research in Security and Privacy. Washington, DC, IEEE Computer Society, 1992:72-84.[4]BELLOVIN S, MERRITT M. Augmented encrypted key exchange: Password-based protocol secure against dictionary attacks and password file compromise[C]// Proceedings of the 1st ACM Conference on Computer and Communications Security. New York:ACM, 1993:244-250.[5]BELLARE M, POINTCHEVAL D, ROGAWAY P. Authenticated key exchange secure against dictionary attacks[C]// International Conference on the Theory and Application of Cryptographic Techniques. Berlin:Springer-Verlag, 2000:139-155.[6]BOYKO V, MACKENZIE P, PATEL S. Provably-secure password authentication and key exchange using Diffie-Hellman[C]// EUROCRYPT2000. Berlin:Springer-Verlag, 2000:156-171[7]KATZ J, OSTROVSKY R, YUNG M. Efficient password authentic- ated key exchange using human-memorable passwords[C]// EUROCRYPT 2001. Berlin:Springer-Verlag, 2001.475-494.[8]ABDALLA M, FOUQUE P-A,POINTCHEVAL D. Password-based authenticated key exchange in the three-party setting[C]// Public Key Cryptography, LNCS 3386. Berlin: Springer-Verlag, 2005:65-84.[9]JIANG S Q,GONG G. Password based key exchange with mutual authentication[C]// Proceedings of SAC 2004,LNCS 3357.Berlin: Springer-Verlag, 2004:267-279.[10]SHAO JUN, CAO ZHENFU, WANG LICHENG. Efficient password-based authenticated key exchange without public information[C]// Proceedings of ESORICS 2007, LNCS 4734. Berlin: Springer-Verlag, 2007: 299-310.[11]FENG D G, CHEN W D. Modular approach to the design and analysis of password-based security protocols[J].Science in China: Series F, 2007, 50(3):381-398.[12]Trusted computing group. Trusted computing platform alliance〖CM)〗 (TCPA). Main specification version 1.1b[S], 2001.[13]VIET D Q, YAMAMURA A, TANAKA H. Anonymous password- based authenticated key exchange[C]// Proceedings of INDOCRYPT 2005, LNCS 3797. Berlin: Springer-Verlag, 2005:244-257.[14]YANG J. ZHANG Z. A new anonymous password-based authenticated key exchange protocol[C]// Proceedings of INDOCRYPT 2008, LNCS 5365. Berlin: Springer-Verlag, 2008:200-212.[15]SHIN S H, KOBARA K, IMAI H. A secure threshold anonymous password authenticated key exchange protocol[C]// Crypto 2009, LNCS 4752. Berlin:Springer-Verlag, 2009:444-458.[16]SHERMAN S, M. CHOW, KIM-KWANG R C. Strongly-secure identity-based key agreement and anonymous extension[C]// Proceedings of ISC 2007,LNCS 4779. Berlin:Springer-Verla, 2007: 203-220.[17]关晨至, 石永革. 基于DAA的可信双向匿名认证密钥协商协议[J].计算机系统应用,2009,18(12):59-61,78. |