[1]
DIFFIE W,HELLMAN M E.New directions in cryptography[J].IEEE Transactions on Information Theory,1976,22(6):644-654.
[2]
MATSUMOTO T, TAKASHIMA Y, IMAI H. On seeking smart public-key distribution systems[J]. Transactions on IECE, 1986,69(2): 99-106.
[3]
MENEZES A,QU M,VANSTONE S.Some new key agreement protocols providing mutual implicit authentication[C]// SAC95:Proceedings of the Second Workshop on Selected Areas in Cryptography.New York:ACM,1995:22-32.
[4]
LAW L,MENEZES A,QU M,et al.An efficient protocol for authenticated key agreement[J].Designs,Codes and Cryptography,2003,28(2):119-134.
[5]
KRAWCZYK H. HMQV: A high-performance secure Diffie-Hell-man protocol [C]// CRYPTO 2005: Proceedings of the 25th International Cryptology Conference, LNCS 3621. Berlin: Springer-Verlag, 2005: 546-566.
[6]
赵建杰, 谷大武. eCK模型下可证明安全的双方认证密钥协商协议[J]. 计算机学报, 2011, 34 (1): 47-54.
[7]
LAMACCHIA B, LAUTER K, MITYAGIN A. Stronger security of authenticated key exchange [C]// Proceedings of the 1st International Conference on Provable Security. Berlin: Springer-Verlag, 2007: 1-16.
[8]
LAUTER K, MITYAGIN A. Security analysis of KEA authenticated key exchange protocol[C]// Public Key Cryptography 2006,LNCS 3958.Berlin:Springer,2006: 378-39.
[9]
杨小东, 王彩芬. 前向安全的单向门限代理重签名[J]. joca, 2011, 31(3): 801-804.
[10]
高海英. 高效的基于身份的认证密钥协商协议[J]. joca, 2012, 32(1):35-37.
[11]
周四方. 一种新的双方认证密钥协商协议的安全性分析[J]. joca, 2011, 31(11):2994-2996.
[12]
侯孟波,徐秋亮. 身份基认证密钥协商协议的分析与改进[J]. 计算机工程与应用, 2010, 46(7):25-28. |