[1]SMART N. An ID-based authenticated key agreement protocol based on the Weil pairing [J]. Electronic Letters, 2002, 38(13): 630-632.[2]CHOW M, CHOO R. Strongly-secure identity-based key agreement and anonymous extension [C]// ISC 2007: Proceedings of the 10th International Conference on Information Security, LNCS 4779. Berlin: Springer-Verlag, 2007: 203-220.[3]CHEN L, CHENG Z, SMART N P. Identity-based key agreement protocols from pairings [J]. International Journal of Information Security, 2007, 6(4): 213-241.[4]XIE G. An ID-based key agreement scheme from pairing [EB/OL]. [2011-04-20]. http://eprint.iacr.org/2005/093.pdf.[5]McCULLAGH N, BARRETO P. A new two-party identity-based authenticated key agreement [C]// CT-RSA 2005: Proceedings of the Cryptographers' Track at the RSA Conference 2005, LNCS 3376. Berlin: Springer-Verlag, 2005: 262-274.[6]BELLARE M, ROGAWAY P. Entity authentication and key distribution [C]// CRYPTO'93: Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology, LNCS 773. Berlin: Springer-Verlag, 1993: 110-125.[7]CANETTI R, KRAWCZYK H. Analysis of key-exchange protocols and their use for building secure channels [C]// EUROCRYPT 2001: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology, LNCS 2045. Berlin: Springer-Verlag,2001: 453-474.[8]KRAWCZYK H. HMQV: A high-performance secure Diffie-Hell-man protocol [C]// CRYPTO 2005: Proceedings of the 25th International Cryptology Conference, LNCS 3621. Berlin: Springer-Verlag, 2005: 546-566.[9]LaMACCHIA B A, LAUTER K, MITYAGIN A. Stronger security of authenticated key exchange [C]// ProvSec 2007: Proceedings of the First International Conference on Provable Security, LNCS 4784. Berlin: Springer-Verlag, 2007: 1-16.[10]任勇军,王建东,庄毅.标准模型下增强的基于身份的认证密钥协商协议[J].电子与信息学报,2009,31(8):1900-1905.[11]CASH D, KILTZ E, SHOUP V. The twin Diffie-Hellman problem and applications [J]. Journal of Cryptology, 2009, 22(4): 470-504.[12]CASH D, KILTZ E, SHOUP V. The twin Diffie-Hellman problem and applications [C]// EUROCRYPT 2008: Proceedings of the 27th Annual International Conference on Advances in Cryptology, LNCS 4965. Berlin: Springer-Verlag, 2008: 127-145.[13]HUANG HAI, CAO ZHENFU. An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem [C]// ASIACCS 2009: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, LNCS 4784. Berlin: Springer-Verlag, 2009: 116-126.[14]曹雪菲,寇卫东,樊凯.无双线性对的基于身份的认证密钥协商协议[J].电子与信息学报,2009,31(5):1241-1244.[15]FIORE D, GENNARO R. Making the Diffie-Hellman identity-based [C]// CT-RSA 2010: The Cryptographers' Track at the RSA Conference 2010, LNCS 5985. Berlin: Springer-Verlag, 2010: 165-178.[16]舒剑.强安全的基于身份认证密钥协商协议[J].小型微型计算机系统,2011,32(4):632-638. |