[1] FORNO R, FENBLOOM W. PKI: a question of trust and value [J]. Communication of the ACM, 2001, 44(6): 120. [2] SHI W. Research and application of the key technology of PKI and IBE [D]. Beijing: Beijing University of Posts and Telecommunications, 2006.(侍伟敏.PKI、IBE关键技术的研究及应用[D].北京:北京邮电大学,2006.) [3] ZHOU J, MA T, LI Y. Comparison and analysis of PKI, CPK and IBC [J]. Journal of Information Engineering University, 2005, 6(3): 26-31.(周加法,马涛,李益发.PKI、CPK、IBE性能浅析[J].信息工程大学学报,2005,6(3):26-31.) [4] DENG W, DENG H, TIAN W, et al. Design of CPK authentication system and implementation of its key generation [J]. Journal of Computer Applications, 2007, 27(8): 1939-1940.(邓文,邓辉舫,田文春,等.组合公钥标识认证系统的设计及密钥生成的实现[J].计算机应用,2007,27(8):1939-1940.) [5] NAN X. CPK algorithm and identification [J]. Journal of Information Security and Communications Privacy, 2006(9): 13-16.(南相浩.CPK算法与标识认证[J].信息安全与通信保密,2006(9):13-16.) [6] NAN X. CPK combined public key system (version 8.0)[J]. Information Security and Communications Privacy, 2013(3): 39-41.(南相浩.CPK组合公钥体制(v8.0)[J].信息安全与通信保密,2013(3):39-41.) [7] NAN X. CPK cryptosystem and identity authentication [M]. Beijing: Publishing House of Electronic Industry, 2012: 35-55. [8] NAN X. Identity authentication, technical basis of cyber security [M]. Beijing: Publishing House of Electronics and Industry, 2011: 30-65. [9] TANG W, NAN X, CHEN Z. Elliptic curve cryptography-based combined public key technique [J]. Computer Engineering and Applications, 2003, 39(21): 1-3.(唐文,南相浩,陈钟.基于椭圆曲线密码系统的组合公钥技术[J].计算机工程与应用,2003,39(21):1-3.) [10] WANG Y. The technical characteristics and application of CPK certification system [J]. Review of Electronics Science and Technology, 2005(2): 5-10.(汪宇光.CPK认证体制的技术特点与应用[J].电子科学技术评论,2005(2):5-10.) [11] LONG D, WANG Y, HAN J, et al. Key production scheme based on double matrix combined public key[J]. Application Research of Computers, 2011, 28(8): 3058-3060.(龙第强,王亚弟,韩继红,等.一种基于双矩阵组合公钥算法的密钥生成方案[J].计算机应用研究,2011,28(8):3058-3060.) [12] SONG N, LIU Y, YAO Q, et al. Cloud computing key management scheme based on covert mapping combined public key [J]. Application Research of Computers, 2013, 30(9): 2759-2762.(宋宁宁,刘蕴络,姚倩燕,等.基于隐秘映射组合公钥的云计算密钥管理方案[J].计算机应用研究,2013,30(9):2759-2762.) [13] HUANG C, LIU D, PENG C. Application research on key management for RFID based on CPK [J]. Microelectronics & Computer, 2013, 30(12): 104-107.(黄灿,刘丹,彭春林.RFID系统下基于组合公钥的密钥管理应用研究[J].微电子学与计算机,2013,30(12):104-107.) [14] WANG G, WANG W, WU D, et al. The analysis of the CPK random collision probability [J]. Information Security and Communications Privacy, 2008(11): 87-88.(王公浩,王玟,吴铎,等.CPK随机碰撞概率分析[J].信息安全与通信保密,2008(11):87-88.) [15] RONG K, LI Y. A optimized scheme of the CPK seed matrix [J]. Computer Engineering and Applications, 2006, 42(24)120-121.(荣昆,李益发.CPK种子矩阵的优化设计方案[J].计算机工程与应用,2006,42(24):120-121.) [16] XING H. Research and application of key technologies of combined public key [D]. Changsha: National University of Defense Technology, 2009.(邢海龙.组合公钥CPK关键技术研究与应用[D].长沙:国防科学技术大学,2009.) [17] LI F, MA A, ZHU J, et al. New method to solve collusion attack and key collision in combined public key [J]. Application Research of Computers, 2014, 31(4): 1176-1179.(李方伟,马安君,朱江,等.解决组合公钥共谋攻击和密钥碰撞的新方法[J].计算机应用研究,2014,31(4):1176-1179.) [18] MA X, LONG X, FAN X. Construction and selection scheme of seeded-key database of collision-free CPK [J]. Computer Engineering and Applications, 2012, 48(27): 99-104.(马芯宇,龙翔,范修斌.无碰撞CPK的种子库构建和选取方案[J].计算机工程与应用,2012,48(27):99-104.) [19] OpenSSL. Elliptic curve cryptography [EB/OL]. (2014-05-19). [2014-06-13]. http://wiki.openssl.org/index.php/Elliptic_Curve_Cryptography. [20] HANKERSON D, MENEZES A, VANSTONE S. Guide to elliptic curve cryptography [M]. ZHANG H, translated. Beijing: Publishing House of Electronics Industry, 2005: 70-81.(HANKERSON D, MENEZES A, VANSTONE S.椭圆曲线密码学导论[M].张焕国,译.北京:电子工业出版社,2005:70-81.) [21] ZHAO M, ZHANG S. Security analysis of elliptic curve cryptography-based on combined public key technique [J]. Computer Engineering, 2008, 34(1): 156-157.(赵美玲,张少武.基于ECC的组合公钥技术的安全性分析[J].计算机工程,2008,34(1):156-157.) [22] XIONG R, LI Z, YANG H, et al. On the liner relations between the keys of combined public key cryptosystem[J]. Journal of Computer Security, 2012(1):30-33.(熊荣华,李增欣,杨恒亮,等.组合公钥(CPK)体制密钥间的线性关系[J].计算机安全,2012(1):30-33.) [23] ZHAO J. Innovative practice of CPK technology [J]. Information Security and Communications Privacy, 2012(5): 55-57.(赵建国.组合公钥(CPK)技术的创新实践[J].信息安全与通信保密,2012(5):55-57.) [24] SHAO C, SU J, WEI Y, et al. A double matrix combined public key [J]. Acta Electronica Sinica, 2011, 39(3): 671-674.(邵春雨,苏锦海,魏有国,等.一种双矩阵组合公钥算法[J].电子学报,2011,39(3):671-674.) |