[1]CANETTI R. Universally composable security: A new paradigm for cryptographic protocols [C] // Proceedings of the 42nd Annual Symposium on Foundations of Computer Science. Washington, DC: IEEE Computer Society, 2001: 136-145.[2]TROLIN M. A universally composable scheme for electronic cash [C] // Progress in Cryptology-INDOCRYPT 2005, LNCS 3797. Berlin: Springer, 2005: 347-360. [3]KIAYIAS A, ZHOU H. Trading static for adaptive security in universally composable zero-knowledge [C] // Proceedings of the 34th International Colloquium on Automata, Languages and Programming, LNCS 4596. Berlin: Springer, 2007: 316-327.[4]GREEN M, HOHENBERGER S. Universally composable adaptive oblivious transfer [C] // Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology. Berlin:Springer, 2008: 179-197.[5]BURMESTER M, LE T V, MEDRIROS B D, et al.Universally composable RFID identification and authentication protocols [J]. ACM Transactions on Information and System Security, 2009, 12(4): 1-33.[6]GORANTLA M C, BOYD C, NIETO J M G. Universally composable contributory group key exchange [C] // Proceedings of ACM Conference on Computer and Communications Security. New York: ACM, 2009:146-156.[7]雷飞宇.UC安全多方计算模型及其典型应用研究[D].上海:上海交通大学,2007.[8]洪璇.通用可组合数字签名模型及其关键问题研究[D].上海:上海交通大学,2008.[9]冯涛.通用可复合密码协议理论及其应用研究[D].西安:西安电子科技大学,2008.[10]张俊伟.密码协议的可组合安全[D].西安:西安电子科技大学,2010.[11]郭渊博. UC安全的空间网络双向认证与密钥协商协议[J].电子学报,2010,38(10):2358-2364.[12]贾洪勇,卿斯汉,谷利泽,等.通用可组合的组密钥交换协议[J].电子与信息学报,2009,31(7):1571-1575.[13]CHAUM D, CREPEAU C, DAMGARD I. Multi-party unconditionally secure protocols [C] // Proceedings of the 20th Annual ACM Symposium on Theory of Computing. New York: ACM, 1988: 11-19.[14]CANETTI R, KUSHILEVITZ E, LINDELL Y. On the limitations of universally composable two-party computation without set-up assumptions [C] // Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2003: 68-86.[15]CANETTI R, LINDELL Y, OSTROVSKY R, et al. Universally composable two-party and multi-party computation [C] // Proceedings of the 34th Annual ACM Symposium on Theory of Computing. New York: ACM, 2002: 494-503.[16]BARAK B, CANETTI R, NIELSEN J B, et al. Universally composable protocols with relaxed set-up assumptions [C] // Proceedings of the 45th Annual IEEE Symposium on Foundations of Computer Science. Washington, DC: IEEE Computer Society, 2004: 186-195.[17]KATZ J. Universally composable multi-party computation using tamper-proof hardware [C] // Proceedings of the 26th Annual International Conference on the Theory and Application of Cryptology Techniques. Berlin: Springer, 2007:115-128.[18]CANETTI R. Obtaining universally composable security: towards the bare bones of trust [C] // Proceedings of the 13th International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2007: 88-112. |