[1]SMART N. An identity based authenticated key agreement protocol based on the Weil pairing [J]. Electronics Letters, 2002, 38(13): 630-632.[2]SCOTT M. Authenticated ID-based key exchange and remote log in with insecure token and PIN number [EB/OL]. [2010-08-20]. http://eprint.iacr.org/2002/164.pdf.[3]SHIM K. Efficient ID-based authenticated key agreement protocol based on the Weil pairing [J]. IEE Electronics Letters, 2003, 39(8): 653-654.[4]CHEN L, KUDLA C. Identity based authenticated key agreement from pairings [C]// Proceedings of the 16th IEEE Computer Security Foundations Workshop. Washington, DC: IEEE Computer Society, 2003: 219-233.[5]YUAN Q, LI S. A new efficient ID-based authenticated key agreement protocol [EB/OL]. [2010-08-15]. http:// eprint.iacr.org/2005/309.pdf.[6]CHOW S S M, CHOO K R. Strongly-secure identity-based key agreement and anonymous extension [C]// ISC 2007: Proceeding of the 10th International Conference on Information Security, LNCS 4779. Berlin: Springer-Verlag, 2007: 203-220.[7]HUANG HAI, CAO ZHENFU. An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem [C]// Proceedings of the 4th International Symposium on Information, Computer, and Communications Security. New York: ACM Press, 2009: 333-342.[8]WANG Y. Efficient identity-based and authenticated key agreement protocol [EB/OL]. [2010-08-20]. http://eprint.iacr.org/2005/108.pdf.[9]CANETTI R, GOLDREICH O, HALEVI S. The random oracle methodology, revisited [J]. Journal of the ACM, 2004, 51(4): 557-594.[10]GENTRY C. Practical identity-based encryption without random oracles [C]// EUROCRYPT'06: Proceedings of the 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer-Verlag, 2006: 445-464.[11]王圣宝,曹珍富,董晓蕾.标准模型下可证安全的身份基认证密钥协商协议[J].计算机学报,2007,30(10):1842-1854.[12]汪小芬,陈原,肖国镇.基于身份的认证密钥协商协议的安全分析与改进[J].通信学报,2008,28(12):16-21.[13]任勇军,王建东,庄毅.标准模型下增强的基于身份的认证密钥协商协议[J].电子与信息学报,2009,31(8):1990-1995.[14]KUDLA C J. Special signature schemes and key agreement protocols [D]. London: Royal Holloway University of London, 2006.