1. Mobile Communication Security Research Laboratory, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
2. Mobile Communications Engineering Research Center of the Ministry of Education, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
3. Mobile Communication Security Research Laboratory, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
MA Anjun LI Fangwei ZHU Jiang. Linear collusion attack analysis of combined public key cryptosystem[J]. Journal of Computer Applications, 2013, 33(08): 2225-2227.
[1]南湘浩.CPK算法与标识认证[J].信息安全与通信保密,2006(9):12-16.[2]南湘浩.CPK标识认证[M].北京:国防工业出版社,2006.[3]南湘浩.CPK密码体制与网际安全[M].北京:国防工业出版社,2008.[4]崔克杰.基于CPK的认证及密钥管理技术研究[D].哈尔滨:哈尔滨工业大学,2010.[5]NAN X H. CPK cryptosystem and identity authentication [M]. Beijing: Publishing House of Electronics Industry, 2012.[6]NAN X H. Identity authentication, technical basis of cyber security [M]. Beijing: Publishing House of Electronics Industry, 2011.[7]赵建国.组合公钥(CPK)技术的创新实践[J].信息安全与通信保密,2012(5):55-57.[8]赵美玲,张少武.基于ECC的组合公钥技术的安全性分析[J].计算机工程,2008,34(1):156-157.[9]庄育涵.组合公钥密码体制密钥管理中心的研究与实现[D].广州:华南理工大学,2010.[10]熊荣华,李增欣,杨恒亮,等.组合公钥(CPK)体制密钥间的线性关系[J].计算机安全,2012(1):30-33.[11]南湘浩.组合公钥(CPK)体制标准(v5.0)[J].计算机安全,2010(10):1-2.[12]邵春雨,苏锦海,魏有国,等.一种双矩阵组合公钥算法[J].电子学报,2011,39(3):671-674.[13]龙弟强,王亚弟,韩继红,等.一种基于双矩阵组合公钥算法的密钥生成方案[J].计算机应用研究,2011,28(8):3058-3060.[14]邵春雨.双矩阵组合公钥算法及应用研究[D].郑州:信息工程大学,2010.