[1] 周彦伟, 杨波, 吴振强, 等. 基于身份的跨域直接匿名认证机制[J]. 中国科学:信息科学,2014,44(9):1102-1120. (ZHOU Y W,YANG B,WU Z Q, et al. Direct anonymous authentication scheme in cross-domain based on identity[J]. SCIENTIA SINICA Informationis,2014,44(9):1102-1120.) [2] 张玉清, 王晓菲, 刘雪峰, 等. 云计算环境安全综述[J]. 软件学报, 2016,27(6):1328-1348.(ZHANG Y Q,WANG X F,LIU X F,et al. Survey on cloud computing security[J]. Journal of Software,2016,27(6):1328-1348.) [3] 张文芳, 王小敏, 郭伟, 等. 基于椭圆曲线密码体制的高效虚拟企业跨域认证方案[J]. 电子学报,2014,42(6):1095-1102. (ZHANG W F,WANG X M,GUO W,et al. An efficient inter-enterprise authentication scheme for VE based on the elliptic curve cryptosystem[J]. Acta Electronica Sinica,2014,42(6):1095-1102.) [4] ZHENG Z. Status quo and development on cross-domain authentication based on public key cryptosystems[C]//Proceedings of the 2012 International Symposium on Information Technologies in Medicine and Education. Piscataway:IEEE,2012:1106-1109. [5] MILL N G L,PREZ M G,PREZ G M,et al. PKI-based trust management in inter-domain scenarios[J]. Computers and Security, 2010,29(2):278-290. [6] HE D,ZEADALL Y S,KUMAR N,et al. Anonymous authentication for wireless body area networks with provable security[J]. IEEE Systems Journal,2016,11(4):2590-2601. [7] NI L,CHEN G,LI J,et al. Strongly secure identity-based authenticated key agreement protocols without bilinear pairings[J]. Information Sciences,2016,367/368:176-193. [8] 王中华, 韩臻, 刘吉强, 等. 云环境下基于PTPM和无证书公钥的身份认证方案[J]. 软件学报,2016,27(6):1523-1537. (WANG Z H,HAN Z,LIU J Q,et al. ID authentication scheme based on PTPM and certificateless public key cryptography in cloud environment[J]. Journal of Software,2016,27(6):1523-1537.) [9] 杨小东, 安发英, 杨平, 等. 云环境下基于代理重签名的跨域身份认证方案[J]. 计算机学报,2019,42(4):756-771.(YANG X D,AN F Y,YANG P,et al. Cross-domain authentication scheme based on proxy re-signature in cloud environment[J]. Chinese Journal of Computers,2019,42(4):756-771.) [10] 杨小东, 安发英, 杨平, 等. 基于无证书签名的云端跨域身份认证方案[J]. 计算机工程,2017,43(11):128-133,145. (YANG X D,AN F Y,YANG P,et al. Cross-domain identity authentication scheme in cloud based on certificateless signature[J]. Computer Engineering,2017,43(11):128-133,145.) [11] 高阳, 马文平, 刘小雪. 基于信任的服务实体跨域认证方案[J]. 系统工程与电子技术,2019,41(2):438-443. (GAO Y,MA W P,LIU X X. Cross-domain authentication scheme based on trust for service entity[J]. Systems Engineering and Electronics, 2019,41(2):438-443.) [12] 马晓婷, 马文平, 刘小雪. 基于区块链技术的跨域认证方案[J]. 电子学报,2018,46(11):2571-2579. (MA X T,MA W P, LIU X X. A cross domain authentication scheme based on blockchain technology[J]. Acta Electronica Sinica,2018,46(11):2571-2579.) [13] 周致成, 李立新, 郭松, 等. 基于区块链技术的生物特征和口令双因子跨域认证方案[J]. 计算机应用,2018,38(6):1620-1627.(ZHOU Z C,LI L X,GUO S,et al. Biometric and password two-factor cross domain authentication scheme based on blockchain technology[J]. Journal of Computer Applications, 2018,38(6):1620-1627.) [14] 周致成, 李立新, 李作辉. 基于区块链技术的高效跨域认证方案[J]. 计算机应用,2018,38(2):316-320. (ZHOU Z C,LI L X,LI Z H. Efficient cross-domain authentication scheme based on blockchain technology[J]. Journal of Computer Applications, 2018,38(2):316-320.) [15] 谢艳容, 马文平, 罗维. 一种新的信息服务实体跨域认证模型[J]. 计算机科学,2018,45(9):177-182. (XIE Y R,MA W P, LUO W. New cross-domain authentication model for information services Entity[J]. Computer Science,2018,45(9):177-182.) [16] WANG W,HU N,LIU X. BlockCAM:a blockchain-based crossdomain authentication model[C]//Proceedings of the 2018 IEEE International Conference on Data Science and Cyberspace. Piscataway:IEEE,2018:896-901. [17] YUAN C,ZHANG W,WANG X. Heterogeneous cross-domain authenticated key agreement protocols in the EIM system[J]. Arabian Journal for Science and Engineering,2017,42(8):3275-3287. [18] ZHENG Y. Digital signcryption or how to achieve cost(signature & encryption)? cost (signature)+ cost (encryption)[C]//Proceedings of the 1997 Annual International Cryptology Conference, LNCS 1294. Berlin:Springer,1997:165-179. [19] 张玉磊, 王欢, 刘文静, 等. 异构双向签密方案的安全性分析和改进[J]. 电子与信息学报,2017,39(12):3045-3050. (ZHANG Y L,WANG H,LIU W J,et al. Security analysis and improvement of mutual signcryption schemes under heterogeneous systems[J]. Journal of Electronics and Information Technology, 2017,39(12):3045-3050.) |