[1] 物联网安全创新联合实验室. 物联网终端安全白皮书(2019)[EB/OL].[2019-12-25]. http://www.caict.ac.cn/kxyj/qwfb/bps/201911/P020191115523217021278.pdf. (IoT Security Lab. IoT device security white paper(2019)[EB/OL].[2019-12-25]. http://www.caict.ac.cn/kxyj/qwfb/bps/201911/P020191115523217021278.pdf.) [2] BRYCE R,SHAW T,SRIVASTAVA G. MQTT-G:a publish/subscribe protocol with geolocation[C]//Proceedings of the 41st International Conference on Telecommunications and Signal Processing. Piscataway:IEEE,2018:1-4. [3] GILMAN E,BARTH D. Zero Trust Networks:Building Secure Systems in Untrusted Networks[M]. Sebastopol,CA:O'Reilly Media,2017:1-2. [4] ROSE S, BORCHERT O, MITCHELL S, et al. Zero Trust Architecture(2nd Draft):NIST SP 800-207[S]. Washington,DC:National Institute of Standards and Technology,2020-02-13. [5] SCHNORR C P. Efficient identification and signatures for smart cards[C]//Proceedings of the 1989 Conference on Theory and Application of Cryptology,LNCS 435. New York:Springer,1989:239-252. [6] CALABRETTA M, PECORI R, VELTRI L. A token-based protocol for securing MQTT communications[C]//Proceeding of the 26th International Conference on Software, Telecommunications and Computer Networks. Piscataway:IEEE,2018:1-6. [7] MALINA L,SRIVASTAVA G,DZURENDA P,et al. A secure publish/subscribe protocol for Internet of things[C]//Proceedings of the 14th International Conference on Availability,Reliability and Security. New York:ACM,2019:No. 75. [8] RABIN M O. Digitalized signatures and public-key functions as intractable as factorization[R]. Cambridge:Massachusetts Institute of Technology,1979. [9] SHOUP V. A proposal for an ISO standard for public key encryption (version 2.1)[EB/OL].[2020-05-20]. https://eprint.iacr.org/2001/112.pdf. [10] MATHUR A,NEWE T,ELGENAIDI W,et al. A secure end-toend IoT solution[J]. Sensors and Actuators A:Physical,2017, 263:291-299. [11] PENG W,LIU S,PENG K,et al. A secure publish/subscribe protocol for Internet of Things using identity-based cryptography[C]//Proceedings of the 5th International Conference on Computer Science and Network Technology. Piscataway:IEEE, 2016:628-634. [12] KIM S,LEE I. IoT device security based on proxy re-encryption[J]. Journal of Ambient Intelligence and Humanized Computing, 2018,9(4):1267-1273. [13] DENG R H,WENG J,LIU S,et al. Chosen-ciphertext secure proxy re-encryption without pairings[C]//Proceedings of the 7th International Conference on Cryptology and Network Security, LNCS 5339. Berlin:Springer,2008:1-17. [14] BLAZE M,BLEUMER G,STRAUSS M. Divertible protocols and atomic proxy cryptography[C]//Proceedings of the 1998 International Conference on the Theory and Applications of Cryptographic Techniques,LNCS 1403. Berlin:Springer,1998:127-144. [15] 徐鹏, 崔国华, 雷凤宇. 非双线性映射下一种实用的和可证明安全的IBE方案[J]. 计算机研究与发展,2008,45(10):1687-1695.(XU P,CUI G H,LEI F Y. An efficient and provably secure IBE scheme without bilinear map[J]. Journal of Computer Research and Development,2008,45(10):1687-1695.) [16] DO J M, SONG Y J, PARK N. Attribute based proxy reencryption for data confidentiality in cloud computing environments[C]//Proceedings of the 1st ACIS/JNU International Conference on Computers,Networks,Systems and Industrial Engineering. Piscataway:IEEE,2011:248-251. [17] NUÑEZ D,AGUDO I,LOPEZ J. Proxy re-encryption:analysis of constructions and its application to secure access delegation[J]. Journal of Network and Computer Applications, 2017, 87:193-209. [18] 吴世坤. 代理重加密体制研究及其应用[D]. 成都:电子科技大学,2016:28-29.(WU S K. Research on proxy re-encryption cryptography and its application[D]. Chengdu:University of Electronic Science and Technology of China,2016:28-29.) |