| 1 | 陈华平,北京博文广成信息安全技术有限公司. 基于标识的证书认证体制CFL: 201110250009.4[P]. 2013-03-06.  10.4236/jis.2015.63020 | 
																													
																						|  | CHEN H P, Beijing Bowen Guangcheng Information Security Technology Co. Ltd. Identification based certificate authentication system CFL: 201110250009.4[P]. 2013-03-06.  10.4236/jis.2015.63020 | 
																													
																						| 2 | RAO N, SRIVASTAVA S, SREEKANTH K S. PKI deployment challenges and recommendations for ICS networks[J]. International Journal of Information Security and Privacy, 2017, 11(2): 38-48.  10.4018/ijisp.2017040104 | 
																													
																						| 3 | 魏珊珊,韩庆敏,郭肖旺,等. 基于国密算法的PKI在工控系统中的应用研究[J]. 计算机与现代化, 2018(11):1-6.  10.3969/j.issn.1006-2475.2018.11.001 | 
																													
																						|  | WEI S S, HAN Q M, GUO X W, et al. Research on Application of PKI based on nation secret algorithm in ICS[J]. Computer and Modernization, 2018(11): 1-6.  10.3969/j.issn.1006-2475.2018.11.001 | 
																													
																						| 4 | 许峰,齐玉国,黄皓,等. 基于开放源码的企业自建CA系统的研究与实现[J]. 计算机工程, 2006, 32(5):128-130.  10.3969/j.issn.1000-3428.2006.05.046 | 
																													
																						|  | XU F, QI Y G, HUANG H, et al. Research and implementation of private enterprise CA based on open source code[J]. Computer Engineering, 2006, 32(5): 128-130.  10.3969/j.issn.1000-3428.2006.05.046 | 
																													
																						| 5 | BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing[J]. SIAM Journal on Computing, 2003, 32(3): 586-615.  10.1137/s0097539701398521 | 
																													
																						| 6 | WATERS B. Efficient identity-based encryption without random oracles[C]// Proceedings of the 2005 Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 3494. Berlin: Springer, 2005: 114-127. | 
																													
																						| 7 | GENTRY C, PEIKERT C, VAIKUNTANATHAN V. Trapdoors for hard lattices and new cryptographic constructions[C]// Proceedings of the 40th Annual ACM Symposium on Theory of Computing. New York: ACM, 2008: 197-206.  10.1145/1374376.1374407 | 
																													
																						| 8 | SARVABHATLA M, VORUGUNTI C S. A secure and robust dynamic ID-based mutual authentication scheme with smart card using elliptic curve cryptography[C]// Proceedings of the 7th International Workshop on Signal Design and Its Applications in Communications. Piscataway: IEEE, 2015: 75-79.  10.1109/iwsda.2015.7458418 | 
																													
																						| 9 | KIM S Y, KIM H, LEE D H. An efficient ID-based mutual authentication secure against privileged-insider attack[C]// Proceedings of the 5th International Conference on IT Convergence and Security. Piscataway: IEEE, 2015:1-4.  10.1109/icitcs.2015.7292941 | 
																													
																						| 10 | LINDELL Y. Fast secure two-party ECDSA signing[C]// Proceedings of the 2017 Annual International Cryptology Conference, LNCS 10402. Cham: Springer, 2017: 613-644. | 
																													
																						| 11 | DOERNER J, KONDI Y, LEE E, et al. Secure two-party threshold ECDSA from ECDSA assumptions[C]// Proceedings of the 2018 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2018: 980-997.  10.1109/sp.2018.00036 | 
																													
																						| 12 | CASTAGNOS G, CATALANO D, LAGUILLAUMIE F, et al. Two-party ECDSA from hash proof systems and efficient instantiations[C]// Proceedings of the 2019 Annual International Cryptology Conference, LNCS 11694. Cham: Springer, 2019: 191-221. | 
																													
																						| 13 | 闫少勃. 国产化PLC上下位机安全通信技术研究[D]. 西安:西安电子科技大学, 2017: 2-16. | 
																													
																						|  | YAN S B. Research on the secure communication technology of the upper and lower computer in domestic PLC[D]. Xi’an: Xidian University, 2017: 2-16. | 
																													
																						| 14 | 惠敦炎. PROFIsafe: PROFIBUS和PROFINET的安全通信技术[J].自动化博览, 2012, 29(S1): 47-48. | 
																													
																						|  | HUI D Y. PROFIsafe: safe communication technology for PROFIBUS and PROFINET[J]. Automation Panorama, 2012, 29(S1): 47-48. | 
																													
																						| 15 | CANVEL B, HILTGEN A, VAUDENAY S,et al. Password interception in a SSL/TLS channel[C]// Proceedings of the 2003 Annual International Cryptology Conference,LNCS 2729.Berlin: Springer, 2003: 583-599. | 
																													
																						| 16 | 廉文娟,赵朵朵,范修斌. 基于CFL_BLP模型的CFL SSL安全通信协议[J]. 计算机工程, 2021, 47(6):152-163. | 
																													
																						|  | LIAN W J, ZHAO D D, FAN X B. CFL SSL secure communication protocol based on CFL_BLP model[J]. Computer Engineering, 2021, 47(6):152-163. | 
																													
																						| 17 | 全国信息安全标准化技术委员会.  信息安全技术 SM2椭圆曲线公钥密码算法 第4部分:公钥加密算法:  [S]. 北京: 中国标准出版社, 2016:2-6. | 
																													
																						|  | National Information Technology Standardization Technical Committee.  Information security technology - public key cryptographic algorithm SM2 based on elliptic curves - part 4: public key encryption algorithm:  [S]. Beijing: Standards Press of China, 2016: 2-6. | 
																													
																						| 18 | 全国信息安全标准化技术委员会.  信息安全技术 SM4分组密码算法:  [S]. 北京: 中国标准出版社, 2016:1-12. | 
																													
																						|  | National Information Technology Standardization Technical Committee.  Information security technology - SM4 block cipher algorithm:  [S]. Beijing: Standards Press of China, 2016:1-12. | 
																													
																						| 19 | ONIGA B, FARR S H, MUNTEANU A, et al. IoT infrastructure secured by TLS level authentication and PKI identity system[C]// Proceedings of the 2nd World Conference on Smart Trends in Systems, Security and Sustainability. Piscataway: IEEE, 2018:78-83.  10.1109/worlds4.2018.8611563 | 
																													
																						| 20 | Chengdu Huawei Symantec Technologies Co., Ltd. Method, system, and device for obtaining keys: US 8769287B2[P]. 2014-07-01. | 
																													
																						| 21 | KILINC H H, YANIK T. A survey of SIP authentication and key agreement schemes[J]. IEEE Communications Surveys and Tutorials, 2014, 16(2):1005-1023.  10.1109/surv.2013.091513.00050 |