| 1 | SHIN J S, JO M, HWANG J Y, et al. A verifier-based password-authenticated key exchange using tamper-proof hardware [J]. The Computer Journal, 2021, 64 (8): 1293-1302.  10.1093/comjnl/bxaa178 | 
																													
																						| 2 | 于金霞,廉欢欢,汤永利,等. 格上基于口令的三方认证密钥交换协议[J]. 通信学报, 2018, 39 (11): 87-97.  10.11959/j.issn.1000-436x.2018237 | 
																													
																						|  | YU J X, LIAN H H, TANG Y L, et al. Password-based three-party authenticated key exchange protocol from lattices [J]. Journal on Communications, 2018, 39(11): 87-97.  10.11959/j.issn.1000-436x.2018237 | 
																													
																						| 3 | 郭渊博, 尹安琪. 基于格的口令认证密钥交换协议综述[J]. 通信学报, 2022, 43(12): 172-187. | 
																													
																						|  | GUO Y B, YIN A Q. Research on password-authenticated key exchange over lattices [J]. Journal on Communications, 2022, 43(12): 172-187. | 
																													
																						| 4 | KEITH M, SHAO B, STEINBART P J. The usability of passphrases for authentication: an empirical field study [J]. International Journal of Human-Computer Studies, 2007, 65(1): 17-28.  10.1016/j.ijhcs.2006.08.005 | 
																													
																						| 5 | CHANG C-C, CHANG Y-F. A novel three-party encrypted key exchange protocol [J]. Computer Standards & Interfaces, 2004, 26 (5): 471-476.  10.1016/j.csi.2003.12.001 | 
																													
																						| 6 | STEINER M, TSUDIK G, WAIDNER M. Refinement and extension of encrypted key exchange [J]. ACM SIGOPS Operating Systems Review, 1995, 29(3): 22-30.  10.1145/206826.206834 | 
																													
																						| 7 | CHANG T-Y, M-S HWANG, YANG W-P. A communication-efficient three-party password authenticated key exchange protocol[J]. Information Sciences, 2011, 181(1): 217-226.  10.1016/j.ins.2010.08.032 | 
																													
																						| 8 | ABDALLA M, P-A FOUQUE, POINTCHEVAL D. Password-based authenticated key exchange in the three-party setting [C]// Proceedings of the 8th International Conference on Theory and Practice in Public Key Cryptography. Berlin: Springer, 2005: 65-84.  10.1007/978-3-540-30580-4_6 | 
																													
																						| 9 | JIANG S, GONG G. Password based key exchange with mutual authentication [C]// Proceedings of the 11th International Workshop on Selected Areas in Cryptography. Berlin: Springer, 2004: 267-279.  10.1007/978-3-540-30564-4_19 | 
																													
																						| 10 | GROCE A, KATZ J. A new framework for efficient password-based authenticated key exchange [C]// Proceedings of the 17th ACM Conference on Computer and Communications Security. New York: ACM, 2010: 516-525.  10.1145/1866307.1866365 | 
																													
																						| 11 | 叶茂, 胡学先, 刘文芬. 基于格的三方口令认证密钥交换协议[J]. 电子与信息学报, 2013, 35(6): 1376-1381.  10.3724/sp.j.1146.2012.01135 | 
																													
																						|  | YE M, HU X X, LIU W F. Password authenticated key exchange protocol in the three party setting based on lattices [J]. Journal of Electronics & Information Technology, 2013, 35(6): 1376-1381.  10.3724/sp.j.1146.2012.01135 | 
																													
																						| 12 | XU D, HE D, CHOO K-K R, et al. Provably secure three-party password authenticated key exchange protocol based on ring learning with error [J]. Cryptology ePrint Archive, 2017: 173311. | 
																													
																						| 13 | LIU C, ZHENG Z, JIA K, et al. Provably secure three-party password-based authenticated key exchange from RLWE [C]// Proceedings of the 2019 International Conference on Information Security Practice and Experience. Cham: Springer, 2019: 56-72.  10.1007/978-3-030-34339-2_4 | 
																													
																						| 14 | YIN A, GUO Y, SONG Y, et al. Two-round password-based authenticated key exchange from lattices [J]. Wireless Communications and Mobile Computing, 2020, 2020: 8893628.  10.1155/2020/8893628 | 
																													
																						| 15 | CHIESA A, MANOHAR P, SPOONER N. Succinct arguments in the quantum random oracle model [C]// Proceedings of the 2019 Theory of Cryptography Conference. Cham: Springer, 2019: 1-29.  10.1007/978-3-030-36033-7_1 | 
																													
																						| 16 | PEIKERT C. A decade of lattice cryptography [J]. Foundations and Trends in Theoretical Computer Science, 2016, 10(4): 283-424.  10.1561/0400000074 | 
																													
																						| 17 | GENTRY C, PEIKERT C, VAIKUNTANATHAN V. Trapdoors for hard lattices and new cryptographic constructions [C]// Proceedings of the 40th Annual ACM Symposium on Theory of Computing. New York: ACM, 2008: 197-206.  10.1145/1374376.1374407 | 
																													
																						| 18 | CRAMER R, SHOUP V. Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption [C]// Proceedings of the 2002 International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2002: 45-64.  10.1007/3-540-46035-7_4 | 
																													
																						| 19 | KATZ J, VAIKUNTANATHAN V. Smooth projective hashing and password-based authenticated key exchange from lattices [C]// Proceedings of the 2009 International Conference on the Theory and Application of Cryptology and Information Security. Cham: Springer, 2009: 636-652.  10.1007/978-3-642-10366-7_37 | 
																													
																						| 20 | BENHAMOUDA F, BLAZY O, DUCAS L, et al. Hash proof systems over lattices revisited [C]// Proceedings of the 2018 IACR International Workshop on Public Key Cryptography. Cham: Springer, 2018: 644-674.  10.1007/978-3-319-76581-5_22 | 
																													
																						| 21 | BELLARE M, POINTCHEVAL D, ROGAWAY P. Authenticated key exchange secure against dictionary attacks [C]// Proceedings of the 2000 International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2000: 139-155.  10.1007/3-540-45539-6_11 | 
																													
																						| 22 | GUO Y, ZHANG Z, GUO Y. Anonymous authenticated key agreement and group proof protocol for wearable computing [J]. IEEE Transactions on Mobile Computing, 2022, 21(8): 2718-2731.  10.1109/tmc.2020.3048703 | 
																													
																						| 23 | ABDALLA M, BENHAMOUDA F, POINTCHEVAL D. Public-key encryption indistinguishable under plaintext-checkable attacks[C]// Proceedings of the 2015 IACR International Workshop on Public Key Cryptography. Berlin: Springer, 2015: 332-352.  10.1007/978-3-662-46447-2_15 | 
																													
																						| 24 | REGEV O. On lattices, learning with errors, random linear codes, and cryptography [J]. Journal of the ACM, 2009, 56(6): 34.  10.1145/1568318.1568324 | 
																													
																						| 25 | ZHANG J, YU Y. Two-round PAKE from approximate SPH and instantiations from lattices [C]// Proceedings of the 2017 International Conference on the Theory and Application of Cryptology and Information Security. Cham: Springer, 2017: 37-67.  10.1007/978-3-319-70700-6_2 | 
																													
																						| 26 | 高艺恬,陈立全,屠天扬,等. 基于BRLWE的物联网后量子加密技术研究[J].网络与信息安全学报,2022,8(5):140-149.  10.11959/j.issn.2096-109x.2022024 | 
																													
																						|  | GAO Y T, CHEN L Q, TU T Y, et al. Post-quantum encryption technology based on BRLWE for internet of things [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 140-149.  10.11959/j.issn.2096-109x.2022024 |