Diffie W, Hellman M E. New directions in cryptography[J]. IEEETrans. on oflnformation Theory, 1976, IT-22 (6): 644 - 654.[2]Rivest R, Shamir A, Adleman L. A method for abstaining digitalsignatures and public-key cryptosystems[J].Comm. of the ACM.1978,21(2):120-[3]Rabin M 0 . Digital signatures and public key functions asintractable as factorization[R]. Cambridge: MITILCSITR-212,1979.[4]Williams H C. An M3 public-key encryption scheme[A].Advances in Cryptology-CRYPT0'85[C]. Berlin: Springer-Verlag, 1986: 358 - 368.[5]Paillier P. Public-key cryptosystems based on composite degreeresiduosity classes. Advances in Cryptology- EUROCRYPT'99[C], Berlin: Springer-Verlag, 1999, LNCS 1592: 223 - 238.[6]Smith P, Lennon M. LUC: A new public-key system[A].Proceeding of IFIP/Sec'93[C], Elsevier Science Publications,1994: 97- 111.[7]Gong G, Ham L. Public-key cryptosystems based on cubic finitefield extensions[J]. IEEE Trans. on Information Theory, 1999, IT-45(7): 2601 - 2605.[8]Gong G, Ham L, Wu H P. The GH public-key cryptosystem[A].Selected areas in cryptography[C]. SAC, Toronto, 2001: 284 -300.[9]Jiang Z T, Hao Y H, Wang Y M. A new public-key encryptionscheme based on lucas sequence[J]. Journal of Electronics-(China). 2005,22(5):490 - 497.[10]Paillier P, Pointcheval D. Efticient public-key cryptosystemprovably secure against active adversaries[A]. Advances inCryptology-ASIACRYPT'99[C], Berlin: Springer-Verlag, 1999,LNCS 1716: 163 - 179.[11]Catalano D, Gennaro R, Graham N H. The bit security ofPaillier's encryption scheme and its applications[A]. Advances inCryptology-EUROCRYPTO'O I [C], Berlin: Springer-Verlag,200 1, LNCS 2045: 229 - 243.[12]Damgard I, Jurik M. A generalization, a simplification and someapplication of Paillier's probabilistic public-key system[A].Advances in Cryptology-PKC'99[C], Berlin: Springer-Verlag,200 1, LNCS 1992: 1 19 - 136.[13]姜正涛, 庞辽军, 王育民. 一种高效的可选择验证完整性和消息源的加密体制[J].电子与信息学报.2005, 27(4):621-624浏览
|