BONEH D and FRANKLIN M. Identity-based encryption from the Weil pairing[C]. Proceedings of 21st Annual International Cryptology Conference, Santa Barbara, California, USA, 2001: 213-229.
|
SHAMIR A. Identity-based cryptosystems and signature schemes[C]. Proceedings of 4rd Annual International Cryptology Conference, Santa Barbara, California, USA, 1984: 47-53.
|
夏松, 权建校, 韩文报. 不同PKG环境下可证安全的基于身份AKA协议[J]. 电子与信息学报, 2010, 32(10): 2393-2399. doi: 10.3724/SP.J.1146.2009.01382.
|
XIA S, QUAN J, and HAN W. Provably secure identity-based authenticated key agreement protocols in multiple PKG environment[J]. Journal of Electronics Information Technology, 2010, 32(10): 2393-2399. doi: 10.3724/SP.J.1146.2009.01382.
|
曹雪菲, 寇卫东, 樊凯, 等. 无双线性对的基于身份的认证密钥协商协议[J]. 电子与信息学报, 2009, 31(5): 1241-1244. doi: 10.3724/SP.J.1146.2008.00003.
|
CAO X, KOU W, Fan K, et al. An identity-based authenticated key agreement protocol without bilinear pairing[J]. Journal of Electronics Information Technology, 2009, 31(5): 1241-1244. doi: 10.3724/SP.J.1146.2008.00003.
|
HORWITZ J and LYNN B. Toward hierarchical identity-based encryption[C]. Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, Netherland, 2002: 466-481.
|
GENTRY C and SILVERBERG A. Hierarchical ID-based cryptography[C]. Proceedings of 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, 2002: 548-566.
|
BONEH D, BOYEN X, and GOH E. Hierarchical identity based encryption with constant size ciphertext[C]. Proceedings of 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 2005: 440-456.
|
GUO H, MU Y, LI Z, et al. An efficient and non-interactive hierarchical key agreement protocol[J]. Computers Security, 2011, 30(1): 28-34.
|
曹晨磊, 刘明奇, 张茹, 等. 基于层级化身份的可证明安全的认证密钥协商协议[J]. 电子与信息学报, 2014, 36(12): 2848-2854. doi: 10.3724/SP.J.1146.2014.00684.
|
CAO C, LIU M, ZHANG R, et al. Provably secure authenticated key agreement protocol based on hierarchical identity[J]. Journal of Electronics Information Technology, 2014, 36(12): 2848-2854. doi: 10.3724/SP.J.1146.2014.00684.
|
IBRIQ J and MAHGOUB I. HIKES: hierarchical key establishment scheme for wireless sensor networks[J]. International Journal of Communication Systems, 2014, 27(10): 1825-1856.
|
KIM H. Freshness-preserving non-interactive hierarchical key agreement protocol over WHMS[J]. Sensors, 2014, 14(12): 23742-23757. doi: 10.3390/s141223742.
|
GOLDWASSER S and MICALI S. Probabilistic encryption[J]. Journal of Computer and System Sciences, 1984, 28(2): 270-299.
|
BELLARE M and PHILLIP R. Random oracles are practical: a paradigm for designing efficient protocols[C]. Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, VA, USA, 1993: 62-73.
|
BELLARE M and PHILLIP R. Entity authentication and key distribution[C]. Proceedings of 13th Annual International Cryptology Conference, Santa Barbara, California, USA, 1993: 232-249.
|
BLAKE-WILSON S, JOHNSON D, and MENEZES A. Key agreement protocols and their security analysis[C]. Proceedings of 6th IMA International Conference, Cirencester, UK, 2005: 30-45.
|
LAMACCHIA B, LAUTER K, and MITYAGIN A. Stronger security of authenticated key exchange[C]. Proceedings of First International Conference ProvSec, Wollongong, Australia, 2007: 1-16.
|
CHEN L, CHENG Z, and SMART N. Identity-based key agreement protocols from pairings[J]. International Journal of Information Security, 2007, 6(4): 213-241.
|
倪亮, 陈恭亮, 李建华. eCK模型的安全性分析[J]. 山东大学学报(理学版), 2013, 48(7): 46-48.
|
NI L, CHEN G, and LI J. Security analysis of the eCK model[J]. Journal of Shandong University (Natural Science), 2013, 48(7): 46-48.
|
FUJIOKA A, SUZUKI K, XAGAWA K, et al. Strongly secure authenticated key exchange from factoring, codes, and lattices[C]. Proceedings of 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, 2012: 467-484.
|
BONEH D and BOYEN X. Efficient selective-ID secure identity-based encryption without random oracles[C]. Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2004: 223-238.
|
ZHU G, XIONG H, and QIN Z. On the security of an efficient and non-interactive hierarchical key agreement protocol[J]. Wireless Personal Communications, 2014, 74(2): 883-889.
|
魏江宏, 刘文芬, 胡学先. 标准模型下可证安全的属性基认证密钥交换协议[J]. 软件学报, 2014, 25(10): 2397-2408.
|
WEI J, LIU W, and HU X. Provable secure attribute based authenticated key exchange protocols in the standard model[J]. Journal of Software, 2014, 25(10): 2397-2408.
|
DENG H, WU Q, QIN B, et al. Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts[J]. Information Sciences, 2014, 275: 370-384.
|
LYNN B. On the implementation of pairing-based cryptosystems[D]. [Ph.D. dissertation], Stanford University, 2007.
|