[1] |
DWORK C , NAOR M , SAHAI A . Concurrent zero-knowledge[J]. Journal of the ACM, 2004,51 (6):851-98.
|
[2] |
DENG X , LEE C H , ZHU H . Deniable authentication protocols[J]. IEEE Computers and Digital Techniques, 2001,148 (2):101-104.
|
[3] |
LEE W B , WU C C , TSAUR W J . A novel deniable authentication protocol using generalized ElGamal signature scheme[J]. Informa-tion Sciences, 2007,177 (6):1376-1381.
|
[4] |
KAR J . ID-based deniable authentication protocol based on dif-fie-hellman problem on elliptic curve[J]. International Journal of Network Security, 2013,15 (5):357-364.
|
[5] |
PASS R . On deniability in the common reference string and random oracle model[C]// Advances in Cryptology,Berlin.c 2003:316-337.
|
[6] |
JIANG S . Deniable authentication on the Internet[M]. Berlin: Springer, 2008:298-312.
|
[7] |
RAIMONDO M D , GENNARO R ' KRAWCZYK H . Deniable authentication and key exchange[C]// ACM Conference on Com-puter and Communications Security.c 2006:400-409.
|
[8] |
JIANG S . Timed encryption with application to deniable key ex-change[J]. Theoretical Computer Science, 2014 (560):172-189.
|
[9] |
SUSILO W , MU Y ' MASQUé J M . Deniable ring authentication revisited[C]// Applied Cryptography and Network Security,Berlin.c 2004:149-163.
|
[10] |
WANG L , ZHANG G , MA C . ID-based deniable ring authentication with constant-size signature[J]. Frontiers of Computer Science in China, 2008,2 (1):106-12.
|
[11] |
LI F , XIONG P , JIN C . Identity-based deniable authentication for ad hoc networks[J]. Computing, 2014,96 (9):843-853.
|
[12] |
NAOR M . Deniable ring authentication[C]// Advances in Cryptol-ogy,Berlin.c 2002:481-498.
|
[13] |
BOHLI J M , STEINWANDT R . Deniable group key agree-ment[C]// Progress in Cryptology,Berlin.c 2006:298-311.
|
[14] |
SCHNORR C P . Efficient identification and signatures for smart cards[C]// Advances in Cryptology,Berlin.c 1989:239-252.
|
[15] |
ZHANG Y , WANG K , LI B . A deniable group key establishment protocol in the standard model[C]// Information Security,Practice and Experience,Berlin.c 2010:308-323.
|
[16] |
张雅哲, 徐海霞, 李宝 . 可否认群密钥协商协议的一般化构造方式[J]. 通信学报, 2011,32(3):143-149.
|
|
ZHANG Y Z , XU H X , LI B . But denied group key agreement protocol way of generalized structure[J]. Journal of Communica-tions, 2011,32(3):143-149.
|
[17] |
STEINWANDT R , CORONA A S . Scalable attribute-based group key establishment:from passive to active and deniable[J]. Applica-ble Algebra in Engineering,Communication and Computing, 2014,25 (1/2):1-20.
|
[18] |
陈勇, 何明星, 曾晟珂 , 等. 两轮次的可否认的群密钥协商协议[J]. 密码学报, 2016,3(2):137-146.
|
|
CHEN Y , HE M X , ZENG S K , et al. Two rounds of deniable group key agreement protocol[J]. Journal of Password, 2016,3(2):137-146.
|
[19] |
DUTTA R , BARUA R . Provably secure constant round contributory group key agreement in dynamic setting[J]. IEEE Transactions on Information Theory, 2008,54 (5):2007-2025.
|
[20] |
CHEN Y , HE M , ZENG S , et al. Universally composable asymmet-ric group key agreement protocol[C]// The 10th International Con-ference on Information,Communications and Signal Process-ing(ICICS),IEEE.c 2015.
|
[21] |
CANETTI R . Security and composition of multiparty cryptographic protocols[J]. Journal of Cryptology, 2000,13 (1):143-202.
|
[22] |
FEIGE U , FIAT A , WANG S P . Zero-knowledge proofs of iden-tity[J]. Journal of Cryptology, 1988,1 (2):77-94.
|
[23] |
CHAUM D , HEIJST E V , PFITZMANN B . Cryptographically strong undeniable signatures,unconditionally secure for the signer[C]// The 11th Annual International Cryptology Conference on Advances in Cryptology.c 1991:470-484.
|