[1] |
DIAMENT T , LEE H K , KEROMYTIS A D ,et al. The dual receiver cryptosystem and its applications[C]// Proceedings of the 11th ACM Conference on Computer and Communications Security. 2004: 330-343.
|
[2] |
BONEH D , BOYEN X . Short signatures without random oracles and the SDH assumption in bilinear groups[J]. Journal of Cryptology, 2008,21(2): 149-177.
|
[3] |
BONEH D , LYNN B , SHACHAM H . Short signatures from the Weil pairing[C]// International Conference on the Theory and Application of Cryptology and Information Security. 2001: 514-532.
|
[4] |
ELGAMAL T . A public key cryptosystem and a signature scheme based on discrete logarithms[J]. IEEE Transactions on Information Theory, 1985,31(4): 469-472.
|
[5] |
TSIOUNIS Y , YUNG M . On the security of ElGamal based encryption[C]// International Workshop on Public Key Cryptography. 1998: 117-134.
|
[6] |
JOUX A , . A one round protocol for tripartite Diffie–Hellman[C]// International algorithmic number theory symposium. 2000: 385-393.
|
[7] |
DAMG?RD I . On Σ-protocols[J]. Lecture Notes,University of Aarhus,Department for Computer Science, 2002
|
[8] |
RACKOFF C , SIMON D R . Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack[C]// Annual International Cryptology Conference. 1991: 433-444.
|
[9] |
DESMEDT Y G . Threshold cryptography[J]. European Transactions on Telecommunications, 1994,5(4): 449-458.
|
[10] |
BAUM C , DAMG?RD I , OECHSNER S ,et al. Efficient commitments and zero-knowledge protocols from ring-sis with applications to lattice-based threshold cryptosystems[J]. IACR Cryptology ePrint Archive,2016, 2016:997.
|
[11] |
WEBER J W . Hierarchical encryption key system for securing digital media:U.S.Patent 7,480,385[P].2009-1-20.
|
[12] |
BONEH D , BOYEN X , GOH E J . Hierarchical identity based encryption with constant size ciphertext[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2005: 440-456.
|
[13] |
SCHUBA C L , KRSUL I V , KUHN M G ,et al. Analysis of a denial of service attack on TCP[C]// Proceedings of 1997 IEEE Symposium on Security and Privacy. 1997: 208-223.
|
[14] |
CARL G , KESIDIS G , BROOKS R R ,et al. Denial-of-service attack-detection techniques[J]. IEEE Internet Computing, 2006,10(1): 82-89.
|
[15] |
OKAMOTO T , POINTCHEVAL D . REACT:rapid enhancedsecurity asymmetric cryptosystem transform[C]// Cryptographers’ Track at the RSA Conference. 2001: 159-174.
|
[16] |
OKAMOTO T , POINTCHEVAL D . The gap-problems:a new class of problems for the security of cryptographic schemes[C]// International Workshop on Public key Cryptography. 2001: 104-118.
|
[17] |
GROTH J , SAHAI A . Efficient non-interactive proof systems for bilinear groups[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2008: 415-432.
|
[18] |
CHOW S S M , FRANKLIN M , ZHANG H . Practical dual-receiver encryption[C]// Cryptographers’ Track at the RSA Conference. 2014: 85-105.
|
[19] |
ZHANG R , HANAOKA G , IMAI H . A generic construction of useful client puzzles[C]// Proceedings of the 4th International Symposium on Information,Computer,and Communications Security. 2009: 70-79.
|
[20] |
BAEK J , SAFAVI-NAINI R , SUSILO W . On the integration of public key data encryption and public key encryption with keyword search[C]// International Conference on Information Security. 2006: 217-232.
|
[21] |
ZHANG R , IMAI H . Generic combination of public key encryption with keyword search and public key encryption[C]// International Conference on Cryptology and Network Security. 2007: 159-174.
|
[22] |
ROGAWAY P , . Efficient instantiations of tweakable block ciphers and refinements to modes OCB and PMAC[C]// International Conference on the Theory and Application of Cryptology and Information Security. 2004: 16-31.
|
[23] |
WU Q , QIN B , ZHANG L ,et al. Ad hoc broadcast encryption[C]// 2010 ACM Conference on Computer and Communications Security. 2010: 741-743.
|
[24] |
DIERKS T , ALLEN C . The TLS protocol version 1.0[S]. 1999.
|
[25] |
KRAWCZYK H , PATERSON K G , WEE H . On the security of the TLS protocol:a systematic analysis[C]// Annual Cryptology Conference. 2013: 429-448.
|
[26] |
MAVROGIANNOPOULOS N , VERCAUTEREN F , VELICHKOV V ,et al. A cross-protocol attack on the TLS protocol[C]// 2012 ACM Conference on Computer and Communications Security. 2012: 62-72.
|