[1] |
HUNT R . PKI and digital certification infrastructure[C]// Ninth IEEE International Conference on Networks.IEEE, c2001:234-239.
|
[2] |
SHAMIR A . Identity based cryptosystems and signature schemes[C]// Advances in Cryptology Crypto84.Berlin:Springer-Verlag, c1984:47-53.
|
[3] |
AL-RIYAMI S S , PATERSON K G . Certificateless public key cryp-tography[M]. Advances in Cryptology-ASIACRYPT 2003,Springer Berlin Heidelberg, 2003:452-473.
|
[4] |
HE D , CHEN Y , CHEN J , et al. A new two-round certificateless au-thenticated key agreement protocol without bilinear pairings[J]. Mathematical and Computer Modelling, 2011,54(11):3143-3152.
|
[5] |
HE D , CHEN J , HU J . A pairing‐free certificateless authenticated key agreement protocol[J]. International Journal of Communication Systems, 2012,25(2):221-230.
|
[6] |
HE D , PADHYE S , CHEN J . An efficient certificateless two-party authenticated key agreement protocol[J]. Computers & Mathematics with Applications, 2012,64(6):1914-1926.
|
[7] |
TONG D , LIU J W , MAO K F , et al. Certificateless and pairing-free key agreement scheme for satellite networkC]// Communications Security Conference (CSC 2014).IET, c2014:1-5.
|
[8] |
MOHAMED N A F , HASHIM M H A , BASHIER E , et al. Fully-secure and efficient pairing-free certificateless authenticated key agreement protocolC]// 2012 World Congress on Internet Security (WorldCIS),IEEE, c2012:167-172.
|
[9] |
SUN H Y , WEN Q Y , ZHANG H , et al. A strongly secure pairing-free certificateless authenticated key agreement protocol for low-power devices[J]. Information Technology and Control, 2013,42(2):191-204.
|
[10] |
GHOREISHI S M , ABD R S , ISNIN I F , et al. New secure iden-tity-based and certificateless authenticated key agreement protocols without pairingsC]// 2014 International Symposium on Biometrics and Security Technologies (ISBAST).IEEE, c2014:188-192.
|
[11] |
WANG Z , DU X , SUN Y . Group key management scheme based on proxy re-cryptography for near-space networkC]// 2011 International Conference on Network Computing and Information Security (NCIS).IEEE, c2011,1:52-56.
|
[12] |
GENTRY C , SILVERBERG A . Hierarchical ID-based cryptography[M]. Advances in cryptology—ASIACRYPT2002,Springer Berlin Heidelberg, 2002:548-566.
|
[13] |
曹晨磊, 刘明奇, 张茹 , 等. 基于层级化身份的可证明安全的认证密钥协商协议[J]. 电子与信息学报, 2014,36(12):2848-2854. CAO C L , LIU M Q , ZHANG R , et al. Provably secure authenticated key agreement protocol based on hierarchical identity[J]. Journal of Electronics & Information Technology, 2014,36(12):2848-2854.
|
[14] |
LIU W , LIU J , WU Q , et al. SAKE: scalable authenticated key ex-change for mobile e‐health networks[J/OL]. Security and Communication Networks, .
|
[15] |
CHOW S S M , ROTH V , RIEFFEL E G . General certificateless en-cryption and timed-release encryption[M]. Security and Cryptography for Networks,Springer Berlin Heidelberg, 2008:126-143.
|
[16] |
HANKERSON D , VANSTONE S , MENEZES A J . Guide to elliptic curve cryptography[M]. Springer Science & Business Media, 2004.
|
[17] |
LIPPOLD G , BOYD C , NIETO J G . Strongly secure certificateless key agreement[M]. Pairing-Based Cryptography-Pairing 2009,Springer Berlin Heidelberg, 2009:206-230..
|