[1] |
DODIS Y , MIRONOV I , STEPHENS-DAVIDOWITZ N . Message transmission with reverse firewalls-secure communication on corrupted machines[C]// Annual Cryptology Conference. Springer, 2016: 341-372.
|
[2] |
DIFFIE W , HELLMAN M E . New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976,22(6): 644-654.
|
[3] |
LI L H , LIN L C , HWANG M S . A remote password authentication scheme for multiserver architecture using neural networks[J]. IEEE Transactions on Neural Networks, 2001,12(6): 1498-1504.
|
[4] |
LIU C , LIN C , HARN L ,et al. Security analysis of remote password authentication schemes for multiserver architecture using neural networks[J]. Journal of Computational & Theoretical Nanoscience, 2012,7(1): 680-683.
|
[5] |
TSAUR W J , WU C C , LEE W B . A smart card-based remote scheme for password authentication in multi-server Internet services[J]. Computer Standards & Interfaces, 2004,27(1): 39-51.
|
[6] |
JUANG W S . Efficient multi-server password authenticated key agreement using smart cards[J]. IEEE Transactions on Consumer Electronics, 2004,50(1): 251-255.
|
[7] |
CHANG C C , LEE J S . An efficient and secure multi-server password authentication scheme using smart cards[C]// International Conference on Cyberworlds. 2004: 417-422.
|
[8] |
REGEV O . On lattices,learning with errors,random linear codes,and cryptography[J]. Journal of the ACM, 2009,56(6): 1-40.
|
[9] |
LIAO Y P , WANG S S . A secure dynamic ID based remote user authentication scheme for multi-server environment[J]. Computer Standards & Interfaces, 2009,31(1): 24-29.
|
[10] |
WU T Y , TSENG Y M . An efficient user authentication and key exchange protocol for mobile client-server environment[J]. Computer Networks, 2010,54(9): 1520-1530.
|
[11] |
YOON E J , YOO K Y . A new efficient ID-based user authentication and key exchange protocol for mobile client-server environment[C]// IEEE International Conference on Wireless Information Technology & Systems. IEEE, 2010: 1-4.
|
[12] |
LYUBASHEVSKY V , PEIKERT C , REGEV O . On ideal lattices and learning with errors over rings[C]// International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 2010: 1-23.
|
[13] |
HE D B , CHEN J H , HU J . An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security[J]. Information Fusion, 2012,13(3): 223-230.
|
[14] |
ISLAM S H , BISWAS G P . Comments on ID-based client authentication with key agreement protocol on ECC for mobile client-server environment[C]// International Conference on Advances in Computing and Communications. Springer, 2011: 628-635.
|
[15] |
HAO F , RYAN P . J-PAKE:authenticated key exchange without PKI[J]. Transactions on Computational Science, 2010,6480: 192-206.
|
[16] |
ZHANG J , ZHANG Z , DING J ,et al. Authenticated key exchange from ideal lattices[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2015). Berlin Heidelberg:Springer, 2015: 719-751.
|
[17] |
姚期智, 赵运磊 . 一种高效且隐私保护的会话密钥协商方法:CN105162585A[J].(2015–12–16)[2019-01-28].
|
|
YAO Q Z , ZHAO Y L . An efficient session key agreement method with privacy preservation:CN105162585A[J].(2015–12–16)[2019-01-28].
|
[18] |
赵运磊, 李俊全 . 一种身份隐藏且非延展安全的认证密钥协商方法:CN105099671A[J].(2015–11–25)[2019-01-28].
|
|
ZHAO Y L , LI J Q . An authentication key agreement method with hidden identify and non extended security:CN105099671A[J].(2015–11–25)[2019-01-28].
|
[19] |
STEBILA D , MOSCA M . Post-quantum key exchange for the Internet and the open quantum safe project[C]// International Conference on Selected Areas in Cryptography. Berlin Heidelberg:Springer, 2016: 14-37.
|
[20] |
李文敏, 温巧燕, 张华 . 基于验证元的三方口令认证密钥交换协议[J]. 通信学报, 2008,29(10): 149-152.
|
|
LI W M , WEN Q Y , ZHANG H . Verifier-based password-authenticated key exchange protocol for three-party[J]. Journal on Communications, 2008,29(10): 149-152.
|
[21] |
TSENG Y M , HUANG S S , YOU M L . Strongly secure ID-based authenticated key agreement protocol for mobile multiserver environments[J]. International Journal of Communication Systems, 2016,30(11): 1-13.
|
[22] |
WU F , XU L L , LI X . A new chaotic map-based authentication and key agreement scheme with user anonymity for multi-server environment[C]// International Conference on Frontier Computing. Springer, 2018: 335-344.
|
[23] |
SHARMA G , SAHU R A , KUCHTA V ,et al. Authenticated group key agreement protocol without pairing[C]// International Conference on Information and Communications Security. Springer, 2018: 606-618.
|
[24] |
JHENG Y S , TSO R , CHEN C M ,et al. Password-based authenticated key exchange from lattices for client/server model[C]// International Conference on Ubiquitous Information Technologies and Applications. Springer, 2017: 315-319.
|
[25] |
张宗洋 . 承诺和零知识的非延展属性研究[D]. 上海:上海交通大学, 2012.
|
|
ZHANG Z Y . Non-malleable commitments and non-malleable zero-knowledge[D]. Shanghai:Shanghai Jiao Tong University, 2012.
|
[26] |
MICCIANCIO D , REGEV O . Worst-case to average-case reductions based on Gaussian measures[C]// 45th Annual IEEE Symposium on Foundations of Computer Science. IEEE Computer Society, 2004: 372-381.
|
[27] |
KATZ J , VAIKUNTANATHAN V . Smooth projective hashing and password-based authenticated key exchange from lattices[C]// 15th International Conference on the Theory and Application of Cryptology and Information Security. Springer, 2009: 636-652.
|
[28] |
DING J , ALSAYIGH S , LANCRENON J ,et al. Provably secure password authenticated key exchange based on RLWE for the post-quantum world[C]// RSA Conference Cryptographers’ Track 2017. Springer, 2017: 183-204.
|
[29] |
杨晓燕, 侯孟波, 魏晓超 . 基于验证元的三方口令认证密钥交换协议[J]. 计算机研究与发展, 2016,53(10): 2230-2238.
|
|
YANG X Y , HOU M B , WEI X C . Verifier-based three-party password authenticated key exchange protocol[J]. Journal of Computer Research& Development, 2016,53(10): 2230-2238.
|
[30] |
王彩芬, 陈丽 . 基于格的用户匿名三方口令认证密钥协商协议[J]. 通信学报, 2018,39(2): 21-30.
|
|
WANG C F , CHEN L . Three-party password authenticated key agreement protocol with user anonymity based on lattice[J]. Journal on Communications, 2018,39(2): 21-30.
|