[1] |
SHAMIR A . Identity-based cryptosystems and signature schemes[J]. Lecture Notes in Computer Science, 1985,196(1): 47-53.
|
[2] |
国家密码管理局. SM9 标识密码算法 第 1 部分:总则:GM/T 0044.1-2016[S]. 北京:中国标准出版社, 2016.
|
|
State Cryptography Administration. Identity-based cryptographic algorithms SM9-part 1:general:GM/T 0044.1-2016[S]. Beijing:Standards Press of China, 2016.
|
[3] |
HESS F , SMART N P , VERCAUTEREN F . The eta pairing revisited[J]. IEEE Transactions on Information Theory, 2006,52(10): 4595-4602.
|
[4] |
LEE E , LEE H S , PARK C M . Efficient and generalized pairing computation on abelian varieties[J]. IEEE Transactions on Information Theory, 2009,55(4): 1793-1803.
|
[5] |
VERCAUTEREN F . Optimal pairings[J]. IEEE Transactions on Information Theory, 2010,56(1): 455-461.
|
[6] |
KOBLITZ N , MENEZES A . Pairing-based cryptography at high security levels[C]// IMA International Conference on Cryptography and Coding. Berlin:Springer, 2005: 13-36.
|
[7] |
BARRETO P S L M , NAEHRIG M . Pairing-friendly elliptic curves of prime order[C]// International Workshop on Selected Areas in Cryptography. Berlin:Springer, 2005: 319-331.
|
[8] |
ARANHA D F , KARABINA K , LONGA P ,et al. Faster explicit formulas for computing pairings over ordinary curves[C]// Proceedings of the 30th Annual International Conference on Theory and Applications of Cryptographic Techniques:Advances in Cryptology. Berlin:Springer, 2011: 48-68.
|
[9] |
LI Y , HAN J , WANG S ,et al. An 800 MHz cryptographic pairing processor in 65 nm CMOS[C]// Proceedings of 2012 IEEE Asian Solid State Circuits Conference (A-SSCC). Piscataway:IEEE Press, 2012: 217-220.
|
[10] |
HAN J , LI Y , YU Z Y ,et al. A 65 nm cryptographic processor for high speed pairing computation[J]. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2015,23(4): 692-701.
|
[11] |
PANG Y L , ZHANG Y , HAN J ,et al. Fp2 arithmetic acceleration based on modified Barrett modular multiplication algorithm[C]// Proceedings of 2017 IEEE 12th International Conference on ASIC. Piscataway:IEEE Press, 2017: 561-564.
|
[12] |
MIYAMOTO A , HOMMA N , AOKI T ,et al. Systematic design of RSA processors based on high-radix Montgomery multipliers[J]. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2011,19(7): 1136-1146.
|
[13] |
KAYA KOC C , ACAR T , KALISKI B S . Analyzing and comparing Montgomery multiplication algorithms[J]. IEEE Micro, 1996,16(3): 26-33.
|
[14] |
WANG A T , GUO B W , WEI C J . Highly-parallel hardware implementation of optimal ate pairing over Barreto-Naehrig curves[J]. Integration, 2019,64: 13-21.
|
[15] |
HAO Z Y , GUO W , WEI J Z ,et al. Dual processing engine architecture to speed up optimal ate pairing on FPGA platform[C]// Proceedings of 2016 IEEE Trustcom/BigDataSE/ISPA. Piscataway:IEEE Press, 2016: 584-589.
|
[16] |
CHEUNG R C C , DUQUESNE S , FAN J F ,et al. FPGA implementation of pairings using residue number system and lazy reduction[C]// Cryptographic Hardware and Embedded Systems – CHES 2011. Berlin:Springer, 2011: 421-441.
|
[17] |
BAHADORI M , J?RVINEN K , . Compact and programmable yet high-performance SoC architecture for cryptographic pairings[C]// Proceedings of 2020 30th International Conference on Field-Programmable Logic and Applications (FPL). Piscataway:IEEE Press, 2020: 176-184.
|
[18] |
BAG A , BASU ROY D , PATRANABIS S ,et al. FlexiPair:an automated programmable framework for pairing cryptosystems[J]. IEEE Transactions on Computers, 2022,71(3): 506-519.
|
[19] |
于斌, 黄海, 刘志伟 ,等. 面向多椭圆曲线的高速标量乘法器设计与实现[J]. 通信学报, 2020,41(12): 100-109.
|
|
YU B , HUANG H , LIU Z W ,et al. Design and implementation of high-speed scalar multiplier for multi-elliptic curve[J]. Journal on Communications, 2020,41(12): 100-109.
|
[20] |
王晨宇, 汪定, 王菲菲 ,等. 面向多网关的无线传感器网络多因素认证协议[J]. 计算机学报, 2020,43(4): 683-700.
|
|
WANG C Y , WANG D , WANG F F ,et al. Multi-factor user authentication scheme for multi-gateway wireless sensor networks[J]. Chinese Journal of Computers, 2020,43(4): 683-700.
|
[21] |
WANG Q X , WANG D , CHENG C ,et al. Quantum2FA:efficient quantum-resistant two-factor authentication scheme for mobile devices[J]. IEEE Transactions on Dependable and Secure Computing, 2021:doi.org/ 10.1109/TDSC.2021.3129512.
|
[22] |
LI J H , JIN J , LYU L J ,et al. A fast and scalable authentication scheme in IoT for smart living[J]. Future Generation Computer Systems, 2021,117: 125-137.
|
[23] |
NIKRAVAN M , REZA A . A multi-factor user authentication and key agreement protocol based on bilinear pairing for the Internet of things[J]. Wireless Personal Communications, 2020,111(1): 463-494.
|