[1] |
沈昌祥, 张焕国, 冯登国 等. 信息安全综述[J]. 中国科学 E 辑:信息科学, 2007,37(2): 129-150. SHEN C X , ZHANG H G , FENG D F ,et al. Summary of information safety[J]. Science in China(Series E) 2007.37(2): 129-150.
|
[2] |
Trusted Computing Group Trusted Computing Platform Alliance (TCPA) Main Specification Version 1.1b[S]. 2001.
|
[3] |
Trusted Computing Group TCG TPM Specification Version 1.2[S]. . 2005.6.
|
[4] |
国家密码管理局可信计算密码支撑平台功能与接口规范[S].2007. 2007.China Crypto Management office Functionality and Interface Specification of Cryptographicsupport Platform for Trusted Computing[S]. 2007.
|
[5] |
程相国 . 基于双线性对的签名体制的研究[D]. 西安电子科技大学, 2006. CHENG X G . Study on Digital Signatures from Bilinear Pairing[D]. Xidian University, 2006.
|
[6] |
LYNN B . On the Implementation of Pairing-based Cryptosystems[D]. The department of computer science and the committee on graduate studies of Stanford University, 2007.
|
[7] |
Menezes A J , OKAMOTO T , VANSTONE S A . Reducing elliptic curve logarithms to logarithms in a finite field[J]. IEEE Trans Inf Theory, 1993,39(5): 1639-1646.
|
[8] |
BONEH D , BOYEN X , SHACHAM H . Short group signatures[A]. CRYPTO 2004[C]. California,USA, 2004. 41-55.
|
[9] |
LIBERT B . New Secure Applications of Bilinear Maps in Cryptography[D]. Universite Catholique de Louvain, 2006.
|
[10] |
SCOTT M , BENGER N , CHARLEMAGNE M ,et al. Fast hashing to G2 on pairing-friendly curves[A]. Pairing-Based Cryptography-Pairing 2009:Third International Conference[C]. Palo Alto,CA,USA, 2009 102-113.
|
[11] |
BRICKELL E , CAMENISCH J , CHEN L Q . Direct anonymous attestation[A]. Proceedings of the 11th ACM Conference on Computer and Communications Security[C]. NY,USA, 2004 132-145.
|
[12] |
LEUNG A , MITCHELL C J . Ninja:non identity based,privacy preserving authentication for ubiquitous environments[A]. Proceedings of 9th International Conference on Ubiquitous Computing[C]. Innsbruck,Austria,2007, 20074717: 73-90.
|
[13] |
陈小峰, 冯登国 . 一种多信任域内的直接匿名证明方案[J]. 计算机学报, 2008,31(7): 1122-1130. CHEN X F , FENG D G . A direct anonymous attestation scheme in multi-domain environment[J]. Chinese Journal of Computers, 2008,31(7): 1122-1130.
|
[14] |
BRICKELL E , CHEN L Q , LI J T . Simplified security notions of direct anonymous attestation and a concrete scheme from pairings[A]. The Conference on Trusted Computing (TRUST 2008)[C]. Villach,Austria, 2008.
|
[15] |
BRICKELL E , CHEN L Q , LI J T . A new direct anonymous attestation scheme from bilinear maps[A]. Trust 2008[C]. Berlin Heidlberg, 2008. 166-178.
|
[16] |
CHEN L Q , MORRISSEY P , SMART N P . Pairing in trusted computing[A]. Pairing in Cryptography-Pairing 2008[C]. CA,USA, 2008. 1-17.
|
[17] |
汪涛, 杨义先 . 基于OT 的DAA 方案[A]. 第十一届全国青年通信学术会议[C]. 中国绵阳, 2006. WANG T , YANG Y X . OT based DAA protocol[A]. 1994-2008 China Academic Journal Electronic Publishing House[C]. Mianyang,China, 2006.
|
[18] |
FREEMAN D , SCOTT M , TESKE E ,et al. A taxonomy of pairing-friendly elliptic curves[EB/OL]. , 2006.
|
[19] |
SCOTT M , BENGER N , CHARLEMAGNE M ,et al. On the final exponentiation for calculating pairings on ordinary elliptic curves[A]. Pairing-Based Cryptography-Pairing 2009 Third International Conference[C]. Palo Alto,CA,USA, 2009. 78-89.
|
[20] |
MIYAJI A , NAKABAY M , TAKANO S . New explicit conditions of elliptic curve traces for FR-reduction[J]. IEICE Transformations on fundamentals, 2001,E84-A(5): 1234-1242.
|