[1] |
LAW L , MENEZES A , QU M ,et al. An efficient protocol for authenticated key agreement[J]. Designs,Codes and Cryptography, 2003,28(2): 119-134.
|
[2] |
ABADLLA M , FOUQUE P A , POINTCHEVAL D . Password-based authenticated key exchange in the three-party setting[C]// International Workshop on Public Key Cryptography. 2005: 65-84.
|
[3] |
RAIMANDO M D , GENNARO R . Provably secure threshold password-authenticated key exchange[J]. Journal of Computer and System Sciences, 2006,72(6): 978-1001.
|
[4] |
ZHAO F , GONG P , LI S ,et al. Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials[J]. Nonlinear Dynamics, 2013,74(1-2): 419-427.
|
[5] |
XIE Q , ZHAO J , YU X . Chaotic maps-based three-party password-authenticated key agreement scheme[J]. Nonlinear Dynamics, 2013,74(4): 1021-1027.
|
[6] |
KATZ J , VAIKUNTANATHAN V . Smooth projective hashing and password-based authenticated key exchange from lattices[C]// International Conference on the Theory and Application of Cryptology and Information Security. 2009: 636-652.
|
[7] |
DING Y , FAN L . Efficient password-based authenticated key exchange from lattices[C]// 2011 Seventh International Conference on Computational Intelligence and Security (CIS). 2011: 934-938.
|
[8] |
DING J , XIE X , LIN X . A simple provably secure key exchange scheme based on the learning with errors problem[J]. IACR Cryptology Eprint Archive, 2014:688.
|
[9] |
FUJIOKA A , SUZUKI K , XAGAWA K ,et al. Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism[C]// The 8th ACM SIGSAC Symposium on Information,Computer and Communications Security. 2013: 83-94.
|
[10] |
胡学先, 魏江宏, 叶茂 . 对一个强安全的认证密钥交换协议的分析[J]. 电子与信息学报, 2013,35(9): 2278-2282.
|
|
HU X X , WEI J H , YE M . Cryptanalysis of a strongly secure authenticated key exchange protocol[J]. Journal of Electronics &Information Technology, 2013,35(9): 2278-2282.
|
[11] |
叶茂, 胡学先, 刘文芬 . 基于格的三方口令认证密钥交换协议[J]. 电子与信息学报, 2013,35(6): 1376-1381.
|
|
YE M , HU X X , LIU W F . Password authenticated key exchange protocol in the three party setting based on lattices[J]. Journal of Electronics & Information Technology, 2013,35(6): 1376-1381.
|
[12] |
ZHANG J , ZHANG Z , DING J ,et al. Authenticated key exchange from ideal lattices[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2015: 719-751.
|
[13] |
DING J , ALASYIGH S , LANCRENON J ,et al. Provably secure password authenticsated key exchange based on RLWE for the post-quantum world[C]// Cryptographers’ Track at the RSA Conference. 2017: 183-204.
|
[14] |
杨孝鹏, 马文平, 张成丽 . 一种新型基于环上带误差学习问题的认证密钥交换方案[J]. 电子与信息学报, 2015,37(8): 1984-1988.
|
|
YANG X P , MA W P , ZHANG C L . New authenticated key exchange scheme based on ring learning with errors problem[J]. Journal of Electronics & Information Technology, 2015,37(8): 1984-1988.
|
[15] |
STEBILA D , MOSCA M . Post-quantum key exchange for the Internet and the open quantum safe project[R]. Cryptology Eprint Archive,Report 2016/1017, 2016.
|
[16] |
杨晓燕, 侯孟波, 魏晓超 . 基于验证元的三方口令认证密钥交换协议[J]. 计算机研究与发展, 2016,53(10): 2230-2238.
|
|
YANG X Y , HOU M B , WEI X C . Verifier-based three-party password authenticated key exchange protocol[J]. Journal of Computer Research and Development, 2016,53(10): 2230-2238.
|
[17] |
XU D , HE D , CHOO K R ,et al. Provably secure three-party password authenticated key exchange protocol based on ring learning with error[J]. IACR Cryptology Eprint Archive, 2017:360.
|