[1] |
CHIANG J T , HAAS J J , HU Y C . Secure and precise location verification using distance bounding and simultaneous multil ion[A]. WISEC,ACM[C]. 2009. 181-192.
|
[2] |
CHANDRAN N , GOYAL V , MORIARTY R ,et al. Position-based cryptography[A]. Cryptology-CRYPTO 2009[C]. 2009. 391-407.
|
[3] |
DZIEMBOWSKI S , PIETRZAK K . Intrusion-resilient secret sharing[A]. FOCS '07:Proceedings of the 48th Annual IEEE Foundations of Computer Science[C]. 2007.
|
[4] |
BUHRMAN H , CHANDRAN N , FEHR S , et al. Position-based quantum cryptography:impossibility and constructions[EB/OL]. ,2010.
|
[5] |
CANETTI R . Universally composable security:a new paradigm for cryptographic protocols[EB/OL]. ,2000.
|
[6] |
李凤华, 冯涛, 马建峰 . 基于 VSPH的 UC 不经意传输协议[J]. 通信学报, 2007,28(7): 28-34. LI F H , FENG T , MA J F . Universally composable oblivious transfer protocol based on VSPH[J]. Journal on Communications, 2007,28(7): 28-34.
|
[7] |
张俊伟, 马建峰, 杨力 . UC 安全的基于一次签名的广播认证[J]. 通信学报, 2010,31(5): 31-36. ZHANG J W , MA J F , YANG L . UC secure one-time signature based broadcast authentication[J]. Journal on Communications, 2010,31(5): 31-36.
|
[8] |
ZHANG J W , MA J F , MOON S J . Universally composable secure TNC model and EAP-TNC protocol in IF-T[J]. Science China Information Sciences, 2010,53(3): 465-482.
|
[9] |
MAURER U M . Conditionally-perfect secrecy and a provebly-secure randomized cipher[J]. Journal of Cryptology, 1992,5(1): 53-66.
|