[1] Shor P. Polynomial-time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer[J]. SIAM J. Computer, 1997, 26(5): 1484-1509.
[2] Kitaev A. Quantum Measurements and the Abelian Stabilizer Problem[EB/OL]. [2010-05-20]. http://arxiv.org/quant-ph/9511026.
[3] Anshel I, Anshel M, Goldfeld D. An Algebraic Method for Public Key Cryptography[J]. Mathematical Research Letters, 1999, 6(3): 287-291.
[4] Paeng S H, Kwon D, Ha K C, et al. Improved Public Key Cryptosystem Using Finite Non-abelian Groups[EB/OL]. [2010-05-20]. http://eprint.iacr.org/2001/066.
[5] Artin E. Theory of Braids[J]. Annals of Math., 1947, 48(2): 101-126.
[6] Ko K H, Lee S J, Cheon J H, et al. New Public Key Cryptosystem Using Braid Groups[C]//Proceedings of Crypto’00. Berlin, Germeny: Springer-Verlag, 2000: 166-183.
[7] Anshel I, Anshel M, Fisher B, et al. New Key Agreement Protocol in Braid Group Cryptography[C]//Proceedings of Crypto’00. Berlin, Germany: Springer-Verlag, 2001: 1-15.
[8] Cha J C, Ko K H, Lee S J, et al. An Efficient Implementation of Braid Groups[C]//Proceedings of ASIACRYPT’01. [S. 1.]: Springer-Verlag, 2001: 144-156.
[9] Lal S, Chaturvedi A. Authentication Schemes Using Braid Groups[EB/OL]. [2010-05-20]. http://arXiv.org/cs.CR/0507066.
[10] 卓泽朋, 魏仕民, 马陵勇. 基于辫群的密钥认证方案[J]. 计算机工程, 2009, 35(13): 139-140.
[11] Tang Xueming, Hong Fan, Cui Guohua. A Public Key Encryption Algorithm on Braid Groups[J]. Journal of Software, 2007, 18(3): 722-729.
[12] Ko K H, Choi D H, Cho M S, et al. New Signature Scheme Using Conjugacy Problem[EB/OL]. (2002-10-20). http://eprint.iacr.org/ 2002/168.
[13] Thomas T, Lal A K. Group Signature Scheme Using Braid Groups[EB/OL]. [2010-05-20]. http://arXiv.org/cs.CR/0602063.
[14] Zou Shihua, Zeng Jiwen, Quan Junjie. Designated Verifier Signature Scheme Based on Braid Groups[EB/OL]. [2010-05-20]. http://eprint.iacr.org/2006/329.
[15] Verma G K. Blind Signature Schemes over Braid Groups[EB/OL]. [2010-05-20]. http://eprint.iacr.org/2008/027.
[16] Verma G K. A Proxy Signature Scheme over Braid Groups[EB/OL]. [2010-05-20]. http://eprint.iacr.org/2008/160.
[17] Zhang Lili, Zeng Jiwen. Proxy Signature Based on Braid Group[J]. Journal of Mathematical Study, 2008, 41(1): 56-64.
[18] Lal S, Verma V. Some Proxy Signature and Designated Verifier Signature Schemes over Braid Groups[EB/OL]. [2010-05-20]. http://arXiv.org/cs.CR/09043422.
[19] Horster P, Michels M, Petersen H. Authenticated Encryption Schemes with Low Communication Costs[J]. Electronics Letters, 1994, 30(15): 1212-1213.
[20] Araki S, Uehara S, Imamura K. The Limited Verifier Signature and Its Application[J]. IEICE Transactions on Fundamentals, 1999, E82-A(1): 63-68.
[21] Wu T, Hsu C. Convertible Authenticated Encryption Scheme[J]. The Journal of Systems and Software, 2002, 62(3): 205-209.
[22] 张串绒, 傅晓彤, 肖国镇. 对2个可转变认证加密方案的分析和改进[J]. 电子与信息学报, 2006, 28(1): 151-153.
[23] 董 涛, 余昭平. 一种可转换的认证加密方案[J]. 计算机工程, 2007, 33(23): 156-157. |