参考文献
[1]杨晓元,吴立强,张敏情,等.基于理想格的适应性选择密文安全公钥加密方案[EB/OL].[2017-04-20].http://www.docin.com/p-1273161598.html.
[2]古春生.近似理想格上的全同态加密方案[J].软件学报,2015,26(10):2696-2719.
[3]魏理豪,艾解清,刘生寒.理想格上高效的身份基加密方案[J].计算机工程,2016,42(7):134-138.
[4]冯超逸,赵一鸣.基于理想格的可证明安全数字签名方案[J].计算机工程,2017,43(5):103-107.
[5]杨丹婷,许春根,徐磊,等.理想格上基于身份的签名方案[J].密码学报,2015,2(4):306-316.
[6]孙意如,梁向前,商玉芳.理想格上基于身份的环签名方案[J].计算机应用,2016,36(7):1861-1865.
[7]LYUBASHEVSKY V,PEIKERT C,REGEV O.On ideal lattices and learning with errors over rings[C]//Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer,2010:1-23.
[8]叶茂,胡学先,刘文芬.基于理想格的近似平滑投射Hash函数[J].信息工程大学学报,2013,14(1):13-21.
[9]ZHANG J,ZHANG Z,DING J,et al.Authenticated key exchange from ideal lattices[C]//Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer,2015:719-751.
[10]KATZ J,VAIKUNTANATHAN V.Smooth projective hashing and password-based authenticated key exchange from lattices[C]//Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security:Advances in Cryptology.Berlin,Germany:Springer,2009:636-652.
[11]叶茂,胡学先,刘文芬.基于格的三方口令认证密钥交换协议[J].电子与信息学报,2013,35(6):1376-1381.
[12]杨孝鹏,马文平,张成丽.一种新型基于环上带误差学习问题的认证密钥交换方案[J].电子与信息学报,2015,37(8):1984-1988.
[13]叶茂.基于格的口令认证密钥交换协议和相关加密算法研究[D].郑州:解放军信息工程大学,2013.
[14]杨晓燕,侯孟波,魏晓超.基于验证元的三方口令认证密钥交换协议[J].计算机研究与发展,2016,53(10):2230-2238.
[15]MACKENZIE P.The PAK suite:protocols for password-authenticated key exchange[EB/OL].[2017-05-05].https://www.researchgate.net/publication/2544702_The_PAK_suite_Protocols_for_Password-Authenticated_Key_Exchange.
[16]詹海峰.基于格的高斯抽样和密钥交换[D].西安:西安电子科技大学,2014.
编辑吴云芳
|