参考文献
[1] Sahai A, Waters B. Fuzzy Identity Based Encryption[C]//Proc. of Cryptology-Eurocrypt’05. [S. 1.]: Springer-Verlag, 2005: 457-473.
[2] Boneh D, Franklin M. Identity Based Encryption from the Weil Pairing[C]//Proc. of Cryptology-Crypto’01. [S. 1.]: Springer-Verlag, 2001: 231-229.
[3] Chen Liqun, Cheng Zhaohui, Smart N P. Identity-based Key Agreement Protocols from Pairings, Cryptology ePrint Archive[EB/OL]. (2006-10-21). http://eprint.iacr.org/2006/ 199.
[4] 王永涛, 何明星, 郭振洲, 等. 一个基于身份的密钥协商协议[C]//2006年中国西部青年通信学术会议论文集. 成都: 四川省电子学会出版社, 2006: 584-588.
[5] Ateniese G, Kirsch J, Blanton M. Secret Handshakes with
Dynamic and Fuzzy Matching[C]//Proc. of Network and Distributed System Security Symposium. San Diego, USA: [s. n.], 2007: 159-177.
[6] Wang Hao, Xu Qiuliang, Fu Xiu. Two-party Attribute-based Key Agreement Protocol in the Standard Model[C]//Proc. of 2009 International Symposium on Information Processing. Jinan, China: [s. n.], 2009: 325-328.
[7] 任勇军, 王建东, 庄 毅, 等. 基于属性的认证密钥协商协议[J]. 兰州大学学报: 自然科学版, 2010, 46(2): 103-110.
[8] 徐军华, 郝云芳. 可证安全的基于属性密钥交换[J]. 现代电子技术, 2011, 34(5): 105-107.
[9] 魏江宏, 刘文芬, 胡学先. 全安全的属性基认证密钥交换协议[J]. 计算机应用, 2012, 32(1): 38-41.
[10] Steinwandt R, Corona A S. Attribute-based Group Key Establishment[EB/OL]. (2010-10-20). http://eprint.iacr.org/ 2010/235.
[11] Goyal V, Pandey O, Sahai A, et al. Attribute-based Encryption for Fine Grained Access Control of Encrypted Data[C]//Proc. of ACM Conference on Computer and Communications Security. [S. 1.]: ACM Press, 2006: 89-98.
[12] 王永涛. 基于属性密码体制的相关研究[D]. 上海: 上海交通大学, 2011.
[13] Beimel A. Secure Schemes for Secret Sharing and Key Distribution[D]. Haifa, Israel: Israel Institute of Technology, 1996.
[14] 王永涛, 基于身份的密码体制的密钥管理方案研究[D]. 成都: 西华大学, 2007.
[15] Bellare M, Rogaway P. Entity Authentication and Key Distribution[C]//Proc. of CRYPTO’94. [S. 1.]: Springer-Verlag, 1994: 232-249.
编辑 索书志 |