参考文献
[1] Maymounkov P, Mazieres D. A Peer-to-Peer Information System Based on the XOR Metric[C]//Proc. of the 1st International Workshop on Peer-to-Peer Information Systems. [S. l.]: Springer-Verlag, 2002: 53-65.
[2] Gheorghe G, Cigno R L, Montresor A. Security and Privacy Issues in P2P Streaming Systems: A Survey[J]. Peer-to-Peer Networking and Applications, 2011, 4(2): 75-91.
[3] Diffie W, Hellman M. New Directions in Cryptography[J]. IEEE Transactions on Information Theory, 1976, 22(6): 644-654.
[4] ElGamal T. A Public Key Cryptosystem and C Signature Scheme Based on Discrete Logarithms[J]. IEEE Transactions on Information Theory, 1985, 31(4): 469-472.
[5] Rivest R, Shamir A, Adleman L. A Method for Obtaining Digital Signatures and Public-key Cryptosystems[J]. Commu- nications of the ACM, 1978, 21(2): 120-126.
[6] Shamir A. Identity-based Cryptosystems and Signature Sche- mes[C]//Proc. of CRYPTO’85. Berlin, Germany: Springer- Verlag, 1985: 47-53.
[7] Dodis Y, Katz J, Xu Shouhuai, et al. Key-insulated Public Key Cryptosystems[C]//Proc. of EUROCRYPT’02. Amsterdam, Netherlands: Springer-Verlag, 2002: 65-82.
[8] Dodis Y, Katz J, Xu Shouhuai, et al. Strong Key-insulated Signature Schemes[C]//Proc. of PKC’03. Miami, USA: Springer-Verlag, 2003: 130-144.
[9] Hanaoka Y, Hanaoka G, Shikata J, et al. Identity-based Hierarchical Strongly Key-insulated Encryption and Its Application[C]//Proc. of ASIACRYPT’05. Berlin, Germany: Springer-Verlag, 2005: 495-514.
[10] Zhou Yuan, Cao Zhenfu, Chai Zhenchuan. Identity Based Key Insulated Signature[C]//Proc. of ISPEC’06. Hangzhou, China: Springer-Verlag, 2006: 226-234.
[11] Hanaoka G, Hanaoka Y, Imai H. Parallel Key-insulated Public Key Encryption[C]//Proc. of PKC’06. New York, USA: Springer-Verlag, 2006: 105-122.
[12] Weng Jian, Liu Shengli, Chen Kefei, et al. Identity-based Threshold Key-insulated Encryption Without Random Oracles[C]//Proc. of CT-RSA’08. Berlin, Germany: Springer- Verlag, 2008: 203-220.
[13] Wan Zhongmei, Lai Xuejia, Weng Jian, et al. Identity-based Key-insulated Proxy Signature[J]. Journal of Electronics, 2009, 26(6): 853-858.
[14] Yu C W, Tseng Y M, Wu T Y. A New Key-insulated Signature and Its Novel Application[C]//Proc. of CISC’10. Taipei, China: [s. n.], 2010: 75-80.
编辑 任吉慧 |