参考文献
[1]Lü Xixiang,Mu Yi,Li Hui.Non-interactive Key Establish-ment for Bundle Security Protocol of Space DTNs[J].IEEE Transactions on Information Forensics and Security,2014,9(1):5-13.
[2]DTNRG.Bundle Security Protocol Specification[Z].2011.
[3]Kate A,Zaverucha G M,Hengartner U.Anonymity and Security in Delay Tolerant Networks[C]//Proceedings of the 3rd International Conference on Security and Privacy in Communications Networks.Washington D.C.,USA:IEEE Press,2007:504-
513.
[4]Jia Zhongtian,Lin Xiaodong,Tan Senghua,et al.Public Key Distribution Scheme for Delay Tolerant Networks Based on Two-channel Cryptography[J].Journal of Network and Computer Applications,2012,35(3):905-913.
[5]吴杨,矫文成,潘艳辉,等.基于身份的分布式卫星网络私钥管理方案[J].计算机科学,2011,38(10):96-99.
[6]Tong D,Liu J W,Mao K F,et al.Certificateless and Pairing-free Key Agreement Scheme for Satellite Network[C]//Proceedings of 2014 Communications Security Conference.[S.l.]:IET,2014:1-5.
[7]Dupont R,Enge A.Provably Secure Non-interactive Key Distribution Based on Pairings[J].Discrete Applied Mathematics,2006,154(2):270-276.
[8]Paterson K G,Srinivasan S.On the Relations Between Non-interactive Key Distribution,Identity-based Encryp-tion and Trapdoor Discrete Log Groups[J].Designs,Codes and Cryptography,2009,52(2):219-241.
[9]Freire E S V,Hofheinz D,Kiltz E,et al.Non-interactive Key Exchange[C]//Proceedings of the 16th Inter-national Conference on Practice and Theory in Public-key Cryptography.Berlin,Germany:Springer-Verlag,2013:254-271.
[10]apar ,Goeckel D,Paterson K G,et al.Signal-flow-based Analysis of Wireless Security Protocols[J].Information and Computation,2013,226:37-56.
[11]Al-Riyami S S,Paterson K G.Certificateless Public Key Cryptography[M]//Laih C.Advances in Cryptology-ASIACRYPT 2003.Berlin,Germany:Springer-Verlag,2003:452-473.
[12]Khabbaz M J,Assi C M,Fawaz W F.Disruption-tolerant Networking:A Comprehensive Survey on Recent Developments and Persisting Challenges[J].IEEE Communications Surveys & Tutorials,2012,14(2):607-640.
[13]Wu T,Lin H.Non-interactive Authenti-cated Key Agreement over the Mobile Communication Net-work[J].Mobile Networks and Applications,2013,18(5):594-599.
[14]魏云,魏福山,马传贵.一种强安全的无证书非交互密钥交换协议[J].计算机科学,2014,41(12):101-106.
[15]Cao Xuefei,Kou Weidong,Du Xiaoni.A Pairing-free Identity-based Authenticated Key Agreement Protocol with Minimal Message Exchanges[J].Information Sciences,2010,180(15):2895-2903.
编辑金胡考 |