[1]Hassan Q F. Introduction to the Internet of things, Internet of things A to Z: Technologies and applications[C] Proc of the Institute of Electrical and Electronics Engineers. Piscataway, NJ: IEEE, 2018: 150[2]倪亮, 刘笑颜, 谷兵珂, 等. 适用于智能家居的格上基于身份多方认证密钥协商协议[J]. 计算机应用研究, 2024, 41(4): 11911197[3]Yi X, Bouguettaya A, Georgakopoulos D, et al. Privacyprotection for wireless medical sensor data[J]. IEEE Trans on Dependable & Secure Computing, 2016, 13(3): 369380[4]Mahmood Z, Huansheng N, Ata U, et al. Secure authentication and prescription safety protocol for telecare health services using ubiquitous IoT [J]. Applied Sciences, 2017, 7(10): 1069[5]Fitri N A, Rasyid M U H A, Sudarsono A. Secure attributebased encryption with access control to data medical records[C] Proc of the 2018 Int Electronics Symp on Knowledge Creation and Intelligent Computing(IESKCIC). Piscataway, NJ: IEEE, 2018: 105111[6]Ermatita Y, Bayu P I W W, Pradnyana A M. DiffieHellman algorithm for securing medical record data encryption keys[C] Proc of the Int Conf on Informatics, Multimedia, Cyber and Information System (ICIMCIS). Piscataway, NJ: IEEE, 2020: 296300[7]王彩芬, 陈丽. 基于格的用户匿名三方口令认证密钥协商协议[J]. 通信学报, 2018, 39(2): 2130[8]Xie S, Wu F, Zhang X, et al. Similarity test for privacypreserving medical data sharing based on NTRU encryption[C] Proc of the 9th IEEE Int Conf on Electronics Information and Emergency Communication (ICEIEC). Piscataway, NJ: IEEE, 2019: 14[9]白荣华, 魏强, 郭瑞, 等. 政务信息系统商用密码集约化平台设计与实现[J]. 信息安全研究, 2023, 9(5): 461468[10]王菲菲, 汪定. 基于雾计算的智能医疗三方认证与密钥协商协议 [J]. 软件学报, 2023, 34(7): 32723291[11]Sahu A K, Suraj S, Deepak P. Lightweightmultiparty authentication and key agreement protocol in IoTbased EHealthcare service [J]. ACM Trans on Multimedia Computing Communications and Applications, 2021 (17): 120 [12]Lyubashevsky V, Peikert C, Regev O. On ideal lattices and learning with errors over rings[C] Proc of the Annual Int Conf on the Theory and Applications of Cryptographic Techniques. Amsterdam: Academic, 2010: 123 [13]Shor P W. Polynomialtime algorithms for prime factorizetion and discrete logarithms on a quantum computer[J]. SIAM Review, 1999, 41(2): 303332[14]Regev O. On lattices, learning with errors, random linear codes, and cryptography[C] Proc of the 37th Annual ACM Symp on Theory of Computing (STOC’05). New York: ACM, 2005: 8493[15]Ajtai M. Generating hard instances of lattice problems[C] Proc of the 28th Annual ACM Symp on Theory of Computing. New York: ACM, 1996: 99108[16]Lamacchia B, Lauter K, Mityagin A. Stronger security of authenticated key exchange[C] Proc of the 1st Int Conf on Provable Security. New York: ACM, 2007: 116[17]Lyu Y, Liu S. Twomessage authenticated key exchange from publickey encryption[G] LNCS 14344: Proc of ESORICS 2023. Berlin: Springer, 2024: 143[18]Don J, Fehr S, Majenz C. Onlineextractability in the quantum randomoracle model [J]. arXiv preprint, arXiv:2103.03085, 2021[19]Ducas L, Kiltz E, Lepoint T, et al. CRYSTALSDilithium—Algorithm specifications and supporting documentation (Version 3.1)[EBOL]. (20210208) [20250507]. semanticscholar.orgpaperCRYSTALSDilithiumAlgorithmSpecificationsandDucasKiltzc3f9a3dc54470fca8fd14f9361 c0d523d14bbb78figure10[20]叶茂, 胡学先, 刘文芬. 基于格的三方口令认证密钥交换协议[J]. 电子与信息学报, 2013, 35(6): 13761381 [21]杨晓燕, 侯孟波, 魏晓超. 基于验证元的三方口令认证密钥交换协议[J]. 计算机研究与发展, 2016, 53(10): 22302238[22]刘雪艳, 王力, 郇丽娟, 等. 车联网环境下无证书匿名认证方案[J]. 电子与信息学报, 2022, 44(1): 295304[23]牛淑芬, 戈鹏, 宋蜜, 等. 移动社交网络中基于属性加密的隐私保护方案[J]. 电子与信息学报, 2023, 45(3): 847855
|