[1]Diffie W, Hellman M. New directions in cryptography[J]. IEEE Trans on Information Theory, 1976, 22(6): 644654[2]Rives R A, Shamir L. Adleman a method of obtaining digital signatures and public key cryptosystems[J]. Communications of the ACM, 1978, 21(2): 120126[3]Koblitz N. Elliptic curve cryptosystem[J]. Mathematics of Computation, 2007, 48(177): 203209[4]Miller V. Use of elliptic curves in cryptography[G] LNCS 85. Berlin: Springer, 1985: 417426[5]Kohnfelder L. Towards a Practical PublicKey Cryptosystem[M]. Cambridge, MA: Massachusetts, Institute of Technology, 1978[6]沙瀛. 一种新型证书及其公开密钥基础设施[D]. 北京: 中国科学院, 2002[7]潘恒. 电子商务环境下基于PKI的信任问题研究[D]. 郑州: 解放军信息工程大学, 2006: 2327[8]张文凯, 曹元大. PKI体系中的密钥管理技术及实现方案[J]. 计算机与现代化, 2004, 9: 98103[9]沈昌祥. 中国国家院士沈昌祥谈我国的PKI建设[J]. 中国信息导报, 2002 (9): 5354[10]张秋余. PKI的发展及问题分析[J]. 微计算机信息, 2006, 22(6): 3941[11]Ellison C, Sehneier B. Ten risks of PKI[J]. Computer Security Journal, 2000, 16: 18[12]胡向东. 应用密码学[M]. 北京: 清华大学出版社, 2014[13]陈桂芳. 基于RSA算法的密钥协商协议[J]. 福建电脑, 2010, 26(3): 8586[14]国家密码管理局. SM2椭圆曲线公钥密码算法[S]. 北京: 中国标准出版社, 2010[15]Shamir A. Identitybased Cryptosystem and signature schemes[G] LNCS 196: Proc of CRYPTO84 on Advances in Cryptology. Berlin: Springer, 1984: 4753[16]Fiat A, Shamir A. How to prove yourself: Practical solutions to identification and signature problems[J]. On Advances in Cryptology, 1987, 263(25): 257265[17]Boneh D, Franklin M. Identity based Encryption from Weil Pairing[G] LNCS 2139: Proc of Crypto 2001. Berlin: Springer, 2001: 213229[18]Paterson K G. IDbased Signatures from Pairings on Elliptic Curves[J]. Electronics Letters, 2003, 38(18): 10251026[19]Cha J, Cheon J. An identitybased signature from gap Diffie Hellman groups[C] Proc of PKC03. Berlin: Springer, 2002: 1830[20]Barreto P S L M, Libert B, Mc Cullagh N, et al. Efficient and provably secure identitybased signatures and signcryption from bilinear maps[J]. Lecture Notes in Computer Science, 2005, 3788: 515532[21]Boyen X. Multipurpose identitybased signcryption, a swiss army knife for identitybased cryptography[G] LNCS 2729. Berlin: Springer, 2003: 383399[22]张金颖. 基于身份的密钥协商方案[J]. 信息安全与通信保密, 2007[23]祁正华. 基于身份的签密方案研究[D]. 南京: 南京邮电大学, 2011: 89[24]AlRiyami S, Paterson K. Certificateless public key cryptography[G] LNCS 2332: Proc of Asiacrypt03. Berlin: Springer, 2003: 452473[25]陈洪武. PKI和IBC的组合应用研究[D]. 郑州: 解放军信息工程大学, 2007[26]钟旭. IBE和CPK的对比分析[J]. 计算机安全, 2006[27]王斯. IBE与PKI相结合的信息安全技术研究与开发[D]. 武汉: 武汉理工大学, 2012: 23[28]陈华平, 范修斌, 吕述望. CFL专利: 中国[P]. 20160217
|