[1]Goldwasser S, Micali S. Probabilistic encryption[J]. Journal and System Sciences, 1984, 28(2): 270299[2]冯登国. 可证明安全性理论与方法研究[J]. 软件学报, 2005, 16(10): 17431756[3]杨波. 密码学中的可证明安全性[OL]. 陕西师范大学计算机学院讲义. (20141111)[20160421]. http:wenku.baidu.comview654c4b5b58fb770bf78a5587.html?from=search&isbtn=1[4]陈华平, 范修斌, 吕述望. CFL: 中国[P]. 20160217[5]张华, 温巧燕, 金正平. 可证明安全算法与协议[M]. 北京: 科学出版社, 2012[6]Naor M, Yung M. Public key cryptosystems provably secure against chosen ciphertext attack[C] Proc of the 22nd Symp on Theory of Computing (STOC). New York: ACM, 1990: 427437[7]Diffie W, Hellman M E. New directions in cryptography[J]. IEEE Trans on Information Theory, 1976, 22(6): 644654[8]Dolev D, Dwork C, Naor M. Nonmalleable cryptography[J]. SIAM Journal of Computing, 2000, 30(2): 391437 [9]任伟. 可证明安全公钥密码学探究[J]. 信息网络安全, 2011 (11): 14[10]Bellare M, Rogaway P. Random oracles are practical: A paradigm for designing efficient protocols[C] Proc of the 1st ACM Conf on Computer and Communication Security. New York: ACM, 1993: 6273[11]Fiat A, Shamir A. How to prove yourself: Practical solutions to identification and signature problems[G] LNCS 263: Proc of Advances in CryptologyCrypto86. Berlin: Springer, 1986: 186194[12]Rackoff C, Simon D. Noninteractive zeroknowledge proof of knowledge and chosen ciphertext attack[G] LNCS 576: Proc of Advances in CryptologyCRYPTO 1991. Berlin: Springer, 1991: 433444[13]Cramer R, Shoup V. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack[G] LNCS 1462: Proc of Advances in CryptologyCrypto98. Berlin: Spring, 1998: 1325[14]Shamir A. Identitybased cryptosystems and signature schemes[G] LNSC 196. Berlin: Springer, 1984: 4753[15]Canetti R, Goldreich O, Halevi S. The random oracle methodology revisited[C] Proc of the 30th Annual Symp on the Theory of Computing (STOC98). New York: ACM,1998: 209218[16]Bellare M, Rogaway P. The exact security of digital signatures—How to sign with RSA and Rabin[G] LNCS 1070: Proc of Advances in CryptologyEurocrypt96. Berlin: Srpinger, 1996: 399416[17]Hu B, Wang D, Zhang Z, et al. Certificateless signature: A new security model and animproved generic construction[J]. Design Codes and Cryptography, 2007, 42(2): 109126[18]Schnorr C. Security of blind discrete log signatures against interactive attacks[G] LNCS 2229: Proc of ICICS2001. Berlin: Springer, 2001: 112[19]Fujisaki E, Okamato T. Secure integration of asymmetric and symmetric encryption scheme[G] LNCS 1666: Proc of Advances in CryptologyCrypto99. Berlin: Springer, 1999: 537544
|