[1] H. Tanaka. A realization scheme for the identity-based cryptosystem [C].Proceedings.of.Advances.in.Cryptology.Crypto’87.[S.1.]:Springer-Verlag, 1987:341-349.
[2] Shi, Run‐hua, et al. A novel one-to-many and many-to-one asymmetric encryption model and its algorithms[J]. Security & Communication Networks, 2016, 8(18):3906-3913.
[3] 周彦伟, 杨波, 张文政. 无证书多接收者多消息签密机制[J]. 计算机学报,201740(7):1714-1724. [4] 期刊、会议、书籍名称不能用缩写。
[4] Camp W O, Homiller D P. Shared key encryption using long keypads: WO, US8050405[P]. 2011.
[5] 龙毅宏. 一种ibe密码装置及数据加解密方法, One kind ibe cryptographic device and method of data encryption and decryption:, CN 103532709 B[P]. 2016.
[6] Galindo D. Boneh-Franklin identity based encryption revisited[C]. International Conference on Automata, Languages and Programming. Springer-Verlag, 2005:791-802.
[7] 谢跃伟.浅谈PKI数字证书在WEB系统中的安全应用[J]. 中国新通信, 2017, 19(7):87-87.
[8] 宋深, 刘雪冬, 龙毅宏. 一种基于IBE加密技术的移动文件共享系统[J]. 软件, 2017, 38(3):22-26.
[9] 王学庆, 薛锐. 标准模型下适应性安全的BF-IBE方案[J]. 密码学报, 2017, 4(1):38-48.
[10] Shaw P. SECURE COMMUNICATION:, WO/2016/038200[P]. 2016.
[11] Hammi B, Monteuuis J P, Daniel E S, et al. ASN.1 Specification for ETSI Certificates and Encoding Performance Study[C]// IEEE International Conference on Mobile Data Management. IEEE, 2017:291-298.
[12] Luckett R, Lefkovics W, Suneja B. Microsoft Exchange Server 2007: The Complete Reference[M]. McGraw-Hill/Osborne Media, 2018.
[13] 胡仁林, 张立武. Web网站SSL/TLS协议配置安全研究[J]. 计算机系统应用, 2017, 26(10):124-132.