共 17 条
- [1] Hunt R., PKI and digital certification infrastructure, Ninth IEEE International Conference on Networks. IEEE, pp. 234-239, (2001)
- [2] Shamir A., Identity based cryptosystems and signature schemes, Advances in Cryptology Crypto84, pp. 47-53, (1984)
- [3] Al-Riyami S.S., Paterson K.G., Certificateless public key cryptography, Advances in Cryptology-ASIACRYPT 2003, pp. 452-473, (2003)
- [4] He D., Chen Y., Chen J., Et al., A new two-round certificateless authenticated key agreement protocol without bilinear pairings, Mathematical and Computer Modelling, 54, 11, pp. 3143-3152, (2011)
- [5] He D., Chen J., Hu J., A pairing-free certificateless authenticated key agreement protocol, International Journal of Communication Systems, 25, 2, pp. 221-230, (2012)
- [6] He D., Padhye S., Chen J., An efficient certificateless two-party authenticated key agreement protocol, Computers & Mathematics with Applications, 64, 6, pp. 1914-1926, (2012)
- [7] Tong D., Liu J.W., Mao K.F., Et al., Certificateless and pairing-free key agreement scheme for satellite network, Communications Security Conference (CSC 2014). IET, pp. 1-5, (2014)
- [8] Mohamed N.A.F., Hashim M.H.A., Bashier E., Et al., Fully-secure and efficient pairing-free certificateless authenticated key agreement protocol, 2012 World Congress on Internet Security (WorldCIS), IEEE, pp. 167-172, (2012)
- [9] Sun H.Y., Wen Q.Y., Zhang H., Et al., A strongly secure pairing-free certificateless authenticated key agreement protocol for low-power devices, Information Technology and Control, 42, 2, pp. 191-204, (2013)
- [10] Ghoreishi S.M., Abd R.S., Isnin I.F., Et al., New secure identity-based and certificateless authenticated key agreement protocols without pairings, 2014 International Symposium on Biometrics and Security Technologies (ISBAST), pp. 188-192, (2014)