Citation: | SHI Wei-min. An Improved Scheme of LeeB Secure Key Issuing Protocol[J]. Journal of Beijing University of Technology, 2010, 36(3): 401-404. |
[1] |
SHAMIR A.Identity-based cryptosystem and signature schemes[C]∥Advances in Cryptology 1984.Berlin:Springer-Verlag, 1984:47-53.
|
[2] |
PATERSON K G. ID-based signatures from pairings on elliptic curves[J]. Electronics Letters, 2003, 38 (18) : 1025-1026.
|
[3] |
BONEHD, FRANKLINM.Identity based encryption from weil pairing[C]∥Advances in Cryptology1984.Berlin:Springer-Verlag, 2001:213-229.
|
[4] |
BONEHD, FRANKLI N M.Short signature from weil pairing[C]∥Boyd C Asiacrypt 2001, Berlin:Springer-Verlag, 2001:514-532.
|
[5] |
CHEN L, HARRISON K, SOLDERA D, et al.Applications of multiple trust authorities in pairing based cryptosystems[C]∥Proc of Infrastructure Security Conference.Berlin:Springer-Verlag, 2002:260-275.
|
[6] |
GENTRY C.Certificate-based encryption and the certificate revocation problem[C]∥Advances in Cryptology-EUROCRYPT2003.Berlin:Springer-Verlag, 2003:272-293.
|
[7] |
AL-RIYAMI S, PATERSON K.Certificateless public key cryptography[C]∥Advances in Cryptology-Asiacrypt'2003.Berlin:Springer-Verlag, 2003:452-472.
|
[8] |
LEE B, BOYD E, DAESON E, et al.Secure key issuing in ID-based cryptography[C]∥In Proceedings of the SecondAustralian Information Security Workshop-AISW 2004.New Zealand:Australian Computer Society, Inc, 2004:69-74.
|
[1] | ZHOU Dawei, WEI Guoheng, ZHANG Huanguo. Key-management Scheme Based on Public-key Institution to Clustered Wireless Sensor Networks[J]. Journal of Beijing University of Technology, 2016, 42(5): 707-712. DOI: 10.11936/bjutxb2015070081 |
[2] | CAI Yong-quan, XUE Fei, YANG Yi. Rational Threshold Signature Based on Hierarchical Key[J]. Journal of Beijing University of Technology, 2013, 39(9): 1366-1370. |
[3] | YI Xiao-lin, LIU Xu-hui. Synchronized Key Generation Algorithm Based on Spatiotemporal Chaos Synchronization[J]. Journal of Beijing University of Technology, 2013, 39(5): 696-699. |
[4] | HAN Lei, LIU Ji-qiang, WEI Xue-ye, HOU Jie. Application Research on Key Management of Ad Hoc Network Based on PTPM[J]. Journal of Beijing University of Technology, 2012, 38(11): 1676-1682. |
[5] | ZHOU Yi-hua, LIU Liang. TPM Based Authenticated Key Agreement Protocol With One-way Anonymous[J]. Journal of Beijing University of Technology, 2012, 38(9): 1372-1376. |
[6] | SHI Wei-min. Enhanced Identity-based Deniable Authentication Protocol[J]. Journal of Beijing University of Technology, 2011, 37(3): 477-480. |
[7] | ZHAN Yang, TIAN Hai-bo, CHEN Xiao-feng, WANG Yu-min. ID-based Chameleon Hash Scheme and Signature Without Key Escrow[J]. Journal of Beijing University of Technology, 2010, 36(5): 685-688. |
[8] | FU Ying-fang, HE Jing-sha, LUAN Liang-yu, WANG Rong, LI Guo-rui. A Distributed Key Management Scheme for Wireless Mesh Networks[J]. Journal of Beijing University of Technology, 2009, 35(3): 403-408. |
[9] | CAI Yong-quan, WANG Ya-li. Conference Key Agreement Protocol Based on Elliptic Curve[J]. Journal of Beijing University of Technology, 2007, 33(8): 870-873. |
[10] | CAI Yong-quan, XIAO Chuang-bo. Security Frame of Private Key Certificate Based on Attribute and Its Realization[J]. Journal of Beijing University of Technology, 2004, 30(1): 68-70. |