[1] BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing[C]//Proceedings of the 21st Annual Interna-tional Cryptology Conference, Santa Barbara, Aug 19-23, 2001. Berlin, Heidelberg: Springer, 2001: 213-229.
[2] HORWITZ J, LYNN B. Toward hierarchical identity-based encryption[C]//Proceedings of the 2002 International Con-ference on the Theory and Applications of Cryptographic Techniques, Amsterdam, Apr 28-May 2, 2002. Berlin, Hei-delberg: Springer, 2002: 466-481.
[3] SAHAI A, WATERS B. Fuzzy identity-based encryption[C]// Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, May 22-26, 2005. Berlin, Heidelberg: Springer, 2005: 457-473.
[4] BOLDYREVA A, GOYAL V, KUMAR V. Identity-based encryption with efficient revocation[C]//Proceedings of the 15th ACM Conference on Computer and Communications Security, Alexandria, Oct 27-31, 2008. New York: ACM, 2008: 417-426.
[5] 密码行业标准化技术委员会. SM9标识密码算法: GM/T0044—2016[S]. 2018-03-10.
Cryptography Standardization Technical Committee. SM9 identity-based cryptographic algorithm: GM/T0044—2016[S]. 2018-03-10.
[6] CHENG Z. Security analysis of SM9 key agreement and encryption[C]//Proceedings of the 2018 International Con-ference on Information Security and Cryptology, Fuzhou, Dec 14-17, 2018. Cham: Springer, 2018: 3-25.
[7] SUN S, MA H, ZHANG R, et al. Server-aided immediate and robust user revocation mechanism for SM9[J]. Cyber-security, 2020, 3(1): 1-13.
[8] MU Y, XU H, LI P, et al. Secure two-party SM9 signing[J]. Science China Information Sciences, 2020, 63(8): 1-3.
[9] 赖建昌, 黄欣沂, 何德彪, 等. 国密SM9数字签名和密钥封装算法的安全性分析[J]. 中国科学: 信息科学, 2021, 51(11): 1900-1913.
LAI J C, HUANG X Y, HE D B, et al. Security analysis of SM9 digital signature and key encapsulation[J]. Scientia Sinica Informationis, 2021, 51(11): 1900-1913.
[10] 秦宝东, 张博鑫, 白雪. 基于仲裁的SM9标识加密算法[J]. 计算机学报, 2022, 45(2): 412-426.
QIN B D, ZHANG B X, BAI X. Mediated SM9 identity-based encryption algorithm[J]. Chinese Journal of Compu-ters, 2022, 45(2): 412-426.
[11] DWORK C, NAOR M, SAHAI A. Concurrent zero-know-ledge[C]//Proceedings of the 30th Annual ACM Symposium on Theory of Computing, Dallas, May 24-26, 1998. New York: ACM,1998: 409-418.
[12] AUMANN Y, RABIN M O. Efficient deniable authentica-tion of long messages[C]//Proceedings of the 1998 Interna-tional Conference on Theoretical Computer Science in Hon-our of Professor Manuel Blum??s 60th Birthday, California, Apr 26, 1998. Tokyo: CiNii, 1998: 20-24.
[13] DENG X, LEE C H, ZHU H. Deniable authentication proto-cols[J]. IEE Proceedings-Computers and Digital Techniques, 2001, 148(2): 101-104.
[14] CAO T, LIN D, XUE R. An efficient ID-based deniable authentication protocol from pairings[C]//Proceedings of the 19th International Conference on Advanced Informa-tion Networking and Applications, Taiwan, China, Mar 28-30, 2005. Piscataway: IEEE, 2005: 388-391.
[15] CHOU J S, CHEN Y, HUANG J C. A ID-based deniable authentication protocol on pairings[J]. Cryptology ePrint Archive, 2006: 335.
[16] LIM M H, LEE S, PARK Y, et al. An enhanced ID-based deniable authentication protocol on pairings[C]//LNCS 4706: Proceedings of the 2007 International Conference on Com-putational Science and Its Applications, Kuala Lumpur, Aug 26-29, 2007. Berlin, Heidelberg: Springer, 2007: 1008-1017.
[17] TIAN H, CHEN X, DING Y. Analysis of two types deniable authentication protocols[J]. International Journal of Network Security, 2009, 9(3): 242-246.
[18] LI F, XIONG P, JIN C. Identity-based deniable authentica-tion for ad hoc networks[J]. Computing, 2014, 96(9): 843-853.
[19] WU W, LI F. An efficient identity-based deniable authenti-cated encryption scheme[J]. KSII Transactions on Internet and Information Systems, 2015, 9(5): 1904-1919.
[20] HUANG W, LIAO Y, ZHOU S, et al. An efficient deniable authenticated encryption scheme for privacy protection[J]. IEEE Access, 2019, 7: 43453-43461.
[21] KAR J. Provably secure certificateless deniable authentica-ted encryption scheme[J]. Journal of Information Security and Applications, 2020, 54: 102581.
[22] POINTCHEVAL D, STERN J. Security arguments for digital signatures and blind signatures[J]. Journal of Crypto-logy, 2000, 13(3): 361-396.
[23] PBC Library. The pairing-based cryptography library[EB/OL]. (2013-06-14)[2022-06-01]. http://crypto.stanford.edu/pbc/. |