李星,Internet的經(jīng)驗(yàn)與挑戰(zhàn),見(jiàn),石冰心主編,中國(guó)教育和科研計(jì)算機(jī)網(wǎng)的研究與發(fā)展(第一卷),武漢,華中理工大學(xué)出版社,1996,6-16.[2]A. Shamir.[J].Identity-based cryptosystem and signature schemes, In Proc. Crypto84, Santa Barbara, CA, Springer-Verlag.1984,:-[3]E. Okamoto, Proposal for identity-based key distribution systems, Electron. Lett., 1986, 22(24),1283-1284.[4]E. Okamoto, K. Tanaka, Key distribution system based on identification information, IEEE J. Select. Areas. Commun., 1989, 7(4), 481-485.[5]K. Ohta, Efficient identification and signature schemes, Electron. Lett., 1988, 24(2), 115-116.[6]S. Tsujii, ID-based cryptosystem using discrete logarithm problem, Electron. Lett., 1987, 23(24),1318-1320.[7]S. Tsujii, T. Itoh, An ID-based cryptosystem based on the discrete logarithm problem, IEEE J. Select. Areas. Commun., 1989, 7(4), 467-473.[8]L. Harn, S. B. Yang, ID-based cryptographic schemes for user identification, digital signature, and key distribution, IEEE J. Select. Areas. Commun., 1993, 11(5), 757-760.[9]劉建偉,王育民,肖國(guó)鎮(zhèn),基于Krypto Knight的移動(dòng)用戶認(rèn)證協(xié)議,電子學(xué)報(bào),1998,26(1),93-97.[10]周智,胡正名,個(gè)人通信網(wǎng)中的身份認(rèn)證技術(shù),通信學(xué)報(bào),1997,18(1),37-41.[11]徐勝波,武傳坤,王新梅,移動(dòng)通信網(wǎng)中的認(rèn)證與密鑰分配,電子學(xué)報(bào),1996,24(10),105-110.[12]林曉東,楊義先,馬嚴(yán),等,Internet防火墻系統(tǒng)的設(shè)計(jì)與實(shí)現(xiàn),通信學(xué)報(bào),1998,19(1),65-69.[13]L. Harn, New digital signature scheme based on discrete logarithm, Electron. Lett., 1994, 30(5), 396-398.[14]L. Harn, Digital signature with (t, n) shared verification based on discrete logarithms, Electron. Lett., 1993, 29(24), 1002-1003.[15]A. Shamir, How to share a secret, Comm. of ACM, 1979, 22(11), 612-613.
|