[1] GONG L, ALGHAZZAWI D M, CHENG L. BCoTsentry: A blockchain-based identity authentication framework for IoT devices[J]. Information, 2021,12(5). DOI:10.3390/info12050203.
[2] 李雄. 多种环境下身份认证协议的研究与设计[D]. 北京:北京邮电大学, 2012.
[3] SUCASAS V, MANTAS G, RADWAN A, et al. An OAuth2-based protocol with strong user privacy preservation for smart city mobile e-Health apps[C]// 2016 IEEE International Conference on Communications (ICC). 2016. DOI:10.1109/ICC.2016.7511598.
[4] 胡共由. 基于OpenID物联网应用统一认证技术的研究[D]. 上海:复旦大学, 2013.
[5] BELLAMY-MCINTYRE J, LUTERROTH C, WEBER G. OpenID and the enterprise: A model-based analysis of single sign-on authentication[C]// Proceedings of the 2011 IEEE 15th International Enterprise Distributed Object Computing Conference. 2011:129-138.
[6] 鲁金钿,尧利利,何旭东,等. 改进的OpenID Connect协议及其安全性分析[J]. 计算机应用, 2017,37(5):1347-1352.
[7] RECORDON D, REED D. OpenID 2.0: A platform for user-centric identity management[C]// Proceedings of the 2nd ACM Workshop on Digital Identity Management. 2006:11-16.
[8] 刘艳民,鄂海红. 基于OpenID2.0的认证授权系统的分析与设计[J]. 软件, 2015,36(10):1-4.
[9] GOLDWASSER S, MICALI S. Probabilistic encryption[J]. Journal of Computer and System Sciences, 1984,28(2):270-299.
[10]刘艳民. 基于OpenID的认证授权系统的研究与设计[D]. 北京:北京邮电大学, 2016.
[11]HAMMANN S, SASSE R, BASIN D. Privacy-preserving OpenID connect[C]// Proceedings of the 15th ACM Asia Conference on Computer and Communications Security. 2020:277-289.
[12]CHAUM D. Blind signatures for untraceable payments[C]// Proceedings of CRYPTO ’82. 1982:199-203.
[13]CHAUM D. Blind signature system[C]// Proceedings of CRYPTO ’83. 1983. DOI: 10.1007/978-1-4684-4730-9_14.
[14]CHAUM D, FIAT A, NAOR M. Untraceable electronic cash[C]// Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology. 1988:319-327.
[15]袁峰,程朝辉. SM9标识密码算法综述[J]. 信息安全研究, 2016,2(11):1008-1027.
[16]OLIVEIRA L B, DAHAB R, LOPEZ J, et al. Identity-based encryption for sensor networks[C]// Proceedings of the 15th IEEE International Conference on Pervasive Computing and Communications Workshops. 2007:290-294.
[17]WIENER M J. Cryptanalysis of short RSA secret exponents[J]. IEEE Transactions on Information Theory, 1990,36(3):553-558.
[18]CASTAGNOS G, LAGUILLAUMIE F. Linearly homomorphic encryption from DDH[C]// CT-RSA 2015. 2015:487-505.
[19]PAILLIER P. Public-key cryptosystems based on composite degree residuosity classes[C]// Proceedings of the 17th International Conference on Theory and Application of Cryptographic Techniques. 1999:223-238.
[20]CASTAGNOS G, CATALANO D, LAGUILLAUMIE F, et al. Two-party ECDSA from hash proof systems and efficient instantiations[C]// 39th Annual International Cryptology Conference. 2019:191-221.
[21]YUEN T H, CUI H, XIE X. Compact zero-knowledge proofs for threshold ECDSA with trustless setup[C]// IACR International Conference on Public-Key Cryptography. 2021:481-511.
[22]JAULMES , JOUX A. A chosen-ciphertext attack against NTRU[C]// Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology. 2000:20-35.
[23]ZHANG J, KANG J, TENG G, et al. Study on secure communication of internet of vehicles based on identity-based cryptograph[C]// 2021 13th International Conference on Advanced Infocomm Technology (ICAIT). 2021:156-160.
[24]赖建昌,黄欣沂,何德彪,等. 国密SM9数字签名和密钥封装算法的安全性分析[J]. 中国科学(信息科学), 2021,51(11):1900-1913.
[25]张柁苧,王雄,池亚平. 基于SM9的OpenStack双向认证方案研究与设计[J]. 北京电子科技学院学报, 2021,29(4):45-50.
[26]CREMERS C J. The scyther tool: Verification, falsification, and analysis of security protocols[C]// Proceedings of the 20th International Conference on Computer Aided Verification. 2008:414-418.
|