共 37 条
- [1] Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
- [2] Tightly-Secure Authenticated Key Exchange [J]. THEORY OF CRYPTOGRAPHY (TCC 2015), PT I, 2015, 9014 : 629 - 658
- [3] Bellare M, 2004, LECT NOTES COMPUT SC, V3027, P268
- [4] Bellare M., 1993, CCS, P62
- [5] Tightly-Secure Signatures from Chameleon Hash Functions [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 : 256 - 279
- [6] Chen J., 2023, PQCRYPTO, P141
- [8] Identity based authenticated key agreement protocols from pairings [J]. 16TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2003, : 219 - 233
- [9] Chia J., 2021, FResearch., V10, P1
- [10] Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2021, PT II, 2021, 12727 : 448 - 479