共 25 条
[1]
Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
[4]
Borgohain T, 2015, Arxiv, DOI arXiv:1501.02211
[6]
Ducas L., 2018, IACR Trans. Cryptogr. Hardw. Embed. Syst., P238, DOI [DOI 10.13154/TCHES.V2018.I1.238-268, 10.13154/tches.v2018.i1.238-268]
[7]
Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices
[J].
IEEE SYSTEMS JOURNAL,
2019, 13 (03)
:2775-2785
[9]
Gupta D.S., 2018, 2018 4 INT C REC ADV, P1
[10]
PiLike: Post-Quantum Identity-Based Lightweight Authenticated Key Exchange Protocol for IIoT Environments
[J].
IEEE SYSTEMS JOURNAL,
2024, 18 (01)
:15-23