[1]Diffie W,Hellman M E.New Directions in Cryptography[J]. IEEE Trans on Information Theory, 1976, 22(6):644654.
[2]Shamir A.IdentityBased Cryptosystems and Signature Schemes[C]∥Proc of CRYPTO’84,1984:4753.
[3]Boneh,Frankl N M.IdentityBased Encryption from the Weil Pairing[C]∥Proc of CRYPTO’01,2001:213229.
[4]Smart N P. An Identity Based Authenticated Key Agreement Protocol Based on the Weil Pairing[J]. Electronics Letters, 2002, 38(13):630632.
[5]Chen L, Kudla C. Identity Based Authenticated Key Agreement Protocols from Pairings[C]∥Proc of the 16th IEEE Computer Security Foundations Workshop,2002:213219.
[6]陈铁明,叶敏克,蔡家楣.基于双线性对的可认证密钥协商协议[J].计算机科学,2008,35(11):110112.
[7]BlakeWilson S. Key Agreement Protocols and Their Security Analysis[C]∥Proc of the 6th IMA International Conference on Cryptography and Coding,1997:3045.
[8]Law L, Menezes A, Qu M, et al. An Efficient Protocol for Authenticated Key Agreement[J]. Designs, Codes and Cryptography, 2003,28(2):119134.