KOYAMA K.Secure conference key distribution schemes for conspiracy attack[C]//RUEPPEL A.Advances in Cryptology- Eurocrypt '92.Berlin:Springer-Verlag,1993:449-453.
毛剑,高虎明,王育民.一个新的广播信道会议密钥协商协议[J].电子学报,2004,32(4):642-644.MAO Jian,GAO Hu-ming,WANG Yu-min.A new conference-key agreement protocol under the broadcast channel [J]. Acta Electronica Sinica,2004,32(4):642-644.(in Chinese)
[4]
TSENG Y M.An improved conference-key agreement protocol with forward secrecy[J].Informatica,2005,16(2):275- 284.
[5]
IEEE Standards Department.IEEE P1363:standard specifications for public key cryptography [S/OL].[2006-04-28]. http://grouper.ieee.org/groups/1363.
[6]
XUN Yi.Identity-based fault-tolerant conference key agreement [J].IEEE Transactions on Dependable and Secure Computing,2004,1(3):170-177.
[7]
JOHNSON D,MENEZES A,VANSTONE S.The elliptic curve digital signature algorithm[J].International Journal of Information Security,2001,1(1):36-63.
[8]
KOBLITZ N,MENEZES A,VANSTONE S A.The state of elliptic curve cryptography[J].Designs,Codes and Crypto- graphy,2000,19(2/3):173-93.
[9]
SCHROEPPEL R,ORMAN H,MALLEY S O,et al.Fast key exchange with dliptic curve systems[C]//COPPERSMITH D. Advances in Cryptology-Crypto'95.Berlin:Springer-Verlag,1995:43-56.
[10]
DEWIN E,BOSSELAERS A,VANDENBERGHE S,et al.A fast software implementation for arithmetic operations in GF(2n) [C]//KIM K,MATSUMOTO T.Advances in Cryptology-Asiacrypt'96.Berlin:Springer-Verlag,1996:65-76.