LEE S W,KIM W H,KIM H S,et al.Efficient password-based authenticated key agreement protocol[C]//International Conference on Computer Science and Applications.Perugia:Springer-Verlag,2004:617-626.
[5]
KWON J O,SAKURAI K,LEE D H.One-round protocol for two-party verifier-based password-authenticated key exchange[C]//Communications and Multimedia Security.Heraklion:[s.n.],2006:87-96.
POINTCHEVAL D.Password-based authenticated key exchange[C]//Proceedings of 15th IACR International Conference on Practice and Theory of Public-Key Cryptography.Darmstadt:Springer-Verlag,2012:390-397.
[10]
FUJIOKA A,SUZUKI K,XAGAWA K,et al.Strongly secure authenticated key exchange from factoring, codes, and lattices[C]//Proceedings of 15th IACR International Conference on Practice and Theory of Public-Key Cryptography.Darmstadt:Springer-Verlag,2012:467-484.
[11]
HUANG Zhen-jie,CHEN Dan,WANG Yu-min.Multi-signature with anonymous threshold subliminal channel for ad-hoc environments[C]//19th International Conference on Advanced Information Networking and Applications.Tamshui:IEEE Press,2005:67-71.