|
[1]
|
Bennett, C.H. and Brassard, G. (1984) Quantum Cryptography: Public Key Distribution and Coin Tossing. Theoretical Computer Science, 560, 7-11. [Google Scholar] [CrossRef]
|
|
[2]
|
孙歆, 陈其祥, 吕磅, 等. 融合量子密钥调度的电力业务安全评估方法 [J/OL]. 电信科学, 2025: 1-15. 2026-01-20.[CrossRef]
|
|
[3]
|
Dutta, A. and Pathak, A. (2022) A Short Review on Quantum Identity Authentication Proto- cols: How Would Bob Know That He Is Talking with Alice? Quantum Information Processing, 21, Article No. 369. [Google Scholar] [CrossRef]
|
|
[4]
|
Zheng, X. and Zhao, Z. (2021) Quantum Key Distribution with Two-Way Authentication. Opti- cal and Quantum Electronics, 53, Article No. 304. [Google Scholar] [CrossRef]
|
|
[5]
|
Rivest, R.L., Shamir, A. and Adleman, L. (1978) A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21, 120-126. [Google Scholar] [CrossRef]
|
|
[6]
|
Lyu, Y., Li, Z., Zhou, H.S., Xue, H., Wang, M., Wang, S. and Liu, M. (2025) Bandwidth- Efficient Robust Threshold ECDSA in Three Rounds. Cryptology ePrint Archive, Paper 2025/828.
|
|
[7]
|
Diffie, W. and Hellman, M. (1976) New Directions in Cryptography. IEEE Transactions on Information Theory, 22, 644-654. [Google Scholar] [CrossRef]
|
|
[8]
|
Xie, Q., Wong, D.S., Wang, G., Tan, X., Chen, K. and Fang, L. (2017) Provably Secure Dy- namic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol with Extend- ed Security Model. IEEE Transactions on Information Forensics and Security, 12, 1382-1392. [Google Scholar] [CrossRef]
|
|
[9]
|
Ying, B. and Nayak, A. (2019) Lightweight Remote User Authentication Protocol for Multi- Server 5G Networks Using Self-Certified Public Key Cryptography. Journal of Network and Computer Applications, 131, 66-74. [Google Scholar] [CrossRef]
|
|
[10]
|
ul haq, I., Wang, J. and Zhu, Y. (2020) Secure Two-Factor Lightweight Authentication Pro- tocol Using Self-Certified Public Key Cryptography for Multi-Server 5G Networks. Journal of Network and Computer Applications, 161, Article 102660. [Google Scholar] [CrossRef]
|
|
[11]
|
Matsumoto, T., Takashima, Y. and Imai, H. (1986) On Seeking Smart Public-Key-Distribution Systems. IEICE Transactions, 69, 99-106.
|
|
[12]
|
Koblitz, N. (1987) Elliptic Curve Cryptosystems. Mathematics of Computation, 48, 203-209. [Google Scholar] [CrossRef]
|
|
[13]
|
Miller, V. (1986) Use of Elliptic Curves in Cryptography. In: Williams, H.C., Ed., Advances in Cryptology—CRYPTO’85 Proceedings. Lecture Notes in Computer Science, Vol. 218, Springer, 417-426. [Google Scholar] [CrossRef]
|
|
[14]
|
Canetti, R. and Krawczyk, H. (2001) Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B., Ed., Advances in Cryptology—EUROCRYPT 2001. Lecture Notes in Computer Science, Vol. 2045, Springer, 453-474. [Google Scholar] [CrossRef]
|
|
[15]
|
Yu, G., Li, Q., Mao, H., El-Latif, A.A.A. and Rodrigues, J.J.P.C. (2025) A Forward-Secure Symmetric Authenticated Key Exchange Scheme with Privacy Preservation for Internet of Things Applications. IEEE Internet of Things Journal, 12, 45762-45784. [Google Scholar] [CrossRef]
|
|
[16]
|
何映伟, 杨竞, 赵中军. 基于 QKD 网络的量子密钥管理系统体系结构研究 [J]. 通信技术, 2023, 56(3): 357-362.
|
|
[17]
|
罗俊. 量子密钥分发和后量子密码融合研究 [J]. 电信科学, 2025, 41(12): 53-62.
|
|
[18]
|
米瑞琪, 江浩东, 张振峰. 基于 Kyber 公钥加密的高效认证密钥交换协议 [J]. 软件学报, 2025, 36(10): 4430-4443.
|