1. Li, J.K., Zhang, D.Y., Zhang, Y., et al: . Research of User Authentication Mechanism and Its Security Analysis 18, 126–128 (2001)
2. Li, X.Y., et al.: Study on evolution history and development trend of network trusted identity authentication technology. Cyberspace Security. 9(11), 1 (2018)
3. Zhu, Q., et al.: Research of the PKI CA authentication technology. Inform. Secur. Technol. 7, 37–39 (2016)
4. Song, X.R., Zhang, M., et al.: Research on the technology of network trusted identity authentication. Cyberspace Secur. 9, 69–77 (2018)
5. Hong, C.h., Heo, J., Jang, J.G., et al: Quantum identity authentication with single photon. Quantum Inf. Process. 16, 236 (2017)