1. Diffie W, Hellman M E. New directions in cryptography. IEEE Trans Inform Theory, 1976, 22: 644–654
2. LNCS;M Bellare,1994
3. Bellare M, Rogaway P. Provably-secure session key distribution: the three party case. In: Leighton F T, Borodin A, eds. Proceedings of the 27th Annual ACM Symposium on Theory of Computing, Las Vegas, 1995. 57–66
4. Safavi-Naini R, Jiang S Q. Non-interactive conference key distribution and its applications. In: Abe M, Gligor V D, eds. Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, Tokyo, 2008. 271–282
5. Mitchell C J, Piper F C. Key storage in secure network. Discrete Appl Math, 1988, 21: 215–228