共 36 条
- [1] (2020)
- [2] Lindell Y., Fast secure two-party ECDSA signing, Journal of Cryptology, 34, 4, (2021)
- [3] Schnorr CP., Efficient identification and signatures for smart cards, Proc. of the 1989 Workshop on the Theory and Application of Cryptographic Techniques, pp. 688-689, (1989)
- [4] Wang ZH, Zhang ZF., Overview on public key cryptographic algorithm SM2 based on elliptic curves, Journal of Information Security Research, 2, 11, pp. 972-982, (2016)
- [5] Kurbatov O, Kravchenko P, Poluyanenko N, Demenko Y, Kuznetsova T., Global digital identity and public key infrastructure, Proc. of the 16th Int’l Conf. on ICT in Education, Research and Industrial Applications. Integration, Harmonization and Knowledge Transfer. ICTERI Workshops 2020, pp. 1-12, (2020)
- [6] Information on German Identity Card. eID, (2022)
- [7] Chaum D., Security without Identification: Transaction systems to make big brother obsolete, Communications of the ACM, 28, 10, pp. 1030-1044, (1985)
- [8] Camenisch J, Lysyanskaya A., An efficient system for non-transferable anonymous credentials with optional anonymity revocation, Proc. of the 2001 Int’l Conf. on the Theory and Application of Cryptographic Techniques, pp. 93-118, (2001)
- [9] Camenisch J, Lysyanskaya A., Signature schemes and anonymous credentials from bilinear maps, Proc. of the 24th Annual Int’l Cryptology Conf. on Advances in Cryptology, pp. 56-72, (2004)
- [10] Muth R, Galal T, Heiss J, Tschorsch F., Towards smart contract-based verification of anonymous credentials, IACR Cryptology ePrint Archive, (2022)