共 31 条
[1]
Alkim E, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P327
[2]
Ligero: Lightweight Sublinear Arguments Without a Trusted Setup
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:2087-2104
[3]
Aurora: Transparent Succinct Arguments for R1CS
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT I,
2019, 11476
:103-128
[4]
Ben-Sasson Eli., 2018, CRYPTOLOGY EPRINT AR
[5]
Updatable Anonymous Credentials and Applications to Incentive Systems
[J].
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19),
2019,
:1671-1685
[6]
Blömer J, 2018, LECT NOTES COMPUT SC, V10892, P221, DOI 10.1007/978-3-319-93387-0_12
[7]
Blum A., 1993, ADV CRYPTOLOGY, P278, DOI DOI 10.1007/3-540-48329-224
[8]
CRYSTALS - Kyber: a CCA-secure module-lattice-based KEM
[J].
2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2018),
2018,
:353-367
[9]
Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:1006-1018
[10]
Post-quantum key exchange for the TLS protocol from the ring learning with errors problem
[J].
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015,
2015,
:553-570