共 28 条
[1]
Bultel X., 2016, P 8 INT C FUN ALG FU, V49
[2]
Physical Zero-Knowledge Proof for Makaro
[J].
STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS, SSS 2018,
2018, 11201
:111-125
[3]
Goldwasser S., 1985, Symposium on Theory of Computing (STOC), P291, DOI [DOI 10.1145/22145, DOI 10.1145/22145.22178, 10.1145/22145.22178]
[4]
Gradwohl R, 2007, LECT NOTES COMPUT SC, V4475, P166
[6]
Towards User-Friendly Cryptography
[J].
PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY,
2017, 10311
:481-484
[7]
Ishikawa Rie, 2015, Unconventional Computation and Natural Computation. 14th International Conference, UCNC 2015. Proceedings, P215, DOI 10.1007/978-3-319-21819-9_16
[8]
The Minimum Number of Cards in Practical Card-Based Protocols
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT III,
2017, 10626
:126-155
[9]
Card-Based Cryptographic Protocols Using a Minimal Number of Cards
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I,
2015, 9452
:783-807