共 47 条
- [1] Aitamurto Tanja., 2015, International Journal of Communication, V9, P3523
- [4] Balouchestani Arian, 2019, 2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), P139, DOI 10.1109/ISCISC48546.2019.8985152
- [5] Blockchain Technology: Supply Chain Insights from ERP [J]. BLOCKCHAIN TECHNOLOGY: PLATFORMS, TOOLS AND USE CASES, 2018, 111 : 69 - 98
- [6] Fighting Fake News: Two Stream Network for Deepfake Detection via Learnable SRM [J]. IEEE Transactions on Biometrics, Behavior, and Identity Science, 2021, 3 (03): : 320 - 331
- [7] Boneh D., 2020, Efficient polynomial commitment schemes for multiple points and polynomials
- [8] Halo Infinite: Proof-Carrying Data from Additive Polynomial Commitments [J]. ADVANCES IN CRYPTOLOGY (CRYPTO 2021), PT I, 2021, 12825 : 649 - 680
- [9] Bulletproofs: Short Proofs for Confidential Transactions and More [J]. 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, : 315 - 334
- [10] Chase M, 2005, LECT NOTES COMPUT SC, V3494, P422