共 28 条
[1]
Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
[2]
Amit K., 2003, PROXY BLIND SIGNATUR
[3]
[Anonymous], 1985, P WORKSH THEOR APPL
[4]
Bellare M., 2006, P 13 ACM C COMP COMM, P390, DOI DOI 10.1145/1180405.1180453
[5]
Burt K., 2011, ENCY CRYPTOGRAPHY SE, P1061, DOI [10.1007/978-1-4419-5906-5_432, DOI 10.1007/978-1-4419-5906-5_432]
[6]
CHAUM D, 1988, LECT NOTES COMPUT SC, V330, P177
[7]
Ducas L, 2013, LECT NOTES COMPUT SC, V8042, P40, DOI 10.1007/978-3-642-40041-4_3
[8]
Gentry C, 2008, ACM S THEORY COMPUT, P197
[10]
Hoffstein J, 2003, LECT NOTES COMPUT SC, V2612, P122