共 14 条
[1]
[Anonymous], 2018, New York Times
[2]
[Anonymous], 2002, P 9 ACM C COMPUTER C
[3]
Ben-Sasson E, 2013, LECT NOTES COMPUT SC, V8043, P90, DOI 10.1007/978-3-642-40084-1_6
[4]
DecentID: Decentralized and Privacy-preserving Identity Storage System using Smart Contracts
[J].
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE),
2018,
:37-42
[5]
On the Size of Pairing-Based Non-interactive Arguments
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II,
2016, 9666
:305-326
[6]
UnlimitID: Privacy-Preserving Federated Identity Management using Algebraic MACs
[J].
PROCEEDINGS OF THE 2016 ACM WORKSHOP ON PRIVACY IN THE ELECTRONIC SOCIETY (WPES'16),
2016,
:139-142
[7]
Paquin C., 2011, Microsoft Corporation Draft Revision, V1
[8]
Pinocchio: Nearly Practical Verifiable Computation
[J].
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2013,
:238-252
[9]
Sakimura N., 2014, OpenID connect core 1.0
[10]
Schanzenbach M., 2018, P INT C TRUST SEC PR