共 26 条
[1]
[Anonymous], 1988, P 12 ANN ACM S THEOR, DOI [DOI 10.1145/62212.62222, DOI 10.1145/62212]
[2]
Benaloh J. C., 1993, Advances in Cryptology., V765, P274, DOI 10.1007/3-540-48285-7_24
[3]
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[4]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P56
[5]
Camenisch J., 1998, P AS 98 BEIJ CHIN OC, V98, P160
[6]
Chandran N, 2007, LECT NOTES COMPUT SC, V4596, P423
[7]
CHAUM D, 1990, LECT NOTES COMPUT SC, V435, P212
[8]
CHAUM D, 1991, LECT NOTES COMPUT SC, V473, P458
[9]
CHAUM D, 1991, P 10 ANN INT C THEOR, V547, P257
[10]
De Santis A., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P566