共 30 条
[1]
New models for efficient authenticated dictionaries
[J].
COMPUTERS & SECURITY,
2015, 53
:203-214
[2]
Benabbas S, 2011, LECT NOTES COMPUT SC, V6841, P111, DOI 10.1007/978-3-642-22792-9_7
[4]
Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures
[J].
PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II,
2017, 10175
:152-182
[5]
Catalano D, 2013, LECT NOTES COMPUT SC, V7778, P55, DOI 10.1007/978-3-642-36362-7_5
[6]
Fiore D., 2012, P 2012 ACM C COMP CO, P501
[7]
Gao C., 2018, CLUSTER COMPUT, P1