共 28 条
[1]
Asokan N, 1998, LECT NOTES COMPUT SC, V1403, P591, DOI 10.1007/BFb0054156
[2]
Ateniese G., 2004, ACM Transactions on Information and Systems Security, V7, P1, DOI 10.1145/984334.984335
[3]
Balachandran Vivek, 2013, Information Security Practice and Experience. 9th International Conference, ISPEC 2013. Proceedings, P309, DOI 10.1007/978-3-642-38033-4_22
[4]
Efficient and practical fair exchange protocols with off-line TTP
[J].
1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS,
1998,
:77-85
[5]
Short group signatures
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS,
2004, 3152
:41-55
[6]
Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
[7]
Canetti R, 1997, LECT NOTES COMPUT SC, V1294, P455
[8]
Canetti R, 2008, LECT NOTES COMPUT SC, V4965, P489
[9]
Cheng R, 2011, LECT NOTES COMPUT SC, V6980, P188, DOI 10.1007/978-3-642-24316-5_14
[10]
Zeroizing Attacks on Indistinguishability Obfuscation over CLT13
[J].
PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT I,
2017, 10174
:41-58