共 18 条
[1]
[Anonymous], 1995, LNCS, DOI DOI 10.1007/3-540-49264-X17
[2]
[Anonymous], 2002, P 9 ACM C COMP COMM
[3]
Benaloh J., 1994, Proceedings of the Twenty-Sixth Annual ACM Symposium on the Theory of Computing, P544, DOI 10.1145/195058.195407
[4]
Camenisch J, 2001, LECT NOTES COMPUT SC, V2045, P93
[5]
Chaum D., 1983, Advances in Cryptology, Proceedings of Crypto 82, P199
[6]
CHAUM D, 1985, COMMUN ACM, V28, P1030, DOI 10.1145/4372.4373
[7]
CHAUM D, 1986, LNCS, V263, P118
[8]
CHAUM D, 1989, ADV CRYPTOLOGY CRYPT, P319
[10]
CHEN L, 1995, LECT NOTES COMPUTER, V1029, P232