共 13 条
- [1] Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
- [2] [Anonymous], 2005, NDSS
- [3] Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
- [4] Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
- [5] Chow SSM, 2010, LECT NOTES COMPUT SC, V6055, P316
- [6] Guo H, 2013, LECT NOTES COMPUT SC, V8209, P330, DOI 10.1007/978-3-642-41227-1_19
- [7] Schnorr C. P., 1991, Journal of Cryptology, V4, P161, DOI 10.1007/BF00196725
- [8] Shamir A., 1984, ADV CRYPTOLOGY, P47, DOI 10.1007/3-540-39568-7_5
- [9] Sharmila Deva Selvi S., 2017, 2017768 CRYPT EPRINT
- [10] Srinivasan A., 2015, P 3 INT WORKSH SEC C, P41, DOI DOI 10.1145/2732516.27325192-S2.0-84950103549