共 37 条
[1]
Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically
[J].
CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2020,
:1987-2005
[2]
Revocable and Offline-Verifiable Self-Sovereign Identities
[J].
2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020),
2020,
:1021-1028
[3]
Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems
[J].
INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019),
2020, 11999
:307-323
[4]
Qualified eID Derivation into a Distributed Ledger based IdM System
[J].
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE),
2018,
:1406-1412
[5]
Abraham Andreas, 2017, Technical Report
[7]
[Anonymous], 2017, DEFINITION REQUIREME
[8]
[Anonymous], 2014, NDSS
[9]
Barreto PSLM, 2003, LECT NOTES COMPUT SC, V2576, P257
[10]
Benaloh J.C., 1993, EUROCRYPT, V765, P274, DOI [10.1007/3-540-48285-7_24, DOI 10.1007/3-540-48285-7_24]