共 16 条
[1]
[Anonymous], 2005, LECT NOTES COMPUTER
[2]
[Anonymous], 2013, CHONGQING LIGONGXUE
[3]
Bresson E, 2002, LECT NOTES COMPUT SC, V2442, P465
[5]
Dwork C., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P409, DOI 10.1145/276698.276853
[6]
Gambs Sebastien., 2014, ASIACCS 14, P501
[7]
Herranz J, 2004, LECT NOTES COMPUT SC, V3269, P27
[8]
ID-based deniable ring authentication with constant-size signature
[J].
Frontiers of Computer Science in China,
2008, 2 (01)
:106-112
[9]
Naor M, 2002, LECT NOTES COMPUT SC, V2442, P481
[10]
Rivest R. L., 2001, P 7 INT C THEOR APPL, P552, DOI [DOI 10.1007/3-540-45682-132, DOI 10.1007/3-540-45682-1_32]