共 14 条
[1]
Abe M., 1996, Advances in Cryptology - ASIACRYPT'96 International Conference on the Theory and Applications of Cryptology and Information Security. Proceedings, P244, DOI 10.1007/BFb0034851
[2]
[Anonymous], 2009, P C USENIX SEC S
[3]
Arfaoui G, 2015, P PRIV ENH TECHN
[5]
Balasch J., 2010, P 19 USENIX SEC S
[6]
Algebraic MACs and Keyed-Verification Anonymous Credentials
[J].
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2014,
:1205-1216
[7]
Chaum D., 1983, Advances in Cryptology, Proceedings of Crypto 82, P199
[8]
Day J., 2011, WPES, P61, DOI DOI 10.1145/2046556.2046565
[9]
Fouque PA, 2001, LECT NOTES COMPUT SC, V1962, P90
[10]
Hufschmitt E, 2007, LECT NOTES COMPUT SC, V4575, P268