共 21 条
- [1] Bassalygo L.A., 1981, Problemy Peredachi Informatsii, V17, P81
- [2] How to Prove Knowledge of Small Secrets [J]. ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT III, 2016, 9816 : 478 - 498
- [3] Bellare O., 1992, ser. Lecture Notes in Computer Science, V740, P390
- [4] Bendlin R, 2011, LECT NOTES COMPUT SC, V6632, P169, DOI 10.1007/978-3-642-20465-4_11
- [5] Brakerski Z., 2009, P 3 INN THEOR COMP S, P309, DOI [10.1007/978-3-642-03356-811, DOI 10.1007/978-3-642-03356-811]
- [7] Capalbo M., 2002, P 34 ANN ACM S THEOR, P659, DOI [10.1145/509907, DOI 10.1145/509907, DOI 10.1145/509907.510003]
- [8] On the Amortized Complexity of Zero-Knowledge Protocols [J]. JOURNAL OF CRYPTOLOGY, 2014, 27 (02) : 284 - 316
- [9] Cramer R, 2009, LECT NOTES COMPUT SC, V5677, P177, DOI 10.1007/978-3-642-03356-8_11
- [10] Damgard Ivan, 2013, Computer Security - ESORICS 2013. 18th European Symposium on Research in Computer Security. Proceedings: LNCS 8134, P1, DOI 10.1007/978-3-642-40203-6_1