共 10 条
- [1] Aumann Y., 1998, INT C THEOR COMP SCI
- [2] AUMANN Y, 1998, CRYPTO 98 SANT BARB, P299
- [3] Barreto PSLM, 2002, LECT NOTES COMPUT SC, V2442, P354
- [4] BONEH D, 2001, LNCS, V2139
- [5] Deniable authentication protocols [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 2001, 148 (02): : 101 - 104
- [6] Dwork C., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P409, DOI 10.1145/276698.276853
- [8] Efficient identity based signature schemes based on pairings [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 : 310 - 324
- [9] Shamir A., 1984, LECT NOTES COMPUTER, V196, P47, DOI [DOI 10.1007/3-540-39568-7, 10.1007/3-540-39568-7_5, 10.1007/978-1-4757-0602-4_5, DOI 10.1007/978-1-4757-0602-4_5]