共 33 条
[1]
Bar-Ilan J., 1989, Proceedings of the Eighth Annual ACM Symposium on Principles of Distributed Computing, P201, DOI 10.1145/72981.72995
[2]
Baric N., 1997, Advances in Cryptology - EUROCRYPT '97. International Conference on the Theory and Application of Cryptographic Techniques Proceedings, P480
[3]
Boneh D., 2011, Encyclopedia of Cryptography and Security, P347, DOI [10.1007/978-1-4419-5906-5_145, DOI 10.1007/978-1-4419-5906-5_145]
[4]
Boudot F, 2000, LECT NOTES COMPUT SC, V1807, P431
[5]
Canetti R., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P98
[6]
Canetti R, 1999, LECT NOTES COMPUT SC, V1592, P90
[7]
Damgard Ivan, 2012, Security and Cryptography for Networks. Proceedings of the 8th International Conference (SCN 2012), P241, DOI 10.1007/978-3-642-32928-9_14
[8]
Damgard Ivan., 2003, STOC, P426
[9]
Dan Boneh, 2017, LATINCRYPT
[10]
Di Crescenzo G, 2001, LECT NOTES COMPUT SC, V2045, P40