共 20 条
[1]
[Anonymous], 2006, Report 2006/165
[2]
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[3]
Barak B., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P1
[4]
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[5]
Blaze M., 1997, ATOMIC PROXY CRYPTOG
[6]
Short group signatures
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS,
2004, 3152
:41-55
[7]
Boneh D, 2006, LECT NOTES COMPUT SC, V4004, P573
[8]
Canetti R., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P131, DOI 10.1145/276698.276721
[9]
Canetti R, 1997, LECT NOTES COMPUT SC, V1294, P455
[10]
Dodis Y., 2003, 10 NETW DISTR SYST S