共 33 条
[21]
Fischlin M, 2005, LECT NOTES COMPUT SC, V3621, P152
[22]
Gerbush M, 2012, LECT NOTES COMPUT SC, V7658, P25, DOI 10.1007/978-3-642-34961-4_4
[23]
Goldreich O., 2004, Basic Applications, V2
[24]
IBM, 3730 IBM RZ
[25]
Jakobsson M, 1996, LECT NOTES COMPUT SC, V1070, P143
[26]
Jie Chen, 2012, Pairing-Based Cryptography - Pairing 2012. 5th International Conference. Revised Selected Papers, P122, DOI 10.1007/978-3-642-36334-4_8
[27]
Paquin C., 2013, U PROVE CRYPTOGRAPHI
[28]
Schnorr C. P., 1991, Journal of Cryptology, V4, P161, DOI 10.1007/BF00196725
[29]
Schnorr C.-P., 2001, LNCS, V2229, P1
[30]
Shoup V., 1997, Advances in Cryptology - EUROCRYPT '97. International Conference on the Theory and Application of Cryptographic Techniques Proceedings, P256