共 25 条
- [1] Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
- [2] Cha JC, 2003, LECT NOTES COMPUT SC, V2567, P18
- [3] Chen Y., 2013, IACR CRYPTOLOGY EPRI, P783
- [4] New Approaches for Deniable Authentication [J]. JOURNAL OF CRYPTOLOGY, 2009, 22 (04) : 572 - 615
- [5] Dwork C., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P409, DOI 10.1145/276698.276853
- [6] Gambs Sebastien., 2014, ASIACCS 14, P501
- [9] Hwang S., 2012, ADV INTELLIGENT SYST, V21, P41, DOI [10.1007/978-3-642-35473-15, DOI 10.1007/978-3-642-35473-15]