共 25 条
[1]
Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems
[J].
INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019),
2020, 11999
:307-323
[2]
Allen C., 2016, The path to self-sovereign identity
[3]
Boldyreva A, 2003, LECT NOTES COMPUT SC, V2567, P31
[4]
Boneh Dan, 2018, Advances in Cryptology - ASIACRYPT 2018. 24th International Conference on the Theory and Application of Cryptology and Information Security. Proceedings: Lecture Notes in Computer Science (LNCS 11273), P435, DOI 10.1007/978-3-030-03329-3_15
[6]
Bulletproofs: Short Proofs for Confidential Transactions and More
[J].
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2018,
:315-334
[7]
Cooper D., 2008, RFC 5280
[8]
Drijvers M., 2019, IACR CRYPTOL EPRINT, P514
[9]
Eastlake D., 2011, 6066 RFC INT ENG TAS, DOI [10.17487/rfc6234., DOI 10.17487/RFC6234]
[10]
L. Foundation, 2020, TAIV SKYW