共 27 条
[1]
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]
[Anonymous], CASE STUDIES SECURE
[3]
Barbosa M., 2008, P 2008 ACM S INFORM, P369
[4]
Bellare M., 1993, P ACM CCS, P62, DOI DOI 10.1145/168588.168596
[5]
Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting
[J].
ADVANCES IN CRYPTOLOGY, PT II,
2015, 9216
:107-129
[9]
Cheng L., 2015, Int. J. Netw. Security, V17, P597
[10]
Gentry C, 2009, LECT NOTES COMPUT SC, V5444, P437