共 45 条
[1]
Abe M, 2000, LECT NOTES COMPUT SC, V1880, P271
[2]
[Anonymous], 1984, P IEEE INT C COMP, DOI DOI 10.1016/J.TCS.2014.05.025
[3]
[Anonymous], P 3 ACM C COMP COMM
[4]
Benaloh JoshCohen., 1986, P 5 ANN ACM S PRINCI, P52, DOI 10.1145/10590.10595
[6]
Brands S., 1994, Advances in Cryptology - CRYPTO '93. 13th Annual International Cryptology Conference Proceedings, P302
[7]
Camenisch J. L., 1995, Advances in Cryptology - EUROCRYPT '94. Workshop on the Theory and Application of Cryptographic Techniques. Proceedings, P428, DOI 10.1007/BFb0053458
[8]
Chaum D., 1983, Advances in Cryptology, Proceedings of Crypto 82, P199
[9]
Chaum D, 1988, Conference on the Theory and Application of Cryptography, P319