共 45 条
- [1] Abe M, 2000, LECT NOTES COMPUT SC, V1880, P271
- [2] [Anonymous], 1984, P IEEE INT C COMP, DOI DOI 10.1016/J.TCS.2014.05.025
- [3] [Anonymous], P 3 ACM C COMP COMM
- [4] Benaloh JoshCohen., 1986, P 5 ANN ACM S PRINCI, P52, DOI 10.1145/10590.10595
- [5] QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J]. PHYSICAL REVIEW LETTERS, 1992, 68 (21) : 3121 - 3124
- [6] Brands S., 1994, Advances in Cryptology - CRYPTO '93. 13th Annual International Cryptology Conference Proceedings, P302
- [7] Camenisch J. L., 1995, Advances in Cryptology - EUROCRYPT '94. Workshop on the Theory and Application of Cryptographic Techniques. Proceedings, P428, DOI 10.1007/BFb0053458
- [8] Chaum D., 1983, Advances in Cryptology, Proceedings of Crypto 82, P199
- [9] Chaum D, 1988, Conference on the Theory and Application of Cryptography, P319