共 12 条
[1]
Canetti R.(2000)Security and composition of multiparty cryptographic protocols J. Cryptol. 13 143-202
[2]
Even S.(1985)A randomized protocol for signing contracts Communications of the ACM 28 637-647
[3]
Goldreich O.(1996)How to construct constant-round zero-knowledge proof systems for NP J. Cryptol. 9 167-190
[4]
Lempel A.(1986)How to construct random functions J. ACM 33 792-807
[5]
Goldreich O.(1988)A digital signature scheme secure against adaptive chosen-message attacks SIAM J. Comput. 17 281-308
[6]
Kahan A.(undefined)undefined undefined undefined undefined-undefined
[7]
Goldreich O.(undefined)undefined undefined undefined undefined-undefined
[8]
Goldwasser S.(undefined)undefined undefined undefined undefined-undefined
[9]
Micali S.(undefined)undefined undefined undefined undefined-undefined
[10]
Goldwasser S.(undefined)undefined undefined undefined undefined-undefined