A User Efficient Fair Blind Signature Scheme for Untraceable Electronic Cash
暂无分享,去创建一个
[1] Colin Boyd,et al. A New Multiple Key Cipher and an Improved Voting Scheme , 1990, EUROCRYPT.
[2] Tatsuaki Okamoto,et al. Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes , 1992, CRYPTO.
[3] Adi Shamir,et al. Cryptanalysis of Certain Variants of Rabin's Signature Scheme , 1984, Inf. Process. Lett..
[4] Atsushi Fujioka,et al. A Practical Secret Voting Scheme for Large Scale Elections , 1992, AUSCRYPT.
[5] Wei-Kuei Chen,et al. Efficient on-line electronic checks , 2005, Appl. Math. Comput..
[6] Stefan BrandsCWI,et al. Untraceable Oo-line Cash in Wallets with Observers , 1993 .
[7] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[8] Tatsuaki Okamoto,et al. Universal Electronic Cash , 1991, CRYPTO.
[9] Jan Camenisch,et al. Fair Blind Signatures , 1995, EUROCRYPT.
[10] Jacques Stern,et al. New Blind Signatures Equivalent to Factorization , 1997, CCS 1997.
[11] Claus-Peter Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1990, EUROCRYPT.
[12] Chin-Laung Lei,et al. A Multi-Recastable Ticket Scheme for Electronic Elections , 1996, ASIACRYPT.
[13] Lila Kari,et al. Secret ballot elections in computer networks , 1991, Computers & security.
[14] C. P. Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.
[15] Jean-Jacques Quisquater,et al. A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory , 1988, EUROCRYPT.
[16] René C. Peralta,et al. A simple and fast probabilistic algorithm for computing square roots modulo a prime number , 1986, IEEE Trans. Inf. Theory.
[17] Jan Camenisch,et al. Blind Signatures Based on the Discrete Logarithm Problem , 1994, EUROCRYPT.
[18] Hugh C. Williams,et al. A modification of the RSA public-key encryption procedure (Corresp.) , 1980, IEEE Trans. Inf. Theory.
[19] Edwin Weiss,et al. A user authentication scheme not requiring secrecy in the computer , 1974, Commun. ACM.
[20] Niels Ferguson,et al. Single Term Off-Line Coins , 1994, EUROCRYPT.
[21] Chin-Laung Lei,et al. User efficient blind signatures , 1998 .
[22] Jacques Stern,et al. Provably Secure Blind Signature Schemes , 1996, ASIACRYPT.
[23] George B. Purdy,et al. A high security log-in procedure , 1974, Commun. ACM.
[24] Chin-Laung Lei,et al. Secure rewarding schemes , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.
[25] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .
[26] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[27] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[28] David Naccache,et al. On blind signatures and perfect crimes , 1992, Comput. Secur..
[29] Amos Fiat,et al. Untraceable Electronic Cash , 1990, CRYPTO.
[30] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .