暂无分享,去创建一个
Andrew Chi-Chih Yao | Chenxing Li | Yang Yu | Xiliang Zhang | Da Zhang | A. Yao | Xiliang Zhang | Da Zhang | Yang Yu | Chenxing Li
[1] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[2] Boaz Barak,et al. A zero-knowledge protocol for nuclear warhead verification , 2014, Nature.
[3] Helger Lipmaa,et al. On Diophantine Complexity and Statistical Zero-Knowledge Arguments , 2003, ASIACRYPT.
[4] Kazumaro Aoki,et al. SEC X.2: Recommended Elliptic Curve Domain Parameters , 2008 .
[5] Patrick Bayer,et al. The European Union Emissions Trading System reduced CO2 emissions despite low prices , 2020, Proceedings of the National Academy of Sciences.
[6] Johannes Merkle,et al. Elliptic Curve Cryptography (ecc) Brainpool Standard Curves and Curve Generation , 2010 .
[7] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[8] Valerie J. Karplus,et al. Integrity of firms’ emissions reporting in China’s early carbon markets , 2019, Nature Climate Change.
[9] Andrew Chi-Chih Yao,et al. Theory and application of trapdoor functions , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[10] S. Rajsbaum. Foundations of Cryptography , 2014 .
[11] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[12] E. Duflo,et al. Truth-Telling by Third-Party Auditors and the Response of Polluting Firms: Experimental Evidence from India , 2013 .
[13] Ivan Damgård,et al. Commitment Schemes and Zero-Knowledge Protocols , 1998, Lectures on Data Security.
[14] Nicholas Ryan,et al. The Value of Regulatory Discretion: Estimates from Environmental Inspections in India , 2014 .
[15] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[16] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[17] Manuel Blum,et al. Coin flipping by telephone a protocol for solving impossible problems , 1983, SIGA.
[18] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[19] Dan Boneh,et al. Bulletproofs: Short Proofs for Confidential Transactions and More , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[20] Silvio Micali,et al. Non-Interactive Zero-Knowledge Proof Systems , 1987, CRYPTO.