Marking: A Privacy Protecting Approach Against Blackmailing
暂无分享,去创建一个
[1] Tatsuaki Okamoto,et al. Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes , 1992, CRYPTO.
[2] Jan Camenisch,et al. Fair Blind Signatures , 1995, EUROCRYPT.
[3] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97 , 1997 .
[4] Adi Shamir,et al. Witness indistinguishable and witness hiding protocols , 1990, STOC '90.
[5] Yiannis Tsiounis,et al. "Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash , 1996, ASIACRYPT.
[6] Hugo Krawczyk,et al. RSA-Based Undeniable Signatures , 1997, Journal of Cryptology.
[7] Markus Jakobsson,et al. Revokable and versatile electronic money (extended abstract) , 1996, CCS '96.
[8] A. Froomkin. Flood Control on the Information Ocean: Living With Anonymity, Digital Cash, and Distributed Databases , 1996 .
[9] David Naccache,et al. On blind signatures and perfect crimes , 1992, Comput. Secur..
[10] Amos Fiat,et al. Untraceable Electronic Cash , 1990, CRYPTO.
[11] Ueli Maurer,et al. Advances in Cryptology — EUROCRYPT ’96 , 2001, Lecture Notes in Computer Science.
[12] David Chaum,et al. Undeniable Signatures , 1989, CRYPTO.
[13] Stefan BrandsCWI,et al. Untraceable Oo-line Cash in Wallets with Observers , 1993 .
[14] Kwangjo Kim,et al. Advances in Cryptology — ASIACRYPT '96 , 1996, Lecture Notes in Computer Science.
[15] Markus Jakobsson,et al. Distributed "Magic Ink" Signatures , 1997, EUROCRYPT.
[16] Walter Fumy,et al. Advances in Cryptology — EUROCRYPT ’97 , 2001, Lecture Notes in Computer Science.
[17] Markus Jakobsson. Mini-Cash: A Minimalistic Approach to E-Commerce , 1999, Public Key Cryptography.
[18] Jacques Stern,et al. Provably Secure Blind Signature Schemes , 1996, ASIACRYPT.
[19] Elisa Bertino,et al. Computer Security — ESORICS 96 , 1996, Lecture Notes in Computer Science.
[20] Yiannis Tsiounis,et al. Anonymity Control in E-Cash Systems , 1997, Financial Cryptography.
[21] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[22] David Chaum,et al. Zero-Knowledge Undeniable Signatures , 1991, EUROCRYPT.
[23] Peter G. Neumann,et al. The risks of key recovery, key escrow, and trusted third-party encryption , 1997, World Wide Web J..
[24] Markus Jakobsson,et al. Designated Verifier Proofs and Their Applications , 1996, EUROCRYPT.
[25] Ernest F. Brickell,et al. Advances in Cryptology — CRYPTO’ 92 , 2001, Lecture Notes in Computer Science.
[26] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[27] Ueli Maurer,et al. Digital Payment Systems with Passive Anonymity-Revoking Trustees , 1996, ESORICS.
[28] Ivan Bjerre Damgård,et al. Advances in Cryptology — EUROCRYPT ’90 , 2001, Lecture Notes in Computer Science.