Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks
暂无分享,去创建一个
[1] Marc Girault,et al. An Identity-based Identification Scheme Based on Discrete Logarithms Modulo a Composite Number , 1991, EUROCRYPT.
[2] Andrew S. Tanenbaum,et al. Computer networks (3rd ed.) , 1996 .
[3] Jan Camenisch,et al. Group signature schemes and payment systems based on the discrete logarithm problem , 1998 .
[4] George B. Purdy,et al. A high security log-in procedure , 1974, Commun. ACM.
[5] Chi-Sung Laih,et al. Password authentication using public-key cryptography , 1989 .
[6] Radia Perlman,et al. Network Security , 2002 .
[7] Lein Harn,et al. Key management for decentralized computer network services , 1993, IEEE Trans. Commun..
[8] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[9] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[10] Masao Kasahara,et al. A discrete logarithm problem over composite modulus , 1993 .
[11] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[12] C. P. Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.
[13] Ivan Bjerre Damgård,et al. Advances in Cryptology — EUROCRYPT ’90 , 2001, Lecture Notes in Computer Science.