1. Goldwasser S, Micali S, Rackoff C. The knowledge complexity of interactive proof-systems. Proceedings of the 17th Annual ACM Symposium on Theory of Computing. Providence, Rhode Island, USA, 1985: 291-304
2. Fiat A, Shamir A. How to prove yourself: practical solutions to identification and signature problems. Proceedings of Crypto’ 86. Aug 11-15, 1986, Santa Barbara, CA, USA. Berlin, Germany: Springer-Verlag, 1986: 186-194
3. Guillou L S, Quisquater J J. A practical zero-knowledge protocol fitted to security microprocessors minimizing both transmission and memory. Proceedings of Eurocrypt’88, May 25-27, 1988, Davos, Switzerland. CA, USA. Berlin, Germany: Springer-Verlag, 1988: 123-128
4. Schnorr C P. Efficient identification and signatures for smart cards. Proceedings of Eurocrypt’89, Apr 10-13, 1989, Houthalen, Belgium, CA, USA. Berlin, Germany: Springer-Verlag, 1990: 239-252
5. Bellare M, Palacioy A. GQ and Schnorr identification schemes: proofs of security against impersonation under active and concurrent attacks. Proceedings of Crypto’2002, Aug 18-22, 2002, Santa Barbara, CA, USA, Berlin, Germany: Springer-Verlag, 2002: 167-177
6. Kim M, Kim K. A new identification scheme based on the bilinear Diffie-Hellman group. Information Security and Privacy: Proceedings of 7th Australasian Conference on Information Security and Privacy (ACISP’02), Jul 3-5, 2002, Melbourne, Australia, Berlin, Germany: Springer-Verlag, 2002: 362-378
7. Shao J, Cao Z, Lu R. A new efficient identification scheme based on strong Diffie-Hellman assumption. Proceedings of International Symposium on Future Software Technology (ISFST’04), Oct 20-22, 2004, Xi’an, China, 2004
8. Mitsunari S, Sakai R, Kasahara M. A new traitor tracing. IEICE Transaction. 2002. E85-A(2): 481-484
9. Bellare M, Fischlin M, Goldwasser S, et al. Identification protocols secure against reset attacks. Proceedings of Eurocrypt’01, May 6-10, 2001, Innsbruck (Tyrol), Austria, Berlin, Germany: Springer-Verlag, 2001: 495-511
10. Zhang F G, Rei F, Safavi-Naini R, et al. An efficient signature scheme from bilinear pairings and its applications. Proceedings of 7th International Workshop on Practice and Theory in Public Key Cryptography (PKC’04), Mar 1-4, 2004, Singapore, Berlin, Germany: Springer-Verlag, 2004: 277-290
11. Mao Wenbo. Modern Cryptography: Theory and Practice. Englewood Cliffs, NJ, USA: Prentice Hall, 2003: 75-78 |