[1] |
GOLDWASSER S, MICALI S, RACKOFF C.The Knowledge Complexity of Interactive Proof Systems[C]//ACM. 17th Annual ACM Symposium on Theory of Computing, May 6-8, 1985, Providence, Rhode Island, USA. New York: ACM, 1985: 291-304.
|
[2] |
FIAT A, SHAMIR A.How to Prove Yourself: Practical Solutions to Identification and Signature Problems[C]//Springer. Conference on the Theory and Application of Cryptographic Techniques, August 11-15, 1986, Santa Barbara, California, USA. Heidelberg: Springer, 1986: 186-194.
|
[3] |
GENNARO R, GENTRY C, PARNO B, et al.Quadratic Span Programs and Succinct NIZKs without PCPs[C]//Springer. 2013 Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 26-30, 2013, Athens, Greece. Heidelberg: Springer, 2013: 626-645.
|
[4] |
SASSON E B, CHIESA A, GARMAN C, et al.Zerocash: Decentralized Anonymous Payments from Bitcoin[C]//IEEE. 2014 IEEE Symposium on Security and Privacy, May 18-21, 2014, San Jose, CA, USA. New Jersey: IEEE, 2014: 459-474.
|
[5] |
CSES. SM9 Identification Cryptography Algorithm[EB/OL]. , 2016-3-28.
|
|
工标网. SM9标识密码算法[EB/OL]. .
|
[6] |
BARRETO P S L M, NAEHRIG M. Pairing-friendly Elliptic Curves of Prime Order[C]//Springer. 2005 International Workshop on Selected Areas in Cryptography, August 11-12, 2005, Kingston, ON, Canada. Heidelberg: Springer, 2005: 319-331.
|
[7] |
MAO Wenbo, WANG Jilin.Modern Cryptography Theory and Practice[M]. Beijing: Electronic Industry Press, 2004.
|
|
毛文波,王继林.现代密码学理论与实践[M].北京:电子工业出版社,2004.
|
[8] |
XU Qiuliang, LI Daxing.Constructing Elliptic Curves Suitable for Cryptosystems-methods and Implementation[J]. Chinese Journal of Computers, 1998, 21(12): 1059-1065.
|
|
徐秋亮,李大兴. 适用于建立密码体制的椭圆曲线的构造方法及实现[J]. 计算机学报,1998,21(12):1059-1065.
|
[9] |
HISIL H, WONG K K H, CARTER G, et al. Twisted Edwards Curves Revisited[C]//Springer. International Conference on the Theory and Application of Cryptology and Information Security, December 7-11, 2008, Melbourne, VIC, Australia. Heidelberg: Springer, 2008: 326-343.
|
[10] |
MILLER V.Short Programs for Functions on Curves[J]. Unpublished Manuscript, 1986, 97(101-102): 44.
|
[11] |
NAEHRIG M, NIEDERHAGEN R, SCHWABE P.New Software Speed Records for Cryptographic Pairings[C]//Springer. International Conference on Cryptology and Information Security in Latin America, August 8-11, 2010, Puebla, Mexico. Heidelberg: Springer, 2010: 109-123.
|