[1] |
WANG Hao, SONG Xiangfu, KE Junming, et al. Blockchain and Privacy Preserving Mechanisms in Cryptocurrency[J]. Netinfo Security, 2017, 17(7): 32-39.
|
|
王皓, 宋祥福, 柯俊明, 等. 数字货币中的区块链及其隐私保护机制[J]. 信息网络安全, 2017, 17(7): 32-39.
|
[2] |
WARRAN S, FAN Ziyang, BLAKE M. CBDC Technology Considerations[EB/OL]. (2021-11-09)[2021-12-27]. https://cn.weforum.org/reports/digital-currency-governance-consortium-white-paper-series/cbdc-tech-considerations#report-nav.
|
[3] |
GM/T 32918. 2-2016 Information Security Technology-Public Key Cryptographic Algorithms SM2 Based on Elliptic Curves-Part 2: Digital Signature Algorithm[S]. Beijing: Chinese Encryption Administration, 2016.
|
|
GM/T 32918. 2-2016 信息安全技术SM2椭圆曲线公钥密码算法第2部分:数字签名算法[S]. 北京: 国家密码局, 2016.
|
[4] |
KOBLITZ N. Elliptic Curve Cryptosystems[J]. Mathematics of Computation, 1987, 48(177): 203-209.
doi: 10.1090/S0025-5718-1987-0866109-5
URL
|
[5] |
YAO Qian, LI Huifeng, WEN Xinxiang, et al. Digital Currency System: China, ZL201610179399.3[P]. 2017-10-03.
|
|
姚前, 李会锋, 温信祥, 等. 数字货币系统:中国, ZL201610179399.3[P]. 2017-10-03.
|
[6] |
FIAT A. Batch RSA[C]// Springer. Conference on the Theory and Application of Cryptology. Heidelberg: Springer, 1989: 175-185.
|
[7] |
HARN L. Batch Verifying Multiple RSA Digital Signatures[J]. Electronics Letters, 1998, 34(12): 1219-1220.
doi: 10.1049/el:19980833
URL
|
[8] |
KARATI S, DAS A, ROYCHOWDHURY D, et al. Batch Verification of ECDSA Signatures[C]// Springer. International Conference on Cryptology in Africa. Heidelberg: Springer, 2012: 1-18.
|
[9] |
KARATI S, DAS A. Faster Batch Verification of Standard ECDSA Signatures Using Summation Polynomials[C]// Springer. International Conference on Applied Cryptography and Network Security. Heidelberg: Springer, 2014: 438-456.
|
[10] |
KITTUR A S, PAIS A R. A New Batch Verification Scheme for ECDSA* Signatures[J]. Sādhanā, 2019, 44(7): 1-12.
doi: 10.1007/s12046-018-0983-y
URL
|
[11] |
BERNSTEIN D J, DOUMEN J, LANGE T, et al. Faster Batch Forgery Identification[C]// Springer. International Conference on Cryptology in India. Heidelberg: Springer, 2012: 454-473.
|
[12] |
LIDL R, NIEDERREITER H. Introduction to Finite Fields and their Applications[M]. Cambridge: Cambridge University Press, 1994.
|
[13] |
YANG Yi, HE Debiao, WANG Huaqun, et al. An Efficient Blockchain-Based Batch Verification Scheme for Vehicular Ad Hoc Networks[EB/OL]. (2019-12-27)[2021-11-20]. https://onlinelibrary.wiley.com/doi/abs/10.1002/ett.3857.
|
[14] |
APOSTOL T M. Resultants of Cyclotomic Polynomials[J]. Proceedings of the American Mathematical Society, 1970, 24(3): 457-462.
doi: 10.1090/S0002-9939-1970-0251010-X
URL
|
[15] |
SEMAEV I A. Summation Polynomials and the Discrete Logarithm Problem on Elliptic Curves[EB/OL]. (2004-02-05)[2021-12-06]. https://www.iacr.org/cryptodb/data/paper.php?pubkey=12007.
|
[16] |
KARATI S, DAS A, CHOWDHURY D R. Using Randomizers for Batch Verification of ECDSA Signatures[EB/OL]. (2012-10-13)[2021-11-19]. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.300.7276.
|
[17] |
BRAUER A. On Addition Chains[J]. Bulletin of American Mathematical Society, 1939, 45(10): 736-739.
doi: 10.1090/S0002-9904-1939-07068-7
URL
|
[18] |
KUDITHI T, SAKTHIVEL R. High-Performance ECC Processor Architecture Design for IoT Security Applications[J]. The Journal of Supercomputing, 2019, 75(1): 447-474.
doi: 10.1007/s11227-018-02740-2
URL
|