Publisher
Springer Nature Switzerland
Reference17 articles.
1. Lecture Notes in Computer Science;M Bellare,2009
2. Canetti, R.: Security and composition of multiparty cryptographic protocols. J. Cryptol. 13, 143–202 (2000). https://doi.org/10.1007/s001459910006
3. Lecture Notes in Computer Science;I Damgård,2000
4. Damgård, I.: On $$\Sigma $$-Protocols (2010). https://cs.au.dk/~ivan/Sigma.pdf
5. Damgård, I., Jurik, M., Nielsen, J.B.: A generalization of Paillier’s public-key system with applications to electronic voting. Int. J. Inf. Secur. 9, 371–385 (2010). https://doi.org/10.1007/s10207-010-0119-9