1. 20008-2, I.: Information technology — security techniques — anonymous digital signatures — part 2: Mechanisms using a group public key. Technical report, ISO/IEC (2013)
2. Arfaoui, G., Lalande, J., Traoré, J., Desmoulins, N., Berthomé, P., Gharout, S.: A practical set-membership proof for privacy-preserving NFC mobile ticketing. PoPETs 2015(2), 25–45 (2015)
3. Lecture Notes in Computer Science;PSLM Barreto,2006
4. Bellare, M., Namprempre, C., Pointcheval, D., Semanko, M.: The one-more-rsa-inversion problems and the security of Chaum’s blind signature scheme. J. Cryptol. 16(3) (2003)
5. Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 62–73 (1993)