Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Applied Mathematics,Artificial Intelligence,Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Information Systems
Reference28 articles.
1. Abhilash MH, Amberker BB (2021) Efficient dynamic group signature scheme with verifier local revocation and time-bound keys using lattices. Int J Comput Inf Technol 10(2).
https://doi.org/10.24203/ijcit.v10i2.93
2. Alwen J, Peikert C (2009) Generating shorter bases for hard random lattices. In: 26th international symposium on theoretical aspects of computer science STACS 2009, pp 75–86. IBFI Schloss Dagstuhl
3. Boneh D, Shacham H (2004) Group signatures with verifier-local revocation. In: Proceedings of the 11th ACM conference on Computer and communications security, pp 168–177
4. Brakerski Z, Langlois A, Peikert C, Regev O, Stehle D (2013) Classical hardness of learning with errors. In: Proceedings of the forty-fifth annual ACM symposium on Theory of computing, pp 575–584
5. Brickell E (2003) An efficient protocol for anonymously providing assurance of the container of a private key. Submitted to the Trusted Computing Group
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献