Author:
Zhu Dexin,Zhou Hu,Li Nianfeng,Song Lijun,Zheng Jun
Funder
Jilin development and reform commission construction fund
Jilin Science and Technology Development Plan Project
Publisher
Springer Science and Business Media LLC
Reference37 articles.
1. Wang, Z., Fan, J., Cheng, L., An, H.Z., Zheng, H.B., Niu, J.X.: Supervised anonymous authentication scheme. J. Softw. 30, 1705–1720 (2019). https://doi.org/10.13328/j.cnki.jos.005746
2. Ma, Z.Y.: Research on distributed authentication and access control based on blockchain (2020)
3. He, Y.C.: Research on privacy protection mechanism of identity authentication and access control in data sharing (2020)
4. Tang, F., Bao, J., Huang, Y., Wang, H.: Multi-authority attribute-based identification scheme. J. Commun. 42, 220–228 (2021). https://doi.org/10.11959/j.issn.1000-436x.2021047
5. Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. Adv. Cryptol. Eurocrypt. 86 263, 186–194 (1986). https://doi.org/10.1007/3-540-47721-7_12