Author:
Li Yang,Zhang Guangzong,Zhu Jianming,Wang Xiuli
Reference23 articles.
1. Lecture Notes in Computer Science;S Agrawal,2018
2. Ben-Sasson, E., Bentov, I., Horesh, Y., Riabzev, M.: Scalable, transparent, and post-quantum secure computational integrity. Eprint. Iacr. Org. 693423, 1–83 (2018)
3. Ben-Sasson, E., et al.: Zerocash: decentralized anonymous payments from bitcoin. In: Proceedings - IEEE Symposium on Security and Privacy, pp. 459–474 (2014)
4. Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: International Workshop on Public Key Cryptography, pp. 53–70 (2011)
5. Bunz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., Maxwell, G.: Bulletproofs: short proofs for confidential transactions and more. In: Proceedings - IEEE Symposium on Security and Privacy, 2018-May, pp. 315–334 (2018)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献