Author:
Li Yang,Zhang Guangzong,Zhu Jianming,Wang Xiuli,Wang Youwei
Reference21 articles.
1. Ben-Sasson, E., Bentov, I., Horesh, Y., Riabzev, M.: Scalable, transparent, and post-quantum secure computational integrity. Eprint. Iacr. Org 693423, 1–83 (2018)
2. Ben-Sasson, E., et al.: Zerocash: Decentralized anonymous payments from bitcoin. In: Proceedings - IEEE Symposium on Security and Privacy, pp. 459–474 (2014)
3. Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: International Workshop on Public Key Cryptography, pp. 53–70 (2011)
4. Bunz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., Maxwell, G.: Bulletproofs: short proofs for confidential transactions and more. In: Proceedings - IEEE Symposium on Security and Privacy, pp. 315–334, May 2018
5. Lecture Notes in Computer Science;M Chase,2007