共 7 条
[1]
Efficient generation of shared RSA keys. Boneh D,Franklin M. Journal of the ACM . 2001
[2]
Identity-based cryptosystems and signature schemas. Shamir A. CRYPTO 84 on Advances in cryptology . 1984
[3]
The discrete logarithm modulo a composite hides O(n)Bits. Hstad J,Schrift A W,Shamir A. Journal of Computer and System Sciences . 1993
[4]
Chord:A scalable Peer-to-Peer lookupservice for internet applications. Stoica I,Morris R,Karger D,et al. IEEE/ACM Transactions on Networking(TON) . 2003
[5]
Secure key issuing in ID-based cryptography. Lee B,Boyd C,Dawson E,et al. Australasian Information Security Workshop- AISW‘2004 . 2004
[6]
On the impossibility of fair exchange without a trusted third party. Pagnia H,Felix C G. http://citeseer.ist.psu.edu /pagnia99impossibility.html . 2006
[7]
How to generate and exchange secrets. Chi-Chih Yao A. 27th Annual Symposium on Foundations of Computer Science . 1986