[1] |
LI J , LI N , XUE R . Universal accumulators with efficient nonmembership proofs[A]. Proceedings of ACNS 2007[C]. Springer, 2007. 253-269.
|
[2] |
BONEH D , SHACHAM H . Group signatures with verifier-local revocation[A]. Proceedings of ACM CCS 2004[C]. ACM, 2004. 168-177.
|
[3] |
TSANG P P , KAPADIA A , CORNELIUS C , et al. Nymble:blockingmisbehaving users in anonymizing networks[J]. IEEE Transactions on Dependable and Secure Computing 2011,8(2):256-269.
|
[4] |
TSANG P P , AU M H , KAPADIA A , et al. BLAC: Revoking repeatedlymisbehaving anonymous users without relying on TTPs[J]. ACM Transactions on Information and System Security (TISSEC) 2010,13(4):39-46.
|
[5] |
BRICKELL E , LI J . Enhanced privacy ID: a direct anonymous attestation schemewith enhanced revocation capabilities[A]. Proceedings of WPES 2007[C]. ACM, 2007. 21-30.
|
[6] |
AU M H , TSANG P P , KAPADIA A , et al. PEREA: practical TTP-free revocation of repeatedly misbehaving anonymous users[J]. ACM Transactions on Information and System Security (TISSEC) 2011,14(4):29.
|
[7] |
CAMENISCH J , HOHENBERGER S , et al. How to win theclonewars:efficient periodic n-times anonymousauthentication[A]. Proceedings of ACM CCS 2006[C]. ACM, 2006. 201-210.
|
[8] |
LOFGREN P , HOPPER N . Faust: efficient, TTP-free abuse prevention by anonymouswhitelisting[A]. Proceedings of WPES 2011[C]. ACM, 2011. 125-130.
|
[9] |
YU K Y , YUEN T H , CHOW S S , et al. PE (AR)2: Privacy-enhanced anonymous authentication with reputation and revocation[A]. Proceedings of ESORICS 2012[C]. Springer, 2012. 679-696.
|
[10] |
AU M H , KAPADIA A , SUSILO W . BlACR: TTP-free blacklistable anonymous credentials with reputation[A]. Proceedings of NDSS 2012[C]. San Diego, CA, USA.
|
[11] |
AU M H , KAPADIA A . PERM: Practical reputation-based blacklisting withoutTTP[A]. Proceedings of ACM CCS 2012[C]. ACM, 2012. 929-940.
|
[12] |
DAMGARD I . On σ-protocols[[R]. Lecture notes for CPT, 2002.
|
[13] |
CAMENISCH J , STADLER M . Efficient group signature schemes for large groups[A]. CRYPTO'97[C]. Springer, 1997. 410-424.
|
[14] |
FUJISAKI E , OKAMOTO T . Statistical zero knowledge protocols to prove modularpolynomial relations[A]. CRYPTO'97[C]. Springer, 1997. 16-30.
|
[15] |
DAMG?RD I , FUJISAKI E . A statistically-hiding integer commitment scheme basedon groups with hidden order[A]. ASIACRYPT 2002[C]. Springer, 2002. 125-142.
|
[16] |
PENG K , BAO F . Vulnerability of a non-membership proof scheme[A]. ISECRYPT 2010[C]. IEEE, 2010. 1-4.
|
[17] |
CAMENISCH J , LYSYANSKAYA A . A signature scheme with efficient protocols[A]. Security in Communication Networks[C]. Springer, 2003. 268-289.
|
[18] |
CAMENISCH J , CHAABOUNI R , et al. Efficient protocols for set membership andrange proofs[A]. ASIACRYPT 2008[C]. Springer, 2008. 234-252.
|
[19] |
DUSART P . The k th prime is greater than k (ln k+ln ln k-1) for k>2[J]. Mathematics of Computation,68, Springer, 1999. 411-415.
|