[1] |
GOLDWASSER S , MICALI S , RACKOFF C . The knowledge complexity of interactive proof systems[J]. SIAM Journal on Computing, 1989,18(1): 186-208.
|
[2] |
FEIGE U , FIAT A , SHAMIR A . Zero-knowledge proofs of identity[J]. Journal of Cryptology, 1988,1(2): 77-94.
|
[3] |
GUILLOU L C , QUISQUATER J J . A “paradoxical” indentity-based signature scheme resulting from zero-knowledge[C]// Advances in Cryptology — CRYPTO’ 88. Berlin:Springer, 1990: 216-231.
|
[4] |
SCHNORR C P . Efficient signature generation by smart cards[J]. Journal of Cryptology, 1991,4(3): 161-174.
|
[5] |
SHOR P W , . Algorithms for quantum computation:discrete logarithms and factoring[C]// Proceedings of the 35th Annual Symposium on Foundations of Computer Science. Piscataway:IEEE Press, 1994: 124-134.
|
[6] |
ALAGIC G , ALPERIN-SHERIFF J , APON D ,et al. Status report on the first round of the nist post-quantum cryptography standardization process[R]. 2019.
|
[7] |
STERN J , . A new identification scheme based on syndrome decoding[C]// Advances in Cryptology — CRYPTO’ 93. Berlin:Springer, 1994: 13-21.
|
[8] |
GABORIT P , GIRAULT M . Lightweight code-based identification and signature[C]// Proceedings of 2007 IEEE International Symposium on Information Theory. Piscataway:IEEE Press, 2007: 191-195.
|
[9] |
AGUILAR C , GABORIT P , SCHREK J . A new zero-knowledge code based identification scheme with reduced communication[C]// Proceedings of 2011 IEEE Information Theory Workshop. Piscataway:IEEE Press, 2011: 648-652.
|
[10] |
CAYREL P L , EL Y A S M , HOFFMANN G ,et al. An improved threshold ring signature scheme based on error correcting codes[C]// Arithmetic of Finite Fields. Berlin:Springer, 2012: 45-63.
|
[11] |
COURTOIS N T , . Efficient zero-knowledge authentication based on a linear algebra problem MinRank[C]// Advances in Cryptology —ASIACRYPT 2001. Berlin:Springer, 2001: 402-421.
|
[12] |
SAKUMOTO K , SHIRAI T , HIWATARI H . Public-key identification schemes based on multivariate quadratic polynomials[C]// Advances in Cryptology – CRYPTO 2011. Berlin:Springer, 2011: 706-723.
|
[13] |
SHAMIR A , . An efficient identification scheme based on permuted kernels (extended abstract)[C]// Advances in Cryptology — CRYPTO’ 89 Proceedings. Berlin:Springer, 1989: 606-609.
|
[14] |
CHEN K F , . A new identification algorithm[C]// Cryptography:Policy and Algorithms. Berlin:Springer, 1996: 244-249.
|
[15] |
STERN J , . Designing identification schemes with keys of short size[C]// Advances in Cryptology — CRYPTO ’94. Berlin:Springer, 1994: 164-173.
|
[16] |
POINTCHEVAL D , . A new identification scheme based on the perceptrons problem[C]// Advances in Cryptology — EUROCRYPT ’95. Berlin:Springer, 1995: 319-328.
|
[17] |
CAYREL P L , LINDNER R , RüCKERT M ,et al. Improved zero-knowledge identification with lattices[C]// Provable Security. Berlin:Springer, 2010: 1-17.
|
[18] |
YANG R P , AU M H , ZHANG Z F ,et al. Efficient lattice-based zero-knowledge arguments with standard soundness:construction and applications[C]// Advances in Cryptology – CRYPTO 2019. Cham:Springer International Publishing, 2019: 147-175.
|
[19] |
王后珍, 郭岩, 张焕国 . 基于矩阵填充问题的高效零知识身份认证方案[J]. 武汉大学学报(理学版), 2021,67(2): 111-117.
|
|
WANG H Z , GUO Y , ZHANG H G . Efficient zero-knowledge identification based on matrix completion problem[J]. Journal of Wuhan University (Natural Science Edition), 2021,67(2): 111-117.
|
[20] |
BUSS J F , FRANDSEN G S , SHALLIT J O . The computational complexity of some problems of linear algebra[J]. Journal of Computer and System Sciences, 1999,58(3): 572-596.
|
[21] |
GABIDULIN E M . Theory of codes with maximum rank distance(translation)[J]. Problems of Information Transmission, 1985,21(1): 1-12.
|
[22] |
HARM D . On the equivalence between low-rank matrix completion and tensor rank[J]. Linear and Multilinear Algebra, 2018,66(4): 645-667.
|
[23] |
PEETERS R . Orthogonal representations over finite fields and the chromatic number of graphs[J]. Combinatorica, 1996,16(3): 417-431.
|
[24] |
CRAVO G . Matrix completion problems[J]. Linear Algebra and Its Applications, 2009,430(8/9): 2511-2540.
|
[25] |
COPPERSMITH D , STERN J , VAUDENAY S . Attacks on the birational permutation signature schemes[C]// Advances in Cryptology —CRYPTO’ 93. Berlin:Springer, 1993: 435-443.
|
[26] |
COURTOIS N T , . The security of hidden field equations (HFE)[C]// Topics in Cryptology — CT-RSA 2001. Berlin:Springer, 2001: 266-281.
|
[27] |
KIPNIS A , SHAMIR A . Cryptanalysis of the HFE public key cryptosystem by relinearization[C]// Advances in Cryptology — CRYPTO’ 99. Berlin:Springer, 1999: 19-30.
|
[28] |
GOUBIN L , COURTOIS N T . Cryptanalysis of the TTM cryptosystem[C]// Advances in Cryptology — ASIACRYPT 2000. Berlin:Springer, 2000: 44-57.
|
[29] |
COURTOIS N T . The security of cryptographic primitives based on multivariate algebraic problems:MQ,MinRank,IP,HFE[D]. Paris:Paris 6 University. 2001.
|
[30] |
FAUGERE J C,LEVY-DIT-VEHELF,PERRETL , . Cryptanalysis of minrank[C]// Advances in Cryptology-CRYPTO’08. Berlin:Springer, 2008: 280-296.
|
[31] |
张海波, 黄宏武, 刘开健 ,等. 车联网中可证安全的匿名可追溯快速组认证协议[J]. 通信学报, 2021,42(6): 213-225.
|
|
ZHANG H B , HUANG H W , LIU K J ,et al. Verifiably secure fast group authentication protocol with anonymous traceability for Internet of vehicles[J]. Journal on Communications, 2021,42(6): 213-225.
|
[32] |
田苗苗, 陈静, 仲红 . 格上基于身份的增量签名方案[J]. 通信学报, 2021,42(1): 108-117.
|
|
TIAN M M , CHEN J , ZHONG H . Identity-based incremental signature scheme from lattices[J]. Journal on Communications, 2021,42(1): 108-117.
|