[1] |
HAN J G , CHEN L Q , SCHNEIDER S ,et al. Anonymous single sign-on with proxy re-verification[J]. IEEE Transactions on Information Forensics and Security, 2020,15: 223-236.
|
[2] |
HAN J G , CHEN L Q , SCHNEIDER S ,et al. Privacy-preserving electronic ticket scheme with attribute-based credentials[J]. IEEE Transactions on Dependable and Secure Computing, 2021,18(4): 1836-1849.
|
[3] |
HEYDT-BENJAMIN T S , CHAE H J , DEFEND B ,et al. Privacy for public transportation[C]// International Workshop on Privacy Enhancing Technologies. Berlin:Springer, 2006: 1-19.
|
[4] |
CHAUM D . Security without identification:transaction systems to make big brother obsolete[J]. Communications of the ACM, 1985,28(10): 1030-1044.
|
[5] |
VIVES-GUASCH A , PAYERAS-CAPELLà M M , MUT-PUIGSERVER M ,et al. Anonymous and transferable electronic ticketing scheme[C]// Data Privacy Management and Autonomous Spontaneous Security. Berlin:Springer, 2014: 100-113.
|
[6] |
PAYERAS-CAPELLà M M , MUT-PUIGSERVER M , CASTELLà-ROCA J ,et al. Design and performance evaluation of two approaches to obtain anonymity in transferable electronic ticketing schemes[J]. Mobile Networks and Applications, 2017,22(6): 1137-1156.
|
[7] |
ARFAOUI G , LALANDE J F , TRAORé J , ,et al. A practical set-membership proof for privacy-preserving NFC mobile ticketing[J]. Proceedings on Privacy Enhancing Technologies, 2015,2015(2): 25-45.
|
[8] |
CAMENISCH J , LYSYANSKAYA A . An efficient system for non-transferable anonymous credentials with optional anonymity revocation[C]// International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2001: 93-118.
|
[9] |
LYSYANSKAYA A , RIVEST R L , SAHAI A ,et al. Pseudonym systems[C]// International Workshop on Selected Areas in Cryptography. Berlin:Springer, 2000: 184-199.
|
[10] |
CHAUM D , . Blind signatures for untraceable payments[C]// Advances in Cryptology. Berlin:Springer, 1983: 199-203.
|
[11] |
CHAUM D , VAN HEYST E . Group signatures[C]// Workshop on the Theory and Application of of Cryptographic Techniques. Berlin:Springer, 1991: 257-265.
|
[12] |
CAMENISCH J , LYSYANSKAYA A . Signature schemes and anonymous credentials from bilinear maps[C]// Advances in Cryptology –CRYPTO 2004. Berlin:Springer, 2004: 56-72.
|
[13] |
AU M H , SUSILO W , MU Y . Constant-size dynamic k-TAA[C]// International Conference on Security and Cryptography for Networks. Berlin:Springer, 2006: 111-125.
|
[14] |
POINTCHEVAL D , SANDERS O . Short randomizable signatures[J]. IACR Cryptology ePrint Archive,2015, 2015:525.
|
[15] |
BOBOLZ J , EIDENS F , KRENN S ,et al. Privacy-preserving incentive systems with highly efficient point-collection[C]// Proceedings of the 15th ACM Asia Conference on Computer and Communications Security. New York:ACM Press, 2020: 319-333.
|
[16] |
QUERCIA D , HAILES S . MOTET:mobile transactions using electronic tickets[C]// Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks. Piscataway:IEEE Press, 2005: 374-383.
|
[17] |
RUPP A , HINTERW?LDER G , BALDIMTSI F ,et al. P4R:privacy-preserving pre-payments with refunds for transportation systems[C]// International Conference on Financial Cryptography and Data Security. Berlin:Springer, 2013: 205-212.
|
[18] |
BONEH D , LYNN B , SHACHAM H . Short signatures from the Weil pairing[C]// Advances in Cryptology — ASIACRYPT 2001. Springer:Berlin, 2001: 514-532.
|
[19] |
MILUTINOVIC M , DECROIX K , NAESSENS V ,et al. Privacy-preserving public transport ticketing system[C]// IFIP Annual Conference on Data and Applications Security and Privacy. Berlin:Springer, 2015: 135-150.
|
[20] |
ABE M , OKAMOTO T . Provably secure partially blind signatures[C]// Advances in Cryptology — CRYPTO 2000. Springer:Berlin, 2000: 271-286.
|
[21] |
PEDERSEN T P , . Non-interactive and information-theoretic secure verifiable secret sharing[C]// Advances in Cryptology — CRYPTO’91. Springer:Berlin, 1992: 129-140.
|
[22] |
NAKANISHI T , HARUNA N , SUGIYAMA Y . Unlinkable electronic coupon protocol with anonymity control[C]// International Workshop on Information Security. Berlin:Springer, 1999: 37-46.
|
[23] |
VIVES-GUASCH A , CASTELLà-ROCA J , PAYERAS-CAPELLA M M ,et al. An electronic and secure automatic fare collection system with revocable anonymity for users[C]// Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia. New York:ACM Press, 2010: 387-392.
|
[24] |
BONEH D , BOYEN X . Short signatures without random ora-cles[C]// International Conference on the Theory and Applications of Cryptographic Techniques. Springer:Berlin, 2004: 56-73.
|
[25] |
VIVES-GUASCH A , PAYERAS-CAPELLà M M , MUT-PUIGSERVER M ,et al. A secure E-ticketing scheme for mobile devices with near field communication (NFC) that includes exculpability and reusability[J]. IEICE Transactions on Information and Systems, 2012,95(1): 78-93.
|
[26] |
CHASE M , LYSYANSKAYA A . On signatures of knowledge[C]// Annual International Cryptology Conference. Berlin:Springer, 2006: 78-96.
|
[27] |
FUCHSBAUER G , HANSER C , SLAMANIG D . Structure-preserving signatures on equivalence classes and constant-size anonymous credentials[J]. Journal of Cryptology, 2019,32(2): 498-546.
|
[28] |
HANSER C , SLAMANIG D . Structure-preserving signatures on equivalence classes and their application to anonymous credentials[C]// International Conference on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2014: 491-511.
|
[29] |
BL?MER J , BOBOLZ J . Delegatable attribute-based anonymous credentials from dynamically malleable signatures[C]// International Conference on Applied Cryptography and Network Security. Berlin:Springer, 2018: 221-239.
|