[1] |
DIFFIE W , HELLMAN M . New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976,22(6): 644-654.
|
[2] |
程朝辉 . 数字签名技术概览[J]. 信息安全与通信保密, 2020,18(7): 48-62.
|
|
CHENG C H . Overview of digital signature technology[J]. Information Security and Communications Privacy, 2020,18(7): 48-62.
|
[3] |
SCHNORR C P . Efficient signature generation by smart cards[J]. Journal of Cryptology, 1991,4(3): 161-174.
|
[4] |
ERWIG A , FAUST S , HOSTáKOVá K ,et al. Two-party adaptor signatures from identification schemes[C]// IACR International Conference on Public-Key Cryptography. Berlin:Springer, 2021: 451-480.
|
[5] |
TANG W Z , WANG W N , FANTI G ,et al. Privacy-utility tradeoffs in routing cryptocurrency over payment channel networks[C]// Proceedings of the ACM on Measurement and Analysis of Computing Systems. New York:ACM Press, 2020: 1-39.
|
[6] |
DECKER C , WATTENHOFER R . A fast and scalable payment network with bitcoin duplex micropayment channels[C]// Symposium on Self-Stabilizing Systems. Berlin:Springer, 2015: 3-18.
|
[7] |
ERDIN E , CEBE M , AKKAYA K ,et al. A scalable private bitcoin payment channel network with privacy guarantees[J]. Journal of Network and Computer Applications, 2021:doi.org/10.1016/j.jnca.2021.103021.
|
[8] |
CLA B , NING M D , XUN W ,et al. Rapido:scaling blockchain with multi-path payment channels[J]. Neurocomputing, 2020,406: 322-332.
|
[9] |
RYU K , KIM W , LEE E K . PayGo:incentive-comparable payment routing based on contract theory[J]. IEEE Access, 2020,8: 70095-70110.
|
[10] |
MILLER A , BENTOV I , KUMARESAN R ,et al. Sprites and state channels:payment networks that go faster than lightning[J]. arXiv Preprint,arXiv:1702.05812, 2017.
|
[11] |
DESHPANDE A , HERLIHY M . Privary-preserving cross-chain atomic swaps[C]// Financial Cryptography and Data Security. Berlin:Springer, 2020: 540-549.
|
[12] |
HOENISCH P , PINO L S D . Atomic swaps between bitcoin and monero[J]. arXiv Preprint,arXiv:2101.12332, 2021.
|
[13] |
MALAVOLTA G , MORENO-SANCHEZ P , SCHNEIDEWIND C ,et al. Anonymous multi-hop locks for blockchain scalability and interoperability[C]// Proceedings of 2019 Network and Distributed System Security Symposium. Reston:Internet Society, 2019:10168773.
|
[14] |
TAIRI E K , MORENO-SANCHEZ P , MAFFEI M . A2L:anonymous atomic locks for scalability in payment channel hubs[C]// Proceedings of 2021 IEEE Symposium on Security and Privacy (SP). Piscataway:IEEE Press, 2021: 1834-1851.
|
[15] |
AUMAYR L , ERSOY O , ERWIG A ,et al. Generalized bitcoin compatible channels[J]. IACR Cryptology ePrint Archive, 2020(2020): 476.
|
[16] |
ESGIN M F , ERSOY O , ERKIN Z . Post-quantum adaptor signatures and payment channel networks[C]// Proceedings of the 25th European Symposium on Research in Computer Security. Berlin:Springer, 2020: 378-397.
|
[17] |
TAIRI E K , MORENO-SANCHEZ P , MAFFEI M . Post-quantum adaptor signature for privacy-preserving off-chain payments[C]// International Conference on Financial Cryptography and Data Security. Berlin:Springer, 2021: 131-150.
|
[18] |
QIN X , CUI H , YUAN T H . Generic adaptor signature[J]. IACR Cryptology ePrint Archive, 2021(2021): 161.
|
[19] |
AUMAYR L , ERSOY O , ERWIG A ,et al. Generalized channels from limited blockchain scripts and adaptor signatures[C]// Lecture Notes in Computer Science. Berlin:Springer, 2021: 635-664.
|
[20] |
THYAGARAJAN S A K , MALAVOLTA G . Lockable signatures for blockchains:scriptless scripts for all signatures[C]// Proceedings of 2021 IEEE Symposium on Security and Privacy (SP). Piscataway:IEEE Press, 2021: 937-954.
|
[21] |
彭聪, 罗敏, 何德彪 ,等. 基于SM2数字签名算法的适配器签名方案[J]. 计算机研究与发展, 2021,58(10): 2278-2286.
|
|
PENG C , LUO M , HE D B ,et al. Adaptor signature scheme based on the SM2 digital signature algorithm[J]. Journal of Computer Research and Development, 2021,58(10): 2278-2286.
|
[22] |
VARALAKSHMI P , THANGAVEL M . Improved secure RSA cryptosystem for data confidentiality in cloud[J]. International Journal of Information Systems and Change Management, 2017,9(4): 261-277.
|
[23] |
YANG T , ZHANG Y S , XIAO S ,et al. Digital signature based on ISRSAC[J]. China Communications, 2021,18(1): 161-168.
|
[24] |
田椒陵 . SM3 算法界面设计及安全性分析[J]. 信息安全与技术, 2014,5(5): 24-26,33.
|
|
TIAN J L . SM3 algorithm interface design and safety analysis[J]. Information Security and Technology, 2014,5(5): 24-26,33.
|