[1] |
CHANG C C , SUN C Y . A secure and efficient authentication scheme for e-coupon systems[J]. Wireless Personal Communications, 2014,77(4): 2981-2996.
|
[2] |
HSUEH S C , CHEN J M . Sharing secure m-coupons for peer-generated targeting via eWOM communications[J]. Electronic Commerce Research and Applications, 2010,9(4): 283-293.
|
[3] |
CHEN L , ENZMANN M , SADEGHI A R ,et al. A privacy-protecting coupon system[C]// The 9th International Conference on Financial Cryptography and Data Security. Roseau, 2005: 93-108.
|
[4] |
NGUYEN L , . Privacy-protecting coupon system revisited[C]// The 10th International Conference on Financial Cryptography and Data Security. Anguilla,British West Indies, 2006: 266-280.
|
[5] |
CHEN L , ESCALANTE A,L?HR H , et al . A privacy-protecting multi-coupon scheme with stronger protection against splitting[C]// The 11th International Conference on Financial Cryptography and Data Security. Scarborough,Trinidad and Tobago, 2008: 29-44.
|
[6] |
L?HR H . Privacy-preserving protocols and applications for trusted platforms[D]. Bochum:Ruhr-Universit, 2012.
|
[7] |
柳欣, 徐秋亮 . 实用的强不可分割多重息票方案[J]. 计算机研究与发展, 2012,49(12): 2575-2590. LIU X , XU Q L . Practical multi-coupon systems with strong unsplittability[J]. Journal of Computer Research and Development, 2012,49(12): 2575-2590.
|
[8] |
柳欣, 徐秋亮 . 并发安全的紧凑多重息票方案[J]. 电子学报, 2012,40(5): 877-882. LIU X , XU Q L . Compact multi-coupon systems with concurrent security[J]. Acta Electronica Sinica, 2012,40(5): 877-882.
|
[9] |
HINAREJOS M F, , ISERN-DEYà A P , FERRER-GOMILA J L ,et al. MC-2D:an efficient and scalable multicoupon scheme[J]. The Computer Journal, 2015,58(4): 758-778.
|
[10] |
WANG W J , FENG D G , QIN Y ,et al. ExBLACR:extending BLACRsystem[C]// The 19th Australasian Conference on Information Security and Privacy. Wollongong,NSW,Australia, 2014: 397-412.
|
[11] |
XI L , FENG D G . FARB:fast anonymous reputation-based blacklisting without TTPs[C]// The 13th Workshop on Privacy in the Electronic Society. Scottsdale,Arizona,USA, 2014: 139-148.
|
[12] |
CANARD S , GOUGET A , HUFSCHMITT E . A handy multi-coupon system[C]// The 4th International Conference Applied Cryptography and Network Security. Singapore, 2006: 66-81.
|
[13] |
ISERNS-DEYà A P , HUGUET-ROTGER L PAYERAS-CAPELLà M M ,et al. On the practicability of using group signatures on mobile devices:implementation and performance analysis on the android platform[J]. International Journal of Information Security, 2014,(8): 1-11.
|
[14] |
CHOW S S M , AU M H , SUSILO W . Server-aided signatures verification secure against collusion attack[J]. Information Security Technical Report, 2013,17(3): 46-57.
|
[15] |
CANARD S , DEVIGNE J , SANDERS O . Delegating a pairing can be both secure and efficient[C]// The 12th International Conference on Applied Cryptography and Network Security. Lausanne,Switzerland, 2014: 549-565.
|
[16] |
BRICKELL E , LI J T . A pairing-based DAA scheme further reducing TPM resources[C]// The 3rd International Conference on Trust and Trustworthy Computing. Berlin,Germany, 2010: 181-195.
|
[17] |
杨波, 冯登国, 秦宇 ,等. 基于可信移动平台的直接匿名证明方案研究[J]. 计算机研究与发展, 2014,51(7): 1436-1445. YANG B , FENG D G , QIN Y ,et al. Research on direct anonymous attestation scheme on trusted mobile platform[J]. Journal of Computer Research and Development, 2014,51(7): 1436-1445.
|
[18] |
CESENA E,L?HR H , RAMUNNO G , et al . Anonymous authentication with TLS and DAA[C]// The 3rd International Conference on Trust and Trustworthy Computing. Berlin,Germany, 2010: 47-62.
|
[19] |
CHEN L , . A DAA scheme requiring less TPM resources[C]// The 5th International Conference on Information Security and Cryptology. Beijing,China, 2010: 350-365.
|
[20] |
张倩颖, 冯登国, 赵世军 . 基于可信芯片的平台身份证明方案研究[J]. 通信学报, 2014,35(8): 95-106. ZHANG Q Y , FENG D G , ZHAO S J . Research of platform identity attestation based on trusted chip[J]. Journal on Communications, 2014,35(8): 95-106.
|
[21] |
BALDIMTSI F , LYSYANSKAYA A . Anonymous credentials light[C]// 2013 ACM SIGSAC conference on Computer & Communications Security. Berlin,Germany, 2013: 1087-1098.
|
[22] |
PIRKER M , SLAMANIG D . A framework for privacy-preserving mobile payment on security enhanced arm trustzone platforms[C]// Proceedings in 2012 IEEE 11th International Conference on Trust,Security and Privacy in Computing and Communications. Liverpool,UK, 2012: 1155-1160.
|
[23] |
AU M H , SUSILO W , MU Y ,et al. Constant-size dynamic k-times anonymous authentication[J]. IEEE Systems Journal, 2013,7(2): 249-261.
|
[24] |
YANG Y , DING X , LU H ,et al. Self-blindable credential:towardslightweight anonymous entity authentication[EB/OL]. .
|
[25] |
PENG K , YI L . Studying a range proof technique-exception and optimization[C]// The 6th International Conference on Cryptology in Africa. Cairo,Egypt, 2013: 328-341.
|
[26] |
DODIS Y , YAMPOLSKIY A . A verifiable random function with short proofs and keys[C]// The 8th International Workshop on Theory and Practice in Public Key Cryptography. Les Diablerets,Switzerland, 2005: 416-431
|
[27] |
SCOTT M . Unbalancing pairing-based key exchange protocols[EB/OL]. .
|
[28] |
AU M H , SUSILO W , YIU S M . Event-oriented k-times revocable-iff-linked group signatures[C]// The 11th Australasian Conference on Information Security and Privacy. Melbourne,Australia, 2006: 223-234.
|
[29] |
PENG K , . A general,flexible and efficient proof of inclusion and exclusion[C]// Cryptographers’ Track at the RSA Conference 2011. San Francisco,CA,USA, 2011: 33-48.
|
[30] |
CAMENISCH J , LYSYANSKAYA A . A signature scheme with efficient protocols[C]// The 3rd International Conference on Security in Communication Networks. Amalfi,Italy, 2002: 268-289.
|
[31] |
PENG K , BOYD C , DAWSON E . Batch zero knowledge proof and verification and its applications[J]. ACM Transactions on Information and System Security, 2007,10(2): 1-28.
|