Citation: | LU Rongbo, SU Hangli, HE Dake, MIAO Xianghua. Offline E-cash System with Finite Circulation Period Based on Elliptic Curve[J]. Journal of Southwest Jiaotong University, 2006, 19(3): 314-318. |
CHAUM D.Blind signatures for untraceable payments[C] ∥Advances in Cryptology-Crypto 82.Santa Barbara:Springer Verlag,1983:199-203.[2] CHAUM D,FIAT A,NAOR M.Untraceable electronic cash[C] ∥Advances in Cryptology-Crypto 88.Santa Barbara:Springer Verlag,1990:319-3271.[3] CHAN A,FRANKEL Y,TSIOUNIS Y.An efficient off-line electronic cash scheme as secure as RSA[R]. Research Report NU-CCS-96-03.Boston:Northeastern University,Massachusetts,1995.[4] BRANDS S.An efficient off-line electronic cash system based on the representation problem[R]. Report CS-R9323,Centrumvoor Wiskunde en Informatica,1993.[5] BRANDS S.Untraceable off-line electronic cash in wallet with observers[C] ∥Advances in Cryptology-Crypto 93.Santa Barbara:Springer Verlag,1994:302-318.[6] FRANKEL Y,T SIOUNIS Y,YUNG M.Indirect discourse proof:achieving fair off-line e-cash[C] ∥Proc Asiacrypt 96.Kyongju:Springer Verlag,1996:286-300.[7] ABE M,FJISAKI E.How to date blind signatures[C] ∥Advances in Cryptology-ASIACRY-PT 96.Berlin:Springer Verlag 1996:244-251.[8] KOBLITZ N.Elliptic cure crypto-systems[J]. Mathematics of Computation,1987,48:203-209.[9] MILLER V S.Use of elliptic cure in cryptography[C] ∥Advance in Cryptology-Crypto 85,Lecture Note in Computer Science.Berlin:Springer Verlag,1986,218:417-426.[10] CAELLI W J,DAWSON E P,REA S A.PKI,elliptic curve cryptography,and digital signatures[J]. Computers Security,1999,18:7-66.[11] YOU Lin,YANG Yixian,WEN Qiaoyan.Elliptic cuerve blind digital signature schemes[J]. Chinese Journal of Electronics,2003,12 (3):411-414.[12] 郭涛,李之棠,彭建芬,等.基于椭圆曲线的盲签名与离线电子现金协议[J]. 通信学报,2003,24(9):142-146.GUO Tao,LI Zhitang,PENG Jianfen,et al.Blind signature and off-line e-cash system based on elliptic curve[J]. Jounal of China Institute of Communications,2003,24(9):142-146.[13] GUILLOU L C,QUISQUATER J J.A practical zero-know ledge protocol fitted to security microprocessor minimizing both transmission and memory[C] ∥Advance in Cryptology-EUROCRYPT '88.Berlin:Springer-Verlag,1988:123-128.
|
[1] | WANG Wei, PENG Qiyuan, WANG Qi, XIAO Xinbiao. Effect Analysis of Coupler Force onHeavy-Haul Train Safety Under Eccentric Loads[J]. Journal of Southwest Jiaotong University, 2021, 56(2): 378-384. doi: 10.3969/j.issn.0258-2724.20200053 |
[2] | TANG Xinghua, WANG Mingnian, TONG Jianjun, DONG Congyu, ZHANG Chong. Study on Stress Field and Security of Primary Support in High Rock Temperature Tunnel[J]. Journal of Southwest Jiaotong University, 2019, 54(1): 32-38. doi: 10.3969/j.issn.0258-2724.20150958 |
[3] | LIN Yongjun, QIU Xiujiao, GE Yudong. Fuzzy Comprehensive Evaluation Method for Masonry Structure Safety[J]. Journal of Southwest Jiaotong University, 2016, 29(6): 1214-1221. doi: 10.3969/j.issn.0258-2724.2016.06.023 |
[4] | ZHANG Wenfang, XIONG Dan, WANG Xiaomin. A Secure Electronic Voting Scheme Based on Linkable Ring Signature against Fraud from the Third Party[J]. Journal of Southwest Jiaotong University, 2015, 28(5): 905-911,941. doi: 10.3969/j.issn.0258-2724.2015.05.021 |
[5] | YANG Chengyong, OUYANG Jie, LU Jinghui. Assessment on Safety of Steel Reinforced Shotcrete Support for Tunnels[J]. Journal of Southwest Jiaotong University, 2014, 27(2): 254-259. doi: 10.3969/j.issn.0258-2724.2014.02.011 |
[6] | LIU Li, WANG Yongqing. Security Analysis of Video Hashing[J]. Journal of Southwest Jiaotong University, 2012, 25(4): 675-679. doi: 10.3969/j.issn.0258-2724.2012.04.022 |
[7] | CHE Mao-Ru, ZHANG Wei-Hua, JIN Hua-Song, Shu-Min-Hao, . Influences ofW heelsetM isalignment on Running Safety ofRailway Vehicles[J]. Journal of Southwest Jiaotong University, 2010, 23(1): 12-16. doi: 10. 3969/.j issn. 0258-2724. 2 |
[8] | PAN Yi, 2, YANG Cheng, ZHAO Shichun, 2 LIN Yongjun, DAI Jie. Safety Appraisement of Existing Structures Based on Pushover Method[J]. Journal of Southwest Jiaotong University, 2010, 23(2): 174-178. doi: 10. 3969/ j. issn. 0258-2724. |
[9] | YANG Guang-Wu, XIAO Shou-Ne, MA Wei-Hua. Effect of Coupler Compression Force on Locomotive Safety on Tangent Track[J]. Journal of Southwest Jiaotong University, 2010, 23(5): 657-662. doi: 10. 3969/ j. issn. 0258-2724. |
[10] | WANG Kaiyun, ZHAI Wanming. Dynamic Interaction between Heavy Locomotive and Track under Longitudinal Force of Coupler[J]. Journal of Southwest Jiaotong University, 2009, 22(1): 7-12. |
[11] | CHEN Weirong, LI Wenhao, ZHANG Qian, THOMAS Reichmann. Comparison of Dynamic Performances of Several Pantograph/Catenary Systems for High-Speed Railway[J]. Journal of Southwest Jiaotong University, 2009, 22(3): 354-359. |
[12] | ZHANG Wenfang, HE Dake, WANG Hongxia, WANG Xiaomin. Conspiracy Attack Immune(t,n) Threshold Signature Scheme with Traceability[J]. Journal of Southwest Jiaotong University, 2007, 20(4): 461-467. |
[13] | ZHANG Zutao, ZHANG Jiashu, HE Hongjie. Safety of Facial Images Based on Fragile Digital Watermarking[J]. Journal of Southwest Jiaotong University, 2007, 20(3): 340-344. |
[14] | LU Rongbo, HE Dake, WANG Changji. E-Cash System for Multiple Banks Based on Restrictive Proxy Blind Signature[J]. Journal of Southwest Jiaotong University, 2007, 20(5): 595-599. |
[15] | YUAN Ding, FAN Pingzhi. Nonrepudiable Threshold Proxy Signature Scheme Based on Elliptic Curve Cryptography[J]. Journal of Southwest Jiaotong University, 2007, 20(1): 8-12. |
[16] | JINHui, WANGJin-nuo. Fatigue Reliability of Notched Parts from Viewpoint of Structural System[J]. Journal of Southwest Jiaotong University, 2003, 16(3): 294-296. |
[17] | NI Wen-bo, WANGKai-wen. A Criterion for EvaluatingTiltingTrains Return Safety[J]. Journal of Southwest Jiaotong University, 2001, 14(1): 67-70. |