Citation: | LU Rongbo, SU Hangli, HE Dake, MIAO Xianghua. Offline E-cash System with Finite Circulation Period Based on Elliptic Curve[J]. Journal of Southwest Jiaotong University, 2006, 19(3): 314-318. |
CHAUM D.Blind signatures for untraceable payments[C] ∥Advances in Cryptology-Crypto 82.Santa Barbara:Springer Verlag,1983:199-203.[2] CHAUM D,FIAT A,NAOR M.Untraceable electronic cash[C] ∥Advances in Cryptology-Crypto 88.Santa Barbara:Springer Verlag,1990:319-3271.[3] CHAN A,FRANKEL Y,TSIOUNIS Y.An efficient off-line electronic cash scheme as secure as RSA[R]. Research Report NU-CCS-96-03.Boston:Northeastern University,Massachusetts,1995.[4] BRANDS S.An efficient off-line electronic cash system based on the representation problem[R]. Report CS-R9323,Centrumvoor Wiskunde en Informatica,1993.[5] BRANDS S.Untraceable off-line electronic cash in wallet with observers[C] ∥Advances in Cryptology-Crypto 93.Santa Barbara:Springer Verlag,1994:302-318.[6] FRANKEL Y,T SIOUNIS Y,YUNG M.Indirect discourse proof:achieving fair off-line e-cash[C] ∥Proc Asiacrypt 96.Kyongju:Springer Verlag,1996:286-300.[7] ABE M,FJISAKI E.How to date blind signatures[C] ∥Advances in Cryptology-ASIACRY-PT 96.Berlin:Springer Verlag 1996:244-251.[8] KOBLITZ N.Elliptic cure crypto-systems[J]. Mathematics of Computation,1987,48:203-209.[9] MILLER V S.Use of elliptic cure in cryptography[C] ∥Advance in Cryptology-Crypto 85,Lecture Note in Computer Science.Berlin:Springer Verlag,1986,218:417-426.[10] CAELLI W J,DAWSON E P,REA S A.PKI,elliptic curve cryptography,and digital signatures[J]. Computers Security,1999,18:7-66.[11] YOU Lin,YANG Yixian,WEN Qiaoyan.Elliptic cuerve blind digital signature schemes[J]. Chinese Journal of Electronics,2003,12 (3):411-414.[12] 郭涛,李之棠,彭建芬,等.基于椭圆曲线的盲签名与离线电子现金协议[J]. 通信学报,2003,24(9):142-146.GUO Tao,LI Zhitang,PENG Jianfen,et al.Blind signature and off-line e-cash system based on elliptic curve[J]. Jounal of China Institute of Communications,2003,24(9):142-146.[13] GUILLOU L C,QUISQUATER J J.A practical zero-know ledge protocol fitted to security microprocessor minimizing both transmission and memory[C] ∥Advance in Cryptology-EUROCRYPT '88.Berlin:Springer-Verlag,1988:123-128.
|