Documentation and publications on the foundation of FATES.
FATES 项目文档参考与理论依据。
Camenisch, J., & Lysyanskaya, A. (2002, September). A signature scheme with efficient protocols. In International Conference on Security in Communication Networks (pp. 268-289). Springer, Berlin, Heidelberg. 🌟
Boudot, F. (2000, May). Efficient proofs that a committed number lies in an interval. In International Conference on the Theory and Applications of Cryptographic Techniques (pp. 431-444). Springer, Berlin, Heidelberg.
Maganis, G., Shi, E., Chen, H., & Song, D. (2012, June). Opaak: using mobile phones to limit anonymous identities online. In Proceedings of the 10th international conference on Mobile systems, applications, and services (pp. 295-308). ACM. 🌟
Fiat, A., & Shamir, A. (1986, August). How to prove yourself: Practical solutions to identification and signature problems. In Conference on the Theory and Application of Cryptographic Techniques (pp. 186-194). Springer, Berlin, Heidelberg.
Schnorr, C. P. (1991). Efficient signature generation by smart cards. Journal of cryptology, 4(3), 161-174.
Meiklejohn, S., Erway, C. C., Küpçü, A., Hinkle, T., & Lysyanskaya, A. (2010, August). ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash. In USENIX Security Symposium (Vol. 10, pp. 193-206).
📰 Related Work ©SecureCats. Released under the MIT License.
Authored and maintained by Team SecureCats.
© 2019 Made with 🖤 from BIT.