1 A. Saxena, "Zero-Knowledge blind identification for smart cards using bilinear pairings" Cryptology e-Print Archive 2005
2 U. Feige, "Zero knowledge proofs of identity" 1 : 77-94, 1988
3 D. Boneh, "Short signatures from the Weil pairing" Springer-Verlag 514-532, 2001
4 Byung Mun Choi, "Secure identification and signature using zero-knowledge proofs and bilinear pairings" 충청수학회 21 (21): 403-411, 2008
5 O. Goldreich, "Proofs that yield nothing but their validity or all languages in np have zero-knowledge proof systems" 38 (38): 690-728, 1991
6 M. Bellare, "On defining proofs of knowledge" 740 : 390-420, 1993
7 Y. W. Lee, "Intelligent ID-based threshold systems by an encryption and decryption from bilinear pairing, Lecture Notes in Artificial Intelligence" 1022-1028, 2005
8 D. Boneh, "Identity-based encryption from the Weil pairing" Springer-Verlag 213-229, 2001
9 A. Fiat, "How to prove yourself: practical solutions to identification and sig-nature problems, Advances in Cryptology" 263 : 186-194, 1987
10 M. Bellare, "Entity authentication and key distribution" 773 : 232-249, 1994
1 A. Saxena, "Zero-Knowledge blind identification for smart cards using bilinear pairings" Cryptology e-Print Archive 2005
2 U. Feige, "Zero knowledge proofs of identity" 1 : 77-94, 1988
3 D. Boneh, "Short signatures from the Weil pairing" Springer-Verlag 514-532, 2001
4 Byung Mun Choi, "Secure identification and signature using zero-knowledge proofs and bilinear pairings" 충청수학회 21 (21): 403-411, 2008
5 O. Goldreich, "Proofs that yield nothing but their validity or all languages in np have zero-knowledge proof systems" 38 (38): 690-728, 1991
6 M. Bellare, "On defining proofs of knowledge" 740 : 390-420, 1993
7 Y. W. Lee, "Intelligent ID-based threshold systems by an encryption and decryption from bilinear pairing, Lecture Notes in Artificial Intelligence" 1022-1028, 2005
8 D. Boneh, "Identity-based encryption from the Weil pairing" Springer-Verlag 213-229, 2001
9 A. Fiat, "How to prove yourself: practical solutions to identification and sig-nature problems, Advances in Cryptology" 263 : 186-194, 1987
10 M. Bellare, "Entity authentication and key distribution" 773 : 232-249, 1994
11 W. Diffie, "Authentication and Authenticated key ex-changes Designs" 2 : 107-125, 1992
12 D.R. Stinson, "An efficient and secure two-flow zero-knowledge identification protocol" Cryptology e-Print Archive 2006