References
- M. Bellare and P. Rogaway, Entity authentication and key distribution, Lec-ture Notes in computer Science 773 (1994), 232-149.
- M. Bellare and O. Goldreich, On defining proofs of knowledge, Lecture Notes in computer Science 740 (1993), 390-420.
- D. Boneh, B. Lynn, and H. Shacham, Short signatures from the Weil pairing, In ASI- ACRYPT '01: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security, London, UK, Springer-Verlag, (2001), 514-532.
- D. Boneh and M.K. Franklin, Identity-based encryption from the Weil pairing, In CRYPTO '01: Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag, (2001), 213-229.
- W. Diffe, P.C. van Oorschot and M.J. Wiener, Authentication and Authenticated key exchanges Designs, Codes and Cryptography 2 (1992), 107-125. https://doi.org/10.1007/BF00124891
- U. Feige, A. Fiat, and A. Shamir, Zero knowledge proofs of identity, J. Cryptology 1 (1988), 77-94. https://doi.org/10.1007/BF02351717
- A. Fiat and A. Shamir, How to prove yourself: practical solutions to identification and sig- nature problems, Advances in Cryptology, Lecture Notes in Computer Science 263 (1987), 186-194.
- O. Goldreich, S. Micali, and A. Wigderson, Proofs that yield nothing but their validity or all languages in np have zero-knowledge proof systems, J. ACM 38 (3) (1991), 690-728. https://doi.org/10.1145/116825.116852
- Y. W. Lee and B. M. Choi, Intelligent ID-based threshold systems by an encryption and decryption from bilinear pairing, Lecture Notes in Artificial Intelligence, 9th International Conference, KES LNAI 3682 (2005) 1022-1028.
- B. M. Choi and Y. W. Lee, Secure identification and signature using Zero-knowledge proofs and bilinear pairings, J. Chungcheong Math. Soc. 21 (2008) 403-411.
- A. Saxena, B. Soh and S. Priymak, Zero-Knowledge blind identification for smart cards using bilinear pairings, Cryptology e-Print Archive, Report 343, (2005).
- D.R. Stinson and J. Wu, An effcient and secure two-flow zero-knowledge identification protocol, Cryptology e-Print Archive, Report 337, (2006).