共 24 条
[1]
Secure sampling of public parameters for succinct zero knowledge proofs. Ben-Sasson E,Chiesa A,Green M,et al. Proc of IEEE Symp on Security and Privacy . 2015
[2]
Intel SGX Explained. Costan V,Devadas S. https://eprint.iacr.org/2016 /086.pdf . 2016
[3]
Quadratic span programs and succinct NIZKs without PCPs. Gennaro R,Gentry C,Pamo B,et al. Proc of Annual Int Conf on the Theory and Applications of Cryptographic Techniques . 2013
[4]
Ring signature confidential transactions for Monero. Noether S. http://eprint.iacr.org/2015/1098 . 2015
[5]
A fistful of bitcoins:Characterizing payments among men with no names. Meiklejohn S,Pomarole M,Jordan G,et al. Proc of the 2013 Conf on Internet Measurement . 2013
[6]
Architecture of the hyperledger blockchain fabric[C/OL]. Cachin C. Proc of Workshop on Distributed Cryptocurrencies and Consensus Ledgers . 2016
[7]
Bitcoin and Cryptocurrency Technologies:A Comprehensive Introduction. Narayanan A,Bonneau J,Felten E,et al. . 2016
[8]
Succinct non-interactive zero knowledge for a von Neumann architecture. BEN-SASSON E,CHIESA A,TROMER E,et al. USENIX Security. 2014 . 2014
[9]
Zerocash:Decentralized anonymous payments from bitcoin. Sasson E B,Chiesa A,Garman C,et al. Proc of IEEE Symp on Security and Privacy(SP) . 2014
[10]
In search of an understandable consensus algorithm. ONGARO D,OUSTERHOUT J. Proceedings of the2014 USENIX Annual Technical Conference . 2014