|
參考文獻 [1]D. Chaum, “Blind signature for untraceable payments”,In: Proceedingsof advances in Cryptology, pp.199-203, 1983. [2]D. Chaum, A. Fiat, and M. Naor,“Untraceable electronic cash” ,In: Proceedings of advances in Cryptology, Vol. 403, pp.319-327, 1990. [3]W. S. Juang and H. T. Liaw, “A practical anonymous multi-authority e-cashscheme”,Applied Mathematics and Computation, Vol. 147, No. 3, pp. 699-711, 2004. [4]C. L. Chen and M. H. Liu, “A traceable E-cash transfer system against blackmail via subliminal channel”,Electronic Commerce Research and Applications, Vol. 8, No. 6, pp. 327-333, 2009. [5]D. Chaum, B. D. Boer, and E. V. Heyst, S. Mjolsnes, A.Steenbeek, “Efficient offline electronic check”, In: Proceedings of advances in Cryptology, Vol. 434, pp. 294-301, 1989. [6]W. K. Chen, “Efficient offline electronic check”, In: Proceedings of advances in Cryptology, Vol. 162,pp. 1259-1263, 2005. [7]C.C. Chang, S.C.Chang and J. S. Lee, “An on-line electronic checks system with mutual authentication”,Computers& Electrical Engineering, Vol. 35,pp. 757-763, Sep. 2009. [8]劉鎮緯, “行動付費系統與電子支票系統之研究”,朝陽科技大學碩士論文, 2010. [9]F. Y. Yang, Z. W. Liu, and S. H. Chiu, “An electronic check system with efficient online computational ability”, Journal of Convergence Information Technology, Vol. 6, No. 12, pp. 210-219, Dec. 2011. [10]Y.Xu and J. Liu, “Electronic check system design based on NFC,” Management and Service Science ,Vol. 147, No. 3, pp. 1-4, 2009. [11]D. Y. Zhao, T. Liu and Q. Li, “An iD-based key exchange protocol in wireless sensor networks”, Energy Procedia, Vol. 13, pp.2316-2321, 2011. [12]D. Boneh and M. Franklin, “Identity-base encryption from the Weil pairing,” Appears in SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003. [13]M. Bellare and P. Rogaway, “Random oracles are practical: a paradigm for designing efficient protocols”, Proc. of the 1st ACM on Computer and Communications Security CCs’93, ACM press, pp.354-368, 2002. [14]D. Boneh, M. Shacham, and B. Lynn, “Short signatures from the Weil-pairing”, Advances in Cryptology –Asiacrypt‘2001, Vol. 2248, pp. 514-532, 2001. [15]T. Okamoto and D. Pointcheval, “The gap-problem: a new class of problems for the security of cryptographic schemes”, Lecture Notes in Computer Science, pp. 104-118, 2001. [16]C. Racko, D. Simon, “Non-interactive zero-knowledge proof of knowledge and chosen ciphertextattack",Lecture Notes in Computer Science, Vol. 576, pp. 433-444, 1992. [17]F. Hess, “Efficient identity based signature schemes on pairings”,Computer Science, Vol. 2595, pp. 310-324, 2003. [18]M.Holbl, T. Welzer and B. Brumen, “An improved two-party identity-based authenticated key agreement protocol using pairings”, Journal of Computer and System Sciences, Vol. 78, pp. 142-150, 2012.
|