Trusted Computing Group.TCG TNC Arthitecture for Interoperability Specification Version 1.3[S].Released 6 Phoniex:TCGPublished,2008.7.
[2]
CAMENISCH J,STADLER M.Efficient group signature schemes for large groups[C]∥Advances in Cryptology-CRYPTO 97,California:Springer Verlag,1997:410-424.
[3]
CAMENISCH J,MICHELS M.A group signature scheme with improved efficiency[C]∥Pei,editors,Advances inCryptology-ASIACRYPT 98.Beijing:Springer-Verlag,1998:160-174.
[4]
CAMENISCHJ,MICHELS M.Separability and efficiency for generic group signature schemes[C]∥Advances in Cryptology-CRYPTO 99 California:Springer-Verlag,1999:413-430.
[5]
CAMENISCHJ,LYSYANSKAYS A.Dynamic accumulators and application to efficient revocation of anonymous credentials[C]∥Advances in Cryptology-CRYPTO 2002,California:Springer-Verlag,2002:61-76.
[6]
CAMENISCHJ,LYSYANSKAYA A.A signature scheme with efficient protocols[C]∥Security in Communication Networks,Third International Conference,SCN2002 Berlin,New York:Springer-Verlag,2003:268-289.
[7]
RIVEST R L,SHAMIR A,TAUMANY.Howto leak a secret[C]∥In AsiaCrypt2001.Berlin:Springer-Verlag,2001:552-565.
[8]
GOLDREICHO.Foundations of Cryptography[M].London:Cambridge University Press,2001:35-36.