[1] CHAUM D. Blind signatures for untraceable payments[C]//CRYPTO 1983:Proceedings of the 1983 Workshop on the Theory and Application of Cryptographic Techniques. Boston:Springer, 1983:199-203. [2] CHAUM D, den BOER B, VAN HEYST E, et al. Efficient offline electronic checks[C]//EUROCRYPT 1989:Proceedings of the 1989 Workshop on the Theory and Application of Cryptographic Techniques, LNCS 434. Berlin:Springer, 1990:294-301. [3] CHAUM D, FIAT A, NAOR M. Untraceable electronic cash[C]//CRYPTO 1988:Proceedings of the 1988 Workshop on the Theory and Application of Cryptographic Techniques, LNCS 403. New York:Springer, 1990:319-327. [4] SHAMIR A. Identity-based cryptosystems and signature schemes[C]//CRYPTO 1984:Proceedings of the 1984 Workshop on the Theory and Application of Cryptographic Techniques, LNCS 196. Berlin:Springer, 1985:47-53. [5] AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[C]//ASIACRYPT 2003:Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security, LNCS 2894. Berlin:Springer, 2003:452-443. [6] ABE M, FUJISAKI E. How to date blind signatures[C]//ASIACRYPT 1996:Proceedings of the 1996 International Conference on the Theory and Application of Cryptology and Information Security, LNCS 1163. Berlin:Springer, 1996:244-251. [7] ESLAMI Z, TALEBI M. A new untraceable off-line electronic cash system[J]. Electronic Commerce Research and Applications, 2011, 10(1):59-66. [8] LUO J N, YANG M H, HUANG S-Y. An unlinkable anonymous payment scheme based on near field communication[J].Computers and Electrical Engineering, 2016, 49:198-206. [9] YANG J-H, LIN P-Y. A mobile payment mechanism with anonymity for cloud computing[J]. Journal of Systems and Software, 2016, 116:69-74. [10] POURGHOMI P, SAEED M Q, GHINEA G. A secure cloud-based NFC mobile payment protocol[J]. International Journal of Advanced Computer Science and Application, 2014, 5(10):24-31. [11] YANG J-H, CHANG Y-F, CHEN Y-H. An efficient authenticated encryption scheme based on ecc and its application for electronic payment[J]. Information Technology And Control, 2013, 42(4):315-324. [12] CHAUDHRY S A, FARASH M S, NAQVI H, et al. A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography[J]. Electronic Commerce Research, 2016, 16(1):113-139. [13] LIU J H, HU Y.A new off-line electronic cash scheme for bank delegation[C]//ICIST 2015:Proceedings of the 5th International Conference on Information Science and Technology. Piscataway, NJ:IEEE, 2015:186-191. |