[1] LIU J, JIA J, ZHANG H, et al. Digital signature protocol based on error-correcting codes [J]. Journal of Huazhong University of Science and Technology: Natural Science, 2014,42(11):97-101.(刘金会,贾建卫,张焕国,等.一种基于纠错码的数字签名协议[J].华中科技大学学报:自然科学版,2014,42(11):97-101.) [2] BERLEKAMP E R, McELIECE R J, van TILBORG H C A. On the inherent intractability of certain coding problems [J]. IEEE Transactions on Information Theory, 1978,24(3):384-386. [3] McELIECE R J. A public-key cryptosystem based on algebraic coding theory [J]. DSN Progress Report, 1978,42(44):114-116. [4] NIEDERREITER H. Knapsack-type cryptosystems and algebraic coding theory [J]. Problems of Control and Information Theory, 1986,15(2):159-166. [5] COURTOIS N, FINIASZ M, SENDRIER N. How to achieve a McEliece-based digital signature scheme [EB/OL]. [2015-01-03]. http://www.researchgate.net/publication/221327329_How_to_Achieve_a_McEliece-Based_Digital_Signature_Scheme. [6] CHAUM D. Blind signature system [C]//Proceedings of Crypto 1983. Berlin: Springer, 1984:153-153. [7] CHAUM D. Blind signatures for untraceable payments [C]//Proceedings of Crypto 1982. Berlin: Springer, 1983:199-203. [8] LIU X, XIN X. Improved blind signature electronic cash scheme [J]. Computer Engineering and Applications, 2011,47(4):114-116.(刘晓亚,辛小龙.改进的盲签名电子现金方案[J].计算机工程与应用,2011,47(4):114-116.) [9] ZHENG D, LI X, HUANG Z. Cryptography-cryptographic algorithm and agreement [M]. Beijing: Publishing House of Electronics Industry, 2014:104-106,162-165.(郑东,李祥学,黄征.密码学——密码算法与协议[M].北京:电子工业出版社,2014:104-106,162-165.) [10] OVERBECK R. A step towards QC blind signatures [EB/OL]. [2015-01-04]. http://eprint.iacr.org/2009/102.pdf. [11] LI Z, LI Z. Niederreiter PKC based blind signature scheme [J]. Journal of Beijing Electronic Science and Technology Institute, 2013,21(2):50-55.(李泽慧,李子臣.基于Niederreiter公钥密码体制的盲签名方案[J].北京电子科技学院学报,2013,21(2):50-55.) [12] ZHENG D, ZHAO Q, ZHANG Y. A brief overview on cryptography [J]. Journal of Xi'an University of Posts and Telecommunication, 2013,18(6):1-10.(郑东,赵庆兰,张应辉.密码学综述[J].西安邮电大学学报,2013,18(6):1-10.) [13] WU S. Hash function analysis summary [R]. Beijing: Institute of Software, Chinese Academy of Science, 2010.(吴双.Hash函数分析方法综述[R]. 北京:中国科学院软件研究所,2010.) [14] CANTEAUT A. A new algorithm for finding minimum-weight words in large linear codes [C]//Proceedings of the 5th IMA Conference on Cryptography and Coding, LNCS 1025. Berlin: Springer-Verlag, 1995:205-212. |