| [1] CHAUM D. Blind signatures for untraceable payments[C]//CRYPTO 1983:Proceedings of the 1983 Workshop on the Theory and Application of Cryptographic Techniques. Boston:Springer, 1983:199-203. [2] CHAUM D, den BOER B, VAN HEYST E, et al. Efficient offline electronic checks[C]//EUROCRYPT 1989:Proceedings of the 1989 Workshop on the Theory and Application of Cryptographic Techniques, LNCS 434. Berlin:Springer, 1990:294-301.
 [3] CHAUM D, FIAT A, NAOR M. Untraceable electronic cash[C]//CRYPTO 1988:Proceedings of the 1988 Workshop on the Theory and Application of Cryptographic Techniques, LNCS 403. New York:Springer, 1990:319-327.
 [4] SHAMIR A. Identity-based cryptosystems and signature schemes[C]//CRYPTO 1984:Proceedings of the 1984 Workshop on the Theory and Application of Cryptographic Techniques, LNCS 196. Berlin:Springer, 1985:47-53.
 [5] AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[C]//ASIACRYPT 2003:Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security, LNCS 2894. Berlin:Springer, 2003:452-443.
 [6] ABE M, FUJISAKI E. How to date blind signatures[C]//ASIACRYPT 1996:Proceedings of the 1996 International Conference on the Theory and Application of Cryptology and Information Security, LNCS 1163. Berlin:Springer, 1996:244-251.
 [7] ESLAMI Z, TALEBI M. A new untraceable off-line electronic cash system[J]. Electronic Commerce Research and Applications, 2011, 10(1):59-66.
 [8] LUO J N, YANG M H, HUANG S-Y. An unlinkable anonymous payment scheme based on near field communication[J].Computers and Electrical Engineering, 2016, 49:198-206.
 [9] YANG J-H, LIN P-Y. A mobile payment mechanism with anonymity for cloud computing[J]. Journal of Systems and Software, 2016, 116:69-74.
 [10] POURGHOMI P, SAEED M Q, GHINEA G. A secure cloud-based NFC mobile payment protocol[J]. International Journal of Advanced Computer Science and Application, 2014, 5(10):24-31.
 [11] YANG J-H, CHANG Y-F, CHEN Y-H. An efficient authenticated encryption scheme based on ecc and its application for electronic payment[J]. Information Technology And Control, 2013, 42(4):315-324.
 [12] CHAUDHRY S A, FARASH M S, NAQVI H, et al. A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography[J]. Electronic Commerce Research, 2016, 16(1):113-139.
 [13] LIU J H, HU Y.A new off-line electronic cash scheme for bank delegation[C]//ICIST 2015:Proceedings of the 5th International Conference on Information Science and Technology. Piscataway, NJ:IEEE, 2015:186-191.
 |