[1] Brickell E, Camenisch J, Chen Liqun. Direct anonymous attestation//CCM2004. : ACM Press, 2004: 132-145. [2] Ge He, Tate S R. A direct anonymous attestation scheme for embedded devices[J]. Lecture Notes in Computer Science, 2007, 4450: 16-30. [3] Brickell E, Chen Liqun, Li Jiangtao. A new direct anonymous attestation scheme from bilinear maps[J]. Lecture Notes in Computer Science, 2008, 4968: 166-178. [4] Brickell E, Chen Liqun, Li Jiangtao. Simplified security notions of direct anonymous attestation and a concrete scheme from pairings[J]. International Journal of Information Security, 2009, 8(5): 315-330. [5] Chen Liqun, Morrissey P, Smart N P. Pairings in trusted computing[J]. Lecture Notes in Computer Science, 2008, 5209: 1-17. [6] Chen Liqun. A DAA scheme requiring less TPM resources[J]. Lecture Notes in Computer Science, 2011, 6151: 350-365. [7] Chen Liqun, Morrissey P, Smart N P. DAA: fixing the pairing based protocols. (2009). http://eprint.iacr.org/. [8] Chen Xiaofeng, Feng Dengguo. Direct anonymous attestation for next generation TPM[J]. Journal of Computers, 2008, 3(12): 43-50. [9] Brickell E, Li Jiangtao. A pairing-based DAA Scheme further reducing TPM resources[J]. Lecture Notes in Computer Science, 2010, 6101: 181-195. [10] Lysyanskaya A, Rives, R L, Sahai A, et al. Pseudonym systems[J]. Lecture Notes in Computer Science, 2000, 1758: 184-199. |