3[3]D Chaum.Blind Signatures for Untraceable Payments[C]. Adv-ances in cryptology - Crypto'82,1983.199-203.
4[4]D Chaum,A Fiat,M Naor.Untraceable Electronic Cash [C].Advances in ryptology-Crypto'88,1990.319-327.
5[5]T Okamoto,et al.Disposable Zero-knowledge Authentication and Their Applications to Untraceable Electronic Cash[C].Advances in Cryptology,Proceedings of Crypto'89 (Lecture Notes in Computer Science),1990.481-496.
6[6]I B Damgàrd.Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals[C].Advances in Cryptology,Proceedings of Crypto'88(Lecture Notes in Computer Science),1988.328-335.
7[7]B Pfitzmann,M Waidner.How to Break and Repair a'Provably Secure' Untraceable Payment System[C].Advances in Crytology,Proceedings of Crypto'91 (Lecture Notes in Computer Science 576),1992.338-350.
8[8]M Franklin,M Yung. Towards Provably Secure Efficient Elec-tronic Cash[C].Report CUCS-018-92,Columbia University,Department of Computer Science,1992.
9[9]M Franklin,M Yung. Secure and Efficient Off-line Digital Mo-ney[C].Proc. ICALP'93 LNCS 700,Springer-verlag,1993.265-276.
10[10]A Chan,Y Frankel,Y Tsiounis. An Efficient Off-line Electronic Cash Scheme as Secure as RSA[C].Research Report NU-CCS-96-03,Northeastern University,Boston,Massachusetts,1995.