1Feng Bao, Robert H Deng. An efficient and practical scheme for privacy protection in the E-commerce of digital goods [A]. Proc. ICICS 2000[C]. LNCS 2015 ,Springer Verlag,2001. 162-170.
2Zero-Knowledge System Inc [EB/OL]. http://www.zero-knowledge.com/.
3Donal O' Mahony, Michael Peirece. Electronic Payment Systems[Ml.Artech House, 1997. 145-190.
4B Aiello, Y lshai, O Reingold. Priced oblivious transfer: How to sell digital goods[A]. Advances in Cryptology-Eurocrypt 2001 [C]. LNCS 2045, Springer-Verlag,2001.119-135.
5M Naor, B Pinkas. Oblivious transfer and polynomial evaluation[A].Proc. 31^st Ann [C]. ACM Symp, Theory of Computing, 1999. 245-254.
6A C Yao. How to generate and exchange secrets[A]. Prec. 27^th Ann.IEEE Symp[C]. Foundations of Computer Science, 1986.162-167.
7Yan-Cheng Chang, Chi-Jen Lu. Oblivious polynomial evaluation and oblivious neural learning[A] .Proc.31^st ACM Symposium on Theory of Computing[C]. 1999. 245-254.
8Y Ishai ,E Kushilevitz. Randomizing polynomials: A new representation with applications to round-efficient secure computation[A]. Proc. 41^st Ann IEEE Symp[C]. Foundations of Computer Science, 2000. 294-304.
9O Goldreich, S Micah, A Wigdersion. How to play any mental game or a completeness theorem for protocols with honest majority[A]. Proc. 19^th Ann[C]. ACM Symp,qheory of Computing, 1987. 218-229.
10Chaam D. Untraceable electronic mail, return addresses, and digital pseudonyms[J]. Comrmmications of the ACM, 1981,24(2):84-88.