[1]工业和信息化部. 《工业和信息化部办公厅关于推动工业互联网加快发展的通知》政策解读[EBOL]. (20200321) [20220731]. http:www.gov.cnzhengce20200321content_5493935.htm[2]Meticulous Market Research. Industrial IoT Market by Component, Industry verticals forecast to 2029 [EBOL]. 2022 [20220731]. https:www.researchandmarkets.comreports5206798industrialiotmarketbycomponentindustry[3]闫寒, 李端. 工业互联网安全风险分析及对策研究[J]. 网络空间安全, 2020, 11(2): 8187[4]Sengupta J, Ruj S, Dasbit S. A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT[J]. Journal of Network and Computer Applications, 2020, 149(1): 102481[5]Yu Xingjie, Guo Huaqun. A survey on IIoT security[C] Proc of IEEE VTS Asia Pacific Wireless Communications Symposium (APWCS). Piscataway, NJ: IEEE, 2019: 15[6]Steiner J G, Neuman B C, Schiller J I. Kerberos: An authentication service for open network systems[C] Proc of the USENIX. Berkelery, CA: USENIX Association, 1988[7]林俊燕. 基于树形桥CA的跨域身份认证解决方案[J]. 信息安全研究, 2019, 5(11): 10401043[8]Fromknecht C, Velicanu D, Yakoubov S. A namecoin based decentralized authentication system [EBOL]. (20140514) [20220731]. http:courses.csail.mit.edu6.8572014files19fromknechtvelicannyakoubovcertcoin.pdf[9]Malik N, Nanda P, Arora A, et al. Blockchain based secured identity authentication and expeditious revocation framework for vehicular networks[C] Proc of the TrustComBigDataSE. New York: ACM, 2018: 674679[10]Wang Wentong, Hu Ning, Liu Xin. Blockcam: A blockchainbased crossdomain authentication model[C] Proc of the 3rd IEEE Int Conf on Data Science in Cyberspace (DSC). Piscataway, NJ: IEEE, 2018: 896901[11]Zhang Hongxia, Chen Xingshu, Lan Xiao, et al. BTCAS: A blockchainbased thoroughly crossdomain authentication scheme[J]. Journal of Information Security and Applications, 2020, 55(12): 102538[12]Gu Pengpeng, Chen Liquan. An efficient blockchainbased crossdomain authentication and secure certificate revocation scheme[C] Proc of the Int Conf on Computer and Communications (ICCC). Piscataway, NJ: IEEE, 2020: 17761782[13]Deng Lunzhi, Shi Hongyu, Gao Yan. Certificateless linkable ring signature scheme[J]. IEEE Access, 2020, 8(3): 5464154651[14]Benet J. IPFS—Content addressed, versioned, P2P file system[EBOL]. (20140714) [20220731]. https:arxiv.orgabs1407.3561 [15]Bai Qinghai, Zheng Ying, Zhao Linna, et al. Research on mechanism of PKI trust model[J]. Applied Mechanics and Materials, 2014, 536(4): 536537: 694697[16]Andersen M P, Kumar S, Abdelbaky M, et al. WAVE: A decentralized authorization framework with transitive delegation[C] Proc of the 28th USENIX Security Symp (USENIX Security19). Berkelery, CA: USENIX Association, 2019: 13751392[17]Chen Jing, Yao Shixiong, Yuan Quan, et al. CertChain: Public and efficient certificate audit based on blockchain for TLS connections[C] Proc of the IEEE Conf on Computer Communication(INFOCOM). Piscataway, NJ: IEEE, 2018: 20602068[18]Myk A, Msk B, Ham A. CertLedger: A new PKI model with certificate transparency based on blockchain[J]. Computers & Security, 2019, 85(8): 333352[19]Wang Ze, Lin Jingqiang, Cai Quanwei, et al. Blockchainbased certificate transparency and revocation transparency[J]. IEEE Trans on Dependable and Secure Computing, 2020: 11[20]范青, 何德彪, 罗敏, 等. 基于SM2数字签名算法的环签名方案[J]. 密码学报, 2021, 8(4): 710723[21]Liu J, Au M H, Susilo W, et al. Linkablering signature with unconditional anonymity[J]. IEEE Trans on Knowledge and Data Engineering, 2014, 26(1): 157165[22]Handschuh H. SHA Family (Secure Hash Algorithm) Encyclopedia of Cryptography and Security: Computing, Networking, and Services[M]. Berlin: Springer, 2005[23]国家标准化管理委员会. GBT 32918.1—2016 信息安全技术SM2 椭圆曲线公钥密码算法 第1部分: 总则[S]. 北京: 中华人民共和国国家质量监督检验检疫总局, 2016[24]国家密码管理局. 国家密码管理局关于发布《SM2密码算法使用规范》等14项密码行业标准公告[EBOL]. (20121122) [20220731]. https:sca.gov.cnscaxwdt20121122content_1002397.shtml[25]Yang Yanyan, Hu Mingsheng, Kong shan, et al. Scheme on crossdomain identity authentication based on group signature for cloud computing[J]. Wuhan University Journal of Natural Science, 2019, 24(2): 134140[26]Ethereum.org. What is ethereum? [EBOL].2022 [20220731]. https:ethereum.orgenwhatisethereum[27]Osterland T, Rose T. Model checking smart contracts for Ethereum[J]. Pervasive and Mobile Computing, 2020, 63(3): 101129[28]马晓婷, 马文平, 刘小雪. 基于区块链技术的跨域认证方案[J]. 电子学报, 2018, 46(11): 25712579[29]杨绍禹, 王世卿, 郭晓峰. 一种基于环签名的跨域云服务资源远程证明方法[J]. 小型微型计算机系统, 2014, 35(2): 324328 |