参考文献
[1]路彩霞. 区块链发展现状与安全风险管控措施探讨[J]. 网络安全和信息化, 2022 (2): 2527[2]李宗育, 桂小林, 顾迎捷, 等. 同态加密技术及其在云计算隐私保护中的应用[J]. 软件学报, 2018, 29(7): 18301851[3]Maxwell G. CoinJoin: Bitcoin privacy for the real world[EBOL]. [20221207]. https:bitcointalk.orgindex.php[4]Rivest R L, Shamir A, Adleman L. A method for obtaining digital signatures and publickey cryptosystems[J]. Communications of the ACM, 1978, 21(2): 120126[5]Todd P. Stealth addresses[ROL]. 2014 [20221207]. https:www.mailarchive.combitcoindevelopment@lists.sourceforge.netmsg03613.html[6]Goldwasser S, Micali S, Rackoff C. The knowledge complexity of interactive proof systems[J]. SIAM Journal on Computing, 1989, 18(1): 186208[7]BenSasson E, Chiesa A, Garman C. Zerocash: Decentralized anonymous payments from bitcoin[C] Proc of 2014 IEEE Symp on Security and Privacy. Piscataway, NJ: IEEE, 2014: 459474[8]Koundinya A K, Gautham S K. Twolayer encryption based on paillier and elgamal cryptosystem for privacy violation[J]. I.J. Wireless and Microwave Technologies, 2021, 11(3): 915[9]Tsai C S, Zhang Y S, Weng C Y. Separable reversible data hiding in encrypted images based on Paillier cryptosystem[J]. Multimedia Tools and Applications, 2022, 81(13): 1880718827[10]Fang W, Zamani M, Chen Z. Secure and privacy preserving consensus for secondorder systems based on paillier encryption[JOL]. Systems & Control Letters, 2021 [20221207]. https:doi.org10.1016j.sysconle.2020.104869[11]Ma J, Naas S A, Sigg S, et al. Privacypreserving federated learning based on multikey homomorphic encryption[J]. International Journal of Intelligent Systems, 2022, 37(9): 58805901[12]Bernabe J B, Canovas J L, HernandezRamos J L, et al. Privacypreserving solutions for blockchain: Review and challenges[J]. IEEE Access, 2019, 7: 164908164940[13]朱嵩. 基于区块链的智能电网数据安全聚合方案研究[D]. 南京: 南京邮电大学, 2021[14]Ghadamyari M, Samet S. Privacypreserving statistical analysis of health data using paillier homomorphic encryption and permissioned blockchain[C] Proc of 2019 IEEE Int Conf on Big Data. Piscataway, NJ: IEEE, 2019: 54745479[15]李建珍. 基于Paillier同态加密的区块链交易隐私保护的应用研究[D]. 南京: 东南大学, 2019[16]Yan X, Wu Q, Sun Y. A homomorphic encryption and privacy protection method based on blockchain and edge computing[JOL]. Wireless Communications and Mobile Computing, 2020 [20221207]. https:doi.org10.115520208832341[17]刁一晴, 叶阿勇, 张娇美, 等. 基于群签名和同态加密的联盟链双重隐私保护方法[J]. 计算机研究与发展, 2022, 59(1): 172181[18]Yao L, Shuai X. Accelerate the paillier cryptosystem in CryptDB by Chinese remainder theorem[C] Proc of the 20th Int Conf on Advanced Communication Technology. Piscataway, NJ: IEEE, 2018: 7477[19]Paillier P. Publickey cryptosystems based on composite degree residuality classes[C] Proc of 1999 Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 1999: 223238[20]Sun Z. Chinese remainder theorem[EBOL]. [20221207]. https:en.wikipedia.orgwiki[21]Ogunseyi T B, Bo T. Fast decryption algorithm for paillier homomorphic cryptosystem[C] Proc of 2020 IEEE Int Conf on Power, Intelligent Computing and Systems. Piscataway, NJ: IEEE, 2020: 803806[22]伍前红, 张键红, 王育民. 简单证明一个承诺值在特定区间内[J]. 电子学报, 2004, 32(7): 10711073
|