[1]Nakamoto S. Bitcoin: A peertopeer electronic cash system[EBOL]. [20161007]. https:bitcoin.orgbitcoin.pdf[2]周平. 中国区块链技术和应用发展白皮书[M]. 北京: 工业和信息化部, 2016[3]袁勇, 王飞跃. 区块链技术发展现状与展望[J]. 自动化学报, 2016, 42(4): 481494[4]Crosby M, Pattanayak P, Verma S, et al. BlockChain Technology: Beyond Bitcoin[M]. Berkeley: Applied Innovation Review, 2016[5]Buterin V. Ethereum Homestead Documentation [EBOL]. 2013 [20161007]. http:ethdocs.orgenlatestintroductionindex.html[6]Archana M. Naware. Bitcoins, its advantages and security threats[J]. International Journal of Advanced Research in Computer Engineering & Technology, 2016, 5(6): 17321735[7]BitFury Group. Proof of stake versus proof of work white paper[EBOL].Bifury Group Limited, 2015 [20161007]. http:www.cryptocoinsnews.combitcoinsfutureproofofstakevsproofofwork[8]Huan Meng. Security architecture and service for the bitcoin system[D]. Stolkholm, Sweden: Royal Institute of Technology, 2014[9]Sompolinsky Y, Aviv Zolar. Bitcoins security model revisisted[EBOL]. [20161007]. https:arxiv.orgabs1605.09193v2[10]Wust K. Security of Blockchain Technologies[D]. Zurich: Department of Computer Science, 2016[11]Decher C. On the Scalability and Security of Bitcoin[D]. Germany and Switzerland: Sciences of ETH Zurich, 2016[12]陶林君. 基于DHT的P2P关键技术研究[D]. 南京: 南京邮电大学, 2008[13]Ken Y K Hui, John C S Lui, David K Y Yau. Smallword overlay P2P networks: Construction, management and handling of dynamic flash crowds[J]. Computer Networks, 2006, 50: 27272746[14]卢苇, 周韬, 邢薇薇. 一种改进的非结构化P2P网络洪泛搜索机制[J]. 西北工业大学学报, 2015, 33(2): 342350[15]冯登国. 密码学原理与实践[M]. 3版. 北京: 电子工业出版社, 2009[16]祁明, 史国庆. 多重盲签名方案及其应用[J]. 计算机工程与应用, 2001, 37(3): 9192[17]严安, 杨明福. 基于椭圆曲线的有序多重数字签名方案[J]. 计算机应用与软件, 2007, 24(2): 164165,183[18]李勇, 雷丽楠, 朱岩. 密文访问控制及其应用研究[J]. 信息安全研究, 2016, 2(8): 721728[19]苏金树, 曹丹, 王小峰, 等. 属性基加密机制[J]. 软件学报, 2011, 22(6): 12991315[20]冯登国, 陈成. 属性密码学研究[J]. 密码学报, 2014, 1(1): 112[21]林莉, 怀进鹏, 李先贤. 基于属性的访问控制策略合成代数[J]. 软件学报, 2009, 20(2): 403414[22]沈志荣, 薛巍, 舒继武. 可搜索加密机制研究与进展[J]. 软件学报, 2014, 25(4): 880895
|