[1] Nakamoto S. Bitcoin: a peer-to-peer electronic cash system[Online], available: https://bitcoin.org/bitcoin.pdf, 2009.
[2] Zhu Liehuang, Gao Feng,Shen Meng, Li Yandong, Zheng Baokun, Mao Hongliang, Wu Zhen. Survey on Privacy Preserving Techniques for Blockchain Technology[J]. Journal of Computer Research and Development, 2017,54(10):2170-2186.
(祝烈煌,高峰,沈蒙,李艳东,郑宝昆,毛洪亮,吴震.区块链隐私保护研究综述[J].计算机研究与发展,2017,54(10):2170-2186.)
[3] Qian Weining,Shao Qifeng,Zhu Yanchao,Jin Cheqing,Zhou Aoying. Research Problems and Methods in Blockchain and Trusted Data Management[J].Journal of Software,2018, 29(01):150-159.
(钱卫宁,邵奇峰,朱燕超,金澈清,周傲英.区块链与可信数据管理:问题与方法[J].软件学报,2018,29(01):150-159.)
[4] Zyskind G, Nathan O. Decentralizing privacy: Using blockchain to protect personal data[C]//Security and Privacy Workshops (SPW), 2015 IEEE. IEEE, 2015: 180-184.
[5] Kosba A, Miller A, Shi E, et al. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts[C]//Security and Privacy (SP), 2016 IEEE Symposium on. IEEE, 2016: 839-858.
[6] Li Jingyuan, Fan Xianghui, Wang Yi
ng, Design of Sharing Economy Privacy Protection Mechanism Based on Block Chain[J]. Computer Applications and Software, 2019,36(01),296-301.
(李静元,范祥辉,王颖.基于区块链的共享经济隐私保护机制的设计[J].计算机应用与软件,2019,36(01):296-301.)
[7] Wang Xiuli,Jiang Xiaozhou, Li Yang. Model for Data Access Control and Sharing Based on Blockchain[J]. Journal of Software, 2019,30(06),1661-1669.
(王秀利,江晓舟,李洋.应用区块链的数据访问控制与共享模型[J].软件学报,2019(06):1661-1669.)
[8] Liu Yahui, Zhang Tieying, Jin Xiaolong, Cheng Xueqi. Personal Privacy Protection in the Era of Big Data[J]. Journal of Computer Research and Development, 2015,52(01): 229-247.
(刘雅辉,张铁赢,靳小龙,程学旗.大数据时代的个人隐私保护[J].计算机研究与发展,2015,52(01):229-247.)
[9] Zhang Xiaohong, Sun Lanlan. Attribute Proxy Re-encryption for Ciphertext Storage and Sharing Scheme in Blockchain[J/OL]. Journal of System Simulation:1-14[2019-06-25].http://kns.cnki.net/kcms/detail/11.3092.V.20190218.0859.002.html.
(张小红,孙岚岚.属性代理重加密的区块链密文云存储共享研究[J/OL].系统仿真学报:1-14[2019-06-25].http://kns.cnki.net/kcms/detail/11.3092.V.20190218.0859.002.html.)
[10] Yuan Yong, Wang Feiyue. Blockchain: the state of the art and future trends[J]. Acta Automatica Sinica, 2016, 42(4): 481− 494.
(袁勇, 王飞跃. 区块链技术发展现状与展望[J]. 自动化学报, 2016, 42(4):481-494.)
[11] Si Xueming, Xv Mixue, Yuan Chao. Survey on Security of Blockchain[J]. Journal of Cryptologic Research, 2018,5(05):458-469.
(斯雪明,徐蜜雪,苑超.区块链安全研究综述[J].密码学报,2018,5(05):458-469.)
[12] Shamir A . Identity-Based Cryptosystems and Signature Schemes.[J]. Lect.notes Comput.sci, 1985, 196(2):47-53.
[13] Liu Jinghao, Ping Jianchuan, Fu Xiaomei. Research on Distrributed Public Key System Based on Blockchain[J]. Netinfo Security,2018(08):25-33.
(刘敬浩,平鉴川,付晓梅.一种基于区块链的分布式公钥管理方案研究[J].信息网络安全,2018(08):25-33.)
[14] Blaze M,Bleumer G,Strauss M. Divertible protocols and atomic proxy cryptography [C]//Proc of the 18th Annual International Cryptology Conference on Advances in Cryptology. Berlin: Springer,1998:127-144.
[15] Jiaxing Li, Jigang Wu, Long Chen. Block-Secure: Blockchain Based Scheme for Secure P2P Cloud Storage[J]. Information Sciences,2018,465:219-231.
[16] Liehuang Zhu,Yulu Wu,Keke Gai, Kim-Kwang Raymond Choo. Controllable and trustworthy blockchain-based cloud data management[J]. Future Generation Computer Systems,2019,91: 527-535.
[17] Songjie W, Shuai L,Peilong L,et al. BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys[J]. Security and Communication Networks,2018,2018:1-14
|