[1] Narayanan A, Bonneau J, Felten E, et al. Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction [M]. Princeton, NJ, USA: Princeton University Press, 2016
[2] Kosba, Ahmed, Andrew Miller, Elaine Shi, Zikai Wen, and Charalampos Papamanthou. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts [C]//Proc of IEEE Symposium on Security and Privacy (SP).Piscataway,NJ:IEEE, 2016: 839-858
[3] Cachin, Christian. Architecture of the hyperledger blockchain fabric [C]//Proc of Workshop on Distributed Cryptocurrencies and Consensus Ledgers. Chicago, USA, 2016:1-4
[4] Castro, Miguel, and Barbara Liskov. Practical Byzantine fault tolerance [C]// Proc of the 3rd Symp on Operating Systems Design and Implementation. New Orleans, USA, 1999:173-186
[5] Ongaro, Diego, John K. Ousterhout. In search of an understandable consensus algorithm [C]//Proc of USENIX Annual Technical Conf. Berkeley:USENIX Association, 2014:305-319
[6] Meiklejohn S, Pomarole M, Jordan G, et al. A fistful of bitcoins: Characterizing payments among men with no names [C]//Proc of the 2013 Conf on Internet Measurement. Barcelona, Spain, 2013:127-140
[7] Noether S. Ring signature confidential transactions for Monero [DB/OL]. IACR Cryptology ePrint Archive. 2015:1098
[8] Sasson EB, Chiesa A, Garman C, et al.Zerocash: Decentralized anonymous payments from bitcoin [C]//Proc of IEEE Symp on Security and Privacy. Piscataway,NJ:IEEE, 2014: 459-474
[9] Ben-Sasson, Eli, Alessandro Chiesa, Eran Tromer, and Madars Virza. Succinct non-interactive zero knowledge for a von neumann architecture [C]//Proc of USENIX Security Symp. Berkeley:USENIX Association, 2014: 781-796
[10] Gennaro, Rosario, Craig Gentry, Bryan Parno, and Mariana Raykova. Quadratic span programs and succinct NIZKs without PCPs [C]//Proc of Annual Int Conf on the Theory and Applications of Cryptographic Techniques. Athens, Greece, 2013: 626-645
[11] Yao, Andrew C. Protocols for secure computations[C]//Proc of the 23rd Annual Symp on Foundations of Computer Science. Chicago, USA, 1982: 160-164
[12] Costan, Victor, and Srinivas Devadas. Intel SGX Explained [DB/OL]. IACR Cryptology ePrint Archive 2016: 86
[13] Ben-Sasson, Eli, Alessandro Chiesa, Matthew Green, Eran Tromer, and Madars Virza. Secure sampling of public parameters for succinct zero knowledge proofs [C]//Proc of IEEE Symp on Security and Privacy . Piscataway,NJ:IEEE, 2015: 287-304
|