[1]Alladi T, Chamola V, Sikdar B, et al. Consumer IoT: Security vulnerability case studies and solutions[J]. IEEE Consumer Electronics Magazine, 2020, 9(2): 1725[2]Nakamoto S, Bitcoin A. A peertopeer electronic cash system[EBOL]. 2008 [20231024]. https:bitcoin.orgbitcoin[3]Ali S T. Bitcoin: Perils of an unregulated global P2P currency (transcript of discussion)[C] Proc of Cambridge Int Workshop on Security Protocols. Berlin: Springer, 2015: 294306[4]Bhme R, Christin N, Edelman B, et al. Bitcoin: Economics, technology, and governance[J]. Journal of Economic Perspectives, 2015, 29(2): 213238[5]Harlev M A, Sun Yin H, Langenheldt K C, et al. Breaking bad: Deanonymising entity types on the bitcoin blockchain using supervised machine learning[EBOL]. 2018 [20231005]. http:hdl.handle.net1012550331[6]Noether S, Mackenzie A. Ring confidential transactions[J]. Ledger, 2016, 1: 118[7]Li M, Yu S, Zheng Y, et al. Scalable and secure sharing of personal health records in cloud computing using attributebased encryption[J]. IEEE Trans on Parallel and Distributed Systems, 2012, 24(1): 131143[8]Liu J, Huang X, Liu J K. Secure sharing of personal health records in cloud computing: Ciphertextpolicy attributebased signcryption[J]. Future Generation Computer Systems, 2015, 52: 6776[9]Li F, Liu K, Zhang L, et al. Ehrchain: A blockchainbased ehr system using attributebased and homomorphic cryptosystem[J]. IEEE Trans on Services Computing, 2021, 15(5): 27552765[10]刘萌, 陈丹伟, 马圣东. 基于区块链可追溯的个人隐私数据共享技术研究[J]. 信息安全研究, 2023, 9(2): 109119[11]Blaze M, Bleumer G, Strauss M. Divertible protocols and atomic proxy cryptography[C] Proc of Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 1998: 127144[12]郭庆, 田有亮, 万良. 基于代理重加密的区块链数据受控共享方案[J].电子学报, 2023, 51(2): 477488[13]苏铓, 吴槟, 付安民, 等. 基于代理重加密的云数据访问授权确定性更新方案[J]. 软件学报, 2019, 31(5): 15631572[14]李莉, 曾庆贤, 文义红, 等. 基于区块链与代理重加密的数据共享方案[J]. 信息网络安全, 2020, 20(8): 1624[15]沈鑫, 裴庆祺, 刘雪峰. 区块链技术综述[J]. 网络与信息安全学报, 2016, 2(11): 1120[16]Shamir A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612613[17]Association A B. Public key cryptography for the financial services industry: The elliptic curve digital signature algorithm (ECDSA)[EBOL]. 1999 [20231103]. http:lucagiuzzi.unibs.itcorsiSupportpaperscryptography10.1.1.202.2977.pdf[18]Standard N F. Announcing the advanced encryption standard (AES)[J]. Federal Information Processing Standards Publication, 2001, 29(8): 22002203[19]Su Mang, Zhou Bo, Fu Anmin, et al. PRTA: A proxy reencryption based trusted authorization scheme for nodes on cloudIoT[J]. Information Sciences, 2020, 527: 533547[20]Wang Xuan, Ma Jianfeng, Xhafa F, et al. Costeffective secure Ehealth cloud system using identity based cryptographic techniques[J].Future Generation Computer Systems, 2017, 67: 242254[21]Zheng Zhiheng, Zhang Minqing, Dai Xiaoming, et al. Access control with high efficiency scheme for cloud storage based on proxy reencryption[J].Application of Electronic Technique, 2016, 42(11): 99101, 105[22]Zhou Yunya, Deng Hua, Wu Qianhong, et al. Identitybased proxy reencryption version 2: Making mobile access easy in cloud[J]. Future Generation Computer Systems, 2016, 62: 128139[23]Manzoor A, Liyanage M, Braeke A, et al. Blockchain based proxy reencryption scheme for secure IoT data sharing[C] Proc of 2019 IEEE Int Conf on Blockchain and Cryptocurrency (ICBC). Piscataway, NJ: IEEE, 2019: 99103
|