1 |
NAKAMOTO S. Bitcoin: A Peer-To-Peer Electronic Cash System[EB/OL]. [2021-3-26]. .
|
2 |
祝烈煌, 高峰, 沈蒙, 等. 区块链隐私保护研究综述[J]. 计算机研究与发展, 2017, 54(10): 2170-2186.
|
|
ZHU L H, GAO F, SHEN M, et al. Survey on privacy preserving techniques for blockchain technology[J]. Journal of Computer Research and Development, 2017, 54(10): 2170-2186. (in Chinese)
|
3 |
NOETHER S, MACKENZIE A, RESEARCH LAB T M. Ring confidential transactions[J]. Ledger, 2016, 1: 1-18.
|
4 |
MIERS I, GARMAN C, GREEN M, et al. Zerocoin: anonymous distributed E-cash from bitcoin[C]//2013 IEEE Symposium on Security and Privacy. Berkeley: IEEE, 2013: 397-411.
|
5 |
KOSBA A, MILLER A, SHI E, et al. Hawk: the blockchain model of cryptography and privacy-preserving smart contracts[C]//2016 IEEE Symposium on Security and Privacy. San Jose: IEEE, 2016: 839-858.
|
6 |
DI FRANCESCO MAESA D, MORI P, RICCI L. Blockchain Based Access Control[C]//IFIP International Conference on Distributed Applications and Interoperable Systems. Cham: Springer, 2017: 206-220.
|
7 |
DI FRANCESCO MAESA D, MORI P, RICCI L. Blockchain based access control services[C]//2018 IEEE International Conference on Internet of Things(iThings) and IEEE Green Computing and Communications(GreenCom) and IEEE Cyber, Physical and Social Computing(CPSCom) and IEEE Smart Data. Halifax: IEEE, 2018: 1379-1386.
|
8 |
WANG R, TSAI W T, HE J, et al. A medical data sharing platform based on permissioned blockchains[C]//ICBTA 2018: Proceedings of the 2018 International Conference on Blockchain Technology and Application. Xi'an: ACM, 2018: 12-16.
|
9 |
LI R N, SONG T Y, MEI B, et al. Blockchain for large-scale Internet of Things data storage and protection[J]. IEEE Transactions on Services Computing, 2019, 12(5): 762-771.
|
10 |
董祥千, 郭兵, 沈艳, 等. 一种高效安全的去中心化数据共享模型[J]. 计算机学报, 2018, 41(5): 1021-1036.
|
|
DONG X Q, GUO B, SHEN Y, et al. An efficient and secure decentralizing data sharing model[J]. Chinese Journal of Computers, 2018, 41(5): 1021-1036. (in Chinese)
|
11 |
WU S H, DU J. Electronic medical record security sharing model based on blockchain[C]//Proceedings of the 3rd International Conference on Cryptography, Security and Privacy. Melmaruvathur: ACM, 2019: 13-17.
|
12 |
WANG Z, TIAN Y L, ZHU J M. Data sharing and tracing scheme based on blockchain[C]//2018 8th International Conference on Logistics, Informatics and Service Sciences(LISS). Toronto: IEEE, 2018: 1-6.
|
13 |
WU A X, ZHANG Y H, ZHENG X K, et al. Efficient and privacy-preserving traceable attribute-based encryption in blockchain[J].Annals of Telecommunications, 2019, 74(7/8): 401-411.
|
14 |
田有亮, 杨科迪, 王缵, 等. 基于属性加密的区块链数据溯源算法[J]. 通信学报, 2019, 40(11): 101-111.
|
|
TIAN Y L, YANG K D, WANG Z, et al. Algorithm of blockchain data provenance based on ABE[J]. Journal on Communications, 2019, 40(11): 101-111. (in Chinese)
|
15 |
FENG T, PEI H M, MA R, et al. Blockchain data privacy access control based on searchable attribute encryption[J]. Computers, Materials & Continua, 2020, 66(1): 871-890.
|
16 |
王秀利, 江晓舟, 李洋. 应用区块链的数据访问控制与共享模型[J]. 软件学报, 2019, 30(6): 1661-1669.
|
|
WANG X L, JIANG X Z, LI Y. Model for data access control and sharing based on blockchain[J]. Journal of Software, 2019, 30(6): 1661-1669. (in Chinese)
|
17 |
苏铓, 吴槟, 付安民, 等. 基于代理重加密的云数据访问授权确定性更新方案[J]. 软件学报, 2020, 31(5): 1563-1572.
|
|
SU M, WU B, FU A M, et al. Assured update scheme of authorization for cloud data access based on proxy re-encryption[J]. Journal of Software, 2020, 31(5): 1563-1572. (in Chinese)
|
18 |
SU M, ZHOU B, FU A M, et al. PRTA: A Proxy re-encryption based Trusted Authorization scheme for nodes on CloudIoT[J]. Information Sciences, 2020, 527: 533-547.
|
19 |
WANG X A, XHAFA F, MA J F, et al. Controlled secure social cloud data sharing based on a novel identity based proxy re-encryption plus scheme[J]. Journal of Parallel and Distributed Computing, 2019, 130: 153-165.
|
20 |
DENG H, QIN Z, WU Q H, et al. Flexible attribute-based proxy re-encryption for efficient data sharing[J]. Information Sciences, 2020, 511: 94-113.
|
21 |
SAMANTHULA B K, ELMEHDWI Y, HOWSER G, et al. A secure data sharing and query processing framework via federation of cloud computing[J]. Information Systems, 2015, 48: 196-212.
|
22 |
马晓婷, 马文平, 刘小雪. 基于区块链技术的跨域认证方案[J]. 电子学报, 2018, 46(11): 2571-2579.
|
|
MA X T, MA W P, LIU X X. A cross domain authentication scheme based on blockchain technology[J]. Acta Electronica Sinica, 2018, 46(11): 2571-2579. (in Chinese)
|
23 |
BLAZE M, BLEUMER G, STRAUSS M. Divertible protocols and atomic proxy cryptography[M]//Lecture Notes in Computer Science. Berlin: Springer, 1998: 127-144.
|
24 |
SHAO J, CAO Z F, LIANG X H, et al. Proxy re-encryption with keyword search[J]. Information Sciences, 2010, 180(13): 2576-2587.
|
25 |
WANG H B, CAO Z F, WANG L C. Multi-use and unidirectional identity-based proxy re-encryption schemes[J]. Information Sciences, 2010, 180(20): 4042-4059.
|
26 |
ZYSKIND G, NATHAN O, PENTLAND A S. Decentralizing privacy: Using blockchain to protect personal data[C]//2015 IEEE Security and Privacy Workshops. San Jose: IEEE, 2015: 180-184.
|
27 |
KIM S, LEE I. IoT device security based on proxy re-encryption[J].Journal of Ambient Intelligence and Humanized Computing, 2018, 9(4): 1267-1273.
|
28 |
CHEN B W, HE D B, KUMAR N, et al. A blockchain-based proxy re-encryption with equality test for vehicular communication systems[J]. IEEE Transactions on Network Science and Engineering, 2021, 8(3): 2048-2059.
|