[1] Nakamoto S.Bitcoin:a peer-to-peer electronic cash system[EB/OL].http://bitcoin.org/bitcoin.pdf,2009.
[2] 袁勇,王飞跃.区块链技术发展现状与展望[J].自动化学报,2016,42(04):481-494. Yuan Yong,Wang Feiyue.Blockchain:the state of the art and future trends[J].IEEE/CAA Journal of Automatica Sinica,2016,42(04):481-494.(in Chinese)
[3] 邵奇峰,金澈清,张召,等.区块链技术:架构及进展[J].计算机学报,2018,41(05):969-988. Shao Qifeng,Jin Cheqing,Zhang Zhao,et al.Blockchain:architecture and research progress[J].Chinese Journal of Computers,2018,41(05):969-988.(in Chinese)
[4] Lamport L,et al.The Byzantine generals problem[J].ACM Trans on Programming Languages and Systems,1982,4(3):382-401.
[5] Zheng ZB,et al.An overview of blockchain technology:architecture,consensus,and future trends[A].IEEE Int'l Congress on Big Data[C].Piscataway:IEEE,2017.557-564.
[6] Hinz J,Taylor P.A Note on Optimal Double Spending Attacks[M].Switzerland:Springer Cham,2019.2:545-551.
[7] Tasatanattakool P,Techapanupreeda C.Blockchain:challenges and applications[A].2018 International Conference on Information Networking (ICOIN)[C].Piscataway:IEEE,2018.473-475.
[8] Joshi AP,Han M,Wang Y.A survey on security and privacy issues of blockchain technology[J].Mathematical Foundations of Computing,2018,1(2):121-147.
[9] Takemoto Y,Knight S.Mt.Gox files for bankruptcy,hit with lawsuit[EB/OL].https://www.reuters.com/article/us-[JP1]bitcoin-mtgox-bankruptcy-idUSBREA1R0FX20140228,2018.
[10] Pang L J,Yang J,Jiang Z T.A survey of research progress and development tendency of attribute-based encryption[J].The Scientific World Journal,2014,2014:193426.
[11] Yan XX,Meng H.Ciphertext policy attribute-based encryption scheme supporting direct revocation[J].Journal on Communications,2016,37(5):44-50.
[12] Zhang M Q,Du WD,et al.A full secure KP-ABE scheme in the standard model[J].Journal of Computer Research and Development,2015,52(8):1893-1901.
[13] Zhu Y,Qin Y,Gan G H,Yang S.TBAC:Transaction-based access control on blockchain for resource sharingwith cryptographically decentralized authorization[A].IEEE International Conference on Computer Software and Applications[C].Piscataway:IEEE,2018.535-544.
[14] Sun Y,Zhang R,Wang X,et al.A decentralizing attribute-based signature for healthcareblockchain[A].Int'l Conf on Computer Communication and Networks[C].Piscataway:IEEE,2018.1-9.
[15] Wang H,Song Y J.Secure cloud-based EHR system using attribute-based cryptography and blockchain[J].Journal of Medical Systems,2018,42(8):152-161.
[16] ?ahan S,Ekici AF,Bahtiyar S.A multi-factor authentication framework for secure access to blockchain[A].Int'l Conf on Computer and Technology Applications[C].New York:ACM,2019.160-164.
[17] Ye CC,Li GQ,et al.Security detection model of blockchain[J].Journal of Software,2018,29(5):1348-1359.
[18] Gervais A,Karame G,et al.On the security and performance of proof of work blockchains[A].ACM SIGSAC Conference[C].New York:ACM,2016.3-16.
[19] Kokoris-Kogias E,Jovanovic P,et al.Enhancing bitcoin security and performance with strong consistency via collective signing[J].Applied Mathematical Modelling,2016,37(8):5723-5742.
[20] Kiayias A,Russell A,et al.Ouroboros:A provably secure proof-of-stake blockchain protocol[A].Proc of Annual International Cryptology Conference[C].Switzerland:Springer,Cham,2017.357-388.
[21] LiN,Yan Z,et al.Securing communication data in pervasive social networking based on trust with KP-ABE[J].ACM Transactions on Cyber-Physical Systems,2018,3(1):1-23.
[22] Reshma V,Gladwin SJ,et al.Pairing-free CP-ABE based cryptography combined with steganography for multimedia applications[A].Int'l Conf on Communication and Signal Processing[C].Piscataway:IEEE,2019.0501-0505.
[23] Yang P,Cao Z,Dong X.Fuzzy identity based signature with applications to biometric authentication[J].Computers & Electrical Engineering,2011,37(4):532-540.
[24] Sánchez YKR,Demurjian SA,et al.Attaining role-based,mandatory,and discretionary access control for services by intercepting api calls in mobile systems[A].Web Information Systems and Technologies[C].Berlin:Springer,2018.322:221-248.
[25] Taubmann B,Rakotondravony N,et al.Cloud Phylactor:harnessing mandatory access control for virtual machine introspection in cloud data centers[A].IEEE Trustcom/BigDataSE/ISPA[C].Piscataway:IEEE,2016.957-964.
[26] Power DJ,Slaymaker M,et al.On formalizing and normalizing role-based access control systems[J].Computer Journal,2018,52(3):305-325.
[27] Jha S,Sural S,Atluri V,et al.Security analysis of ABAC under an administrative model[J].IET Information Security,2019,13(2):96-103.
[28] Ouaddah A,Abou Elkalam A,et al.FairAccess:a new blockchain-based access control framework for the internet of things[J].Security & Communication Networks,2016,9(18):5943-5964.
[29] Cruz JP,Kaji Y,Yanai N.RBAC-SC:role-based access control using smart contract[J].IEEE Access,2018,6:12240-12251.
[30] Zhu Y,Qin Y,Zhou ZY,et al.Digital asset management with distributed permission over blockchain and attribute-based access control[A].IEEE Int'l Conf on Services Computing[C].Piscataway:IEEE,2018.193-200.
[31] 余波,台宪青,马治杰.云计算环境下基于属性和信任的RBAC模型研究[J].计算机工程与应用,2020,(9):84-92. Yu Bo,Tai Xianqing,Ma Zhijie.The study on attribute and trust-based RBAC model in cloud computing[J].Computer Engineering and Applications,2020,(9):84-92.(in Chinese)
[32] Jemel M,Serhrouchni A.Decentralized access control mechanism with temporal dimension based on blockchain[A].IEEE 14th Int'l Conf on E-business Engineering (ICEBE)[C].Piscataway:IEEE,2017.177-182.
[33] 王秀利,江晓舟,李洋.应用区块链的数据访问控制与共享模型[J].软件学报,2019,30(6):1661-1669. Wang Xiuli,Jiang Xiaozhou,Li Yang.Model for data access control and sharing based on blockchain[J].Journal of Software,2019,30(6):1661-1669.(in Chinese)
[34] Xiao M,Hu X.Multi-authority attribute-based encryption access control scheme in wireless body area network[A].International Conference on Information Systems Engineering[C].Piscataway:IEEE,2019.39-45.
[35] Li G,Hiroyuki S.A privacy-preserving and fully decentralized storage and sharing system onblockchain[A].IEEE 43rd Annual Computer Software and Applications Conf[C].Piscataway:IEEE,2019.694-699.
[36] Sarmadullah K,Rafiullah K.Multiple authorities attribute-based verification mechanism for blockchain mircogrid transactions[J].Energies,2018,11(5):1154.
[37] Dai FF,Shi Y,Meng N,et al.From bitcoin to cyber-security:a comparative study of blockchain application and security issues[A].4th Int'l Conf on Systems and Informatics[C].Piscataway:IEEE,2017.975-979.
[38] Eskandari S,Barrera D,et al.A first look at the usability of bitcoin key management[A].NDSS Symposium[C].Internet Society,2015.1-10.
[39] Lin Q,Yan HY,Huang ZA,et al.An ID-based linearly homomorphic signature scheme and its application in blockchain[J].IEEE Access,2018,6:20632-20640.
[40] Albakri A,Harn L,Maddumala M.Polynomial-based lightweight key management in a permissioned blockchain[A].IEEE Conference on Communications and Network Security[C].Piscataway:IEEE,2019.1-9.
[41] Wu A X,Zhang Y H,et al.Efficient and privacy-preserving traceable attribute-based encryption in blockchain[J].Annals of Telecommunications,2019,74(7-8):404-411.
[42] Bramm G,Gall M,et al.BDABE-blockchain-based distributed attribute based encryption[A].International Conference on Security and Cryptography[C].Piscataway:IEEE,2018.265-276.
[43] He Q S,Xu Y,et al.A privacy-preserving internet of things device management scheme based on blockchain[J].International Journal of Distributed Sensor Networks,2018,14(11):1-12.
[44] Guo R,Shi H X,Zheng D,et al.Flexible and efficient blockchain-based abe scheme with multi-authority for medical on demand in telemedicine system[J].IEEE Access,2019,7:88012-88025.
[45] Sharath Y J,Bangera K,et al.Privacy preserving in blockchain based on partial homomorphic encryption system for AI applications[A].IEEE 25th International Conference on High Performance Computing Workshops[C].Piscataway:IEEE,2018.81-85.
[46] 田道坤,彭亚雄.在区块链中基于混合算法的数字签名技术[J].电子科技,2018,31(7):23-27. Tian Daokun,Peng Yaxiong.Digital signature technology based on hybrid algorithm in blockchain[J].Electronic Sci&Tech,2018,31(7):23-27.(in Chinese)
[47] Kosba A,Miller A,Shi E,et al.Hawk:The blockchain model of cryptography and privacy-preserving smart contracts[A].IEEE Symposium on Security and Privacy[C].Piscataway:IEEE,2016.839-858.
[48] Li L,Liu J Q,Cheng L C,et al.CreditCoin:A privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles[J].IEEE Trans on Intelligent Transportation Systems,2018,19(7):2204-2220.
[49] Noether Shen,Mackenzie Adam,et al.Ring Confidential Transactions[OL].DOI:10.5195/LEDGER.2016.34,2019.
[50] Tahir S,Rajarajan M.Privacy-preserving searchable encryption framework for permissioned blockchain networks[A].IEEE International Conference on iThings and IEEEGreenCom and IEEE CPSCom and IEEE SmartData[C].Piscataway:IEEE,2018.1628-1633.
[51] Lewko A B,Waters B.Decentralizing attribute-based encryption[A].The 30th Annual International Conference Theory and Applications of Cryptographic Techniques:advances in cryptology[C].New York:ACM,2011.568-588.
[52] Yuan C,Xu M X,et al.Blockchain with accountable CP-ABE:How to effectively protect the electronic documents[A].IEEE International Conference on Parallel and Distributed Systems[C].Piscataway:IEEE,2017.800-803.
[53] Rahulamathavn Y,W Phan RC,et al.Privacy-preserving blockchain based IOT ecosystem using attribute-based encryption[A].IEEE International Conference on Advanced Networks and Telecommunications Systems(ANTS)[C].Piscataway:IEEE,2017.1-6.
[54] Huang D J,Chung C J,et al.Building private blockchains over public blockchains (PoP):an attribute-based access control approach[A].34th ACM/SIGAPP Symposium[C].New York:ACM,2019.355-363.
[55] Sun Y,Zhang R,et al.A decentralizing attribute-based signature for healthcare blockchain[A].International Conference on Computer Communication and Networks[C].Piscataway:IEEE,2018.1-9.
[56] Zhang YR,He D,Choo KKR.BaDS:blockchain-based architecture for data sharing with ABS and CP-ABE in IOT[J].Wireless Communications and Mobile Computing,2018,(2018):1-9.
[57] Zhou T,Li X,Zhao H.DLattice:A permission-less blockchain based on dpos-ba-dag consensus for data tokenization[J].IEEE Access,2019,(99):1-1.
[58] 李芳,李卓然,等.区块链跨链技术进展研究[J].软件学报,2019,30(6):1649-1660. Li Fang,Li Zhuoran,et al.Research on the progress in cross-chain technology of blockchains[J].Journal of Software,2019,30(6):1649-1660.(in Chinese)
[59] Zheng QH,Li Y,Chen P,Dong XH.An innovative IPFS-based storage model for blockchain[A].IEEE/WIC/ACM International Conference on Web Intelligence[C].Piscataway:IEEE,2018.704-708.
[60] 窦家维,王文丽,刘旭红,等.有理区间的安全多方计算与应用[J].电子学报,2018,46(9):2057-2062. Dou Jiawei,Wang Wenli,Liu Xuhong,et al.Secure multiparty computation of rational interval and its applications[J].Acta Electronica Sinica,2018,46(9):2057-2062.(in Chinese) |