1 |
中国人工智能2.0发展战略研究项目组. 中国人工智能2.0发展战略研究[M]. 杭州: 浙江大学出版社, 2019.
|
2 |
I'ANSONC, MITCHELLC. Security defects in CCITT recommendation X.509[J]. ACM SIGCOMM Computer Communication Review, 1990, 20(2): 30-34.
|
3 |
LUY, TANGQ, WANGG L. ZebraLancer: Private and anonymous crowdsourcing system atop open blockchain[C]//2018 IEEE 38th International Conference on Distributed Computing Systems(ICDCS). New York: IEEE, 2018: 853-865.
|
4 |
HAMMIM T, HAMMIB, BELLOTP, et al. Bubbles of Trust: A decentralized blockchain-based authentication system for IoT[J]. Computers & Security, 2018, 78: 126-142.
|
5 |
HAMMIM T, BELLOTP, SERHROUCHNIA. BCTrust: A decentralized authentication blockchain-based mechanism[C]//2018 IEEE Wireless Communications and Networking Conference(WCNC). New York: IEEE, 2018: 1-6.
|
6 |
FROMKNECHTC, VELICANUD, YAKOUBOVS. Certcoin: A namecoin based decentralized authentication system[C]//Massachusetts Institute of Technology. Cambridge: MIT, 2014: 46-56.
|
7 |
HAMMUDOGLUJ S, SPARREBOOMJ, RAUHAMAAJ I, et al. Portable Trust: Biometric-based authentication and blockchain storage for self-sovereign identity systems[EB/OL]. (2017)[2020]. .
|
8 |
AL-BASSAMM. SCPKI: A smart contract-based PKI and identity system[C]//Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts. New York: ACM, 2017: 35-40.
|
9 |
马晓婷, 马文平, 刘小雪. 基于区块链技术的跨域认证方案[J]. 电子学报, 2018, 46(11): 2571-2579.
|
|
MAX T, MAW P, LIUX X. A cross domain authentication scheme based on blockchain technology[J]. Acta Electronica Sinica, 2018, 46(11): 2571-2579. (in Chinese)
|
10 |
LYSYANSKAYAA, MICALIS, REYZINL, et al. Sequential aggregate signatures from trapdoor permutations[C]//Advances in Cryptology-EUROCRYPT 2004. Berlin: Springer, 2004: 74-90.
|
11 |
LUS, OSTROVSKYR, SAHAIA, et al. Sequential aggregate signatures and multisignatures without random oracles[C]//Advances in Cryptology-EUROCRYPT 2006. Berlin: Springer, 2006: 465-485.
|
12 |
CAMENISCHJ, LYSYANSKAYAA. Signature schemes and anonymous credentials from bilinear maps[C]//Advances in Cryptology-CRYPTO 2004. Berlin: Springer, 2004: 56-72.
|
13 |
SCHRÉDERD. How to aggregate the CL signature scheme[C]//European Symposium on Research in Computer Security. Berlin: Springer, 2011: 298-314.
|
14 |
LEEK, LEED H, YUNGM. Sequential aggregate signatures with short public keys without random oracles[J]. Theoretical Computer Science, 2015, 579: 100-125.
|
15 |
赵慧艳, 于佳, 李朦, 等. 并行密钥隔离聚合签名[J]. 电子学报, 2015, 43(5): 1035-1040.
|
|
ZHAOH Y, YUJ, LIM, et al. Parallel key-insulated aggregate signature[J]. Acta Electronica Sinica, 2015, 43(5): 1035-1040. (in Chinese)
|
16 |
BONEHD, BOYENX, SHACHAMH. Short group signatures[C]//Advances in Cryptology-CRYPTO 2004. Berlin: Springer, 2004: 41-55.
|
17 |
CARONNIG. Walking the web of trust[C]//Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises(WET ICE 2000). New, York: IEEE, 2000: 153-158.
|