[1] 张亮, 刘百祥, 张如意, 等.区块链技术综述[J].计算机工程, 2019, 45(5):1-12. ZHANG L, LIU B X, ZHANG R Y, et al.Overview of blockchain technology[J].Computer Engineering, 2019, 45(5):1-12.(in Chinese) [2] CULHA D.A random and transaction-positioned blockchain[J].Comptes Rendus de L'Academie Bulgare des Sciences, 2020, 73(7):915-925. [3] TANG F, PANG J J, CHENG K F, et al.Multiauthority traceable ring signature scheme for smart grid based on blockchain[EB/OL].[2021-06-02].https://www.researchgate.net/publication/350798231_Multiauthority_Traceable_Ring_Signature_Scheme_for_Smart_Grid_Based_on_Blockchain. [4] 祝烈煌, 高峰, 沈蒙, 等.区块链隐私保护研究综述[J].计算机研究与发展, 2017, 54(10):2170-2186. ZHU L H, GAO F, SHEN M, et al.Survey on privacy preserving techniques for blockchain technology[J].Journal of Computer Research and Development, 2017, 54(10):2170-2186.(in Chinese) [5] 蔡晓晴, 邓尧, 张亮, 等.区块链原理及其核心技术[J].计算机学报, 2021, 44(1):84-131. CAI X Q, DENG Y, ZHANG L, et al.The principle and core technology of blockchain[J].Chinese Journal of Computers, 2021, 44(1):84-131.(in Chinese) [6] 赵其刚, 王红军, 李天瑞, 等.区块链原理与技术应用[M].北京:人民邮电出版社, 2020. ZHAO Q G, WANG H J, LI T R, et al.Blockchain principle and technical application[M].Beijing:Posts and Telecom Press, 2020.(in Chinese) [7] 冯聿梦.一种基于可信计算技术的电子投票方案[J].计算机工程, 2012, 38(6):1-6. FENG Y M.Electronic voting scheme based on trusted computing technology[J].Computer Engineering, 2012, 38(6):1-6.(in Chinese) [8] RIVEST R L, SHAMIR A, TAUMAN Y.How to leak a secret[C]//Proccedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security.Berlin, Germany:Springer, 2001:522-565. [9] LIU J K, WEI V K, WONG D S.Linkable spontaneous anonymous group signature for Ad Hoc groups[EB/OL].[2021-06-06].https://link.springer.com/chapter/10.1007/978-3-540-27800-9_28. [10] TORRES W A A, STEINFELD R, SAKZAD A, et al.Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice ringct v1.0)[C]//Proceedings of Australasian Conference on Information Security and Privacy.Berlin, Germany:Springer, 2018:558-576. [11] REN H, ZHANG P, SHENTU Q C, et al.Compact ring signature in the standard model for blockchain[C]///Proccedings of the 14th International Conference on Information Security Practice and Experience.Berlin, Germany:Springer, 2018:50-65. [12] 吕佳卓.基于智能合约的去中心化安全电子投票系统[D].哈尔滨:哈尔滨工业大学, 2019. LÜ J Z.A decentralized secure e-voting system based on smart contract[D].Harbin:Harbin Institute of Technology, 2019.(in Chinese) [13] 瞿云云, 尹兰, 熊祥光, 等.具有可链接性的匿名签密方案[J].西南大学学报(自然科学版), 2012, 34(9):113-117. QU Y Y, YIN L, XIONG X G, et al.A linkable anonymous signcryption scheme[J].Journal of Southwest University (Natural Science Edition), 2012, 34(9):113-117.(in Chinese) [14] ZHENG Y L.Digital signcryption or how to achieve cost (signature & encryption) ≪ cost(signature) +cost (encryption)[C]//Proceedings of the 17th Annual International Cryption Conference.Berlin, Germany:Springer, 1997:165-179. [15] 李发根, 钟笛.数字签密综述[J].信息网络安全, 2011(12):1-8. LI F G, ZHONG D.A survey of digital signcryption[J].Netinfo Security, 2011(12):1-8.(in Chinese) [16] ZHAO Z C, C T H.How to vote privately using bitcoin[C]//Proccedings of the Internal Conference on Information and Communications Security.Berlin, Germany:Springer, 2015:82-96. [17] MCCORRY P, SHAHANDASHTI S F, HAO F.A smart contract for boardroom voting with maximum voter privacy[C]//Proccedings of the International Conference on Financial Cryptography and Data Security.Berlin, Germany:Springer, 2017:357-375. [18] BISTARELLI S, MANTILACCI M, SANTANCINI P, et al.An end-to-end voting-system based on bitcoin[C]//Proceedings of the Symposium on Applied Computing.New York, USA:ACM Press, 2017:1836-1841. [19] LYU J Z, JIANG Z L, WANG X, et al.A secure decentralized trustless e-voting system based on smart contract[C]//Proccedings of the 13th IEEE International Conference on Big Data Science and Engineering.Washington D.C., USA:IEEE Press, 2019:570-577. [20] HERRANZ J, SÁEZ G.Forking Lemmas for Ring Signature Schemes[EB/OL].[2021-06-06].https://link.springer.com/chapter/10.1007/978-3-540-24582-7_20. [21] 杨波.现代密码学(第四版)[M].北京:清华大学出版社, 2017. YANG B.Cyberspace security(the fourth edition)[M].Beijing:Tsinghua University Press, 2017.(in Chinese) [22] SHAMIR A.How to share a secret[J].Communications of the ACM, 1979, 22(11):612-613. [23] DESMEDT Y G.Threshold cryptography[J].European Transactions on Telecommunications, 2010, 5(4):449-458. [24] BONEH D, GENNARO R, GOLDFEDER S, et al.Threshold cryptosystems from threshold fully homomorphic encryption[C]//Proceedings of Annual International Cryptology Conference.Berlin, Germany:Springer, 2018:565-596. [25] PEDERSEN T P.A threshold cryptosystem without a trusted party[EB/OL].[2021-06-06].https://www.researchgate.net/publication/313151874_A_threshold_Cryptosystem_without_a_Trusted_Party_Lecture_Notes_in_Computer_Science_547_Advances_in_Cryptology. |