[1] ZHANG Rui,XUE Rui,LIU Ling.Security and privacy on blockchain[J].ACM Computing Surveys,2019,52(3):1-34. [2] NAKAMOTO S.Bitcoin:a peer-to-peer electronic cash system[EB/OL].[2020-02-21].http://bitcoin.org/bitcoin.pdf. [3] WANG Shuai,YUAN Yong,WANG Xiao,et al.An overview of smart contract:architecture,applications,and future trends[C]//Proceedings of 2018 IEEE Intelligent Vehicles Symposium.Washington D.C.,USA:IEEE Press,2018:108-113. [4] DAI Hongning,ZHENG Zibin,ZHANG Yan.Blockchain for Internet of Things:a survey[J].IEEE Internet of Things Journal,2019,6(5):8076-8094. [5] OUADDAH A,MOUSANNIF H,ELKALAM A,et al.Access control in the Internet of Things:big challenges and new opportunities[J].Computer Networks,2017,112:237-262. [6] GUAN Zhitao,SI Guanlin,ZHANG Xiaosong,et al.Privacy-preserving and efficient aggregation based on blockchain for power grid communications in smart communities[J].IEEE Communications Magazine,2018,56(7):82-88. [7] HENG Xingchen,DONG Can,LIN Kequan,et al.Blockchain-based algorithm for distributed power bidding transaction[J].Computer Engineering,2020,46(2):35-40,47.(in Chinese)衡星辰,董灿,林克全,等.基于区块链的分布式电力竞价交易算法[J].计算机工程,2020,46(2):35-40,47. [8] KIM H M,LASKOWSKI M.Toward an ontology-driven blockchain design for supply-chain provenance[J].Intelligent Systems in Accounting,Finance and Management,2018,25(1):18-27. [9] KSHETRI N.1blockchain's roles in meeting key supply chain management objectives[J].International Journal of Information Management,2018,39:80-89. [10] FERRAG M A,DERDOUR M,MUKHERJEE M,et al.Blockchain technologies for the Internet of Things:research issues and challenges[J].IEEE Internet of Things Journal,2019,6(2):2188-2204. [11] DEIG C R,KANWAR A,THOMPSON R F.Artificial intelligence in radiation oncology[J].Hematology/Oncology Clinics of North America,2019,33(6):1095-1104. [12] LIANG Y J,ZHENG X L,ZENG D D.A survey on big data-driven digital phenotyping of mental health[J].Information Fusion,2019,52:290-307. [13] CONTI M,KUMAR E S,LAL C,et al.A survey on security and privacy issues of Bitcoin[J].IEEE Communications Surveys & Tutorials,2018,20(4):3416-3452. [14] ZHANG Liang,LIU Baixiang,ZHANG Ruyi,et al.Overview of blockchain technology[J].Computer Engineering,2019,45(5):1-12.(in Chinese)张亮,刘百祥,张如意,等.区块链技术综述[J].计算机工程,2019,45(5):1-12. [15] KROMBHOLZ K,JUDMAYER A,GUSENBAUER M,et al.The other side of the coin:user experiences with Bitcoin security and privacy[C]//Proceedings of International Conference on Financial Cryptography and Data Security.Berlin,Germany:Springer,2016:555-580. [16] List of Bitcoin heists,thefts,hacks,scams,and losses[EB/OL].[2020-02-21].https://bitcointalk.org/index.php?topic=83794.0. [17] LIU Yi,LI Ruilin,LIU Xingtong,et al.An efficient method to enhance Bitcoin wallet security[C]//Proceedings of the 11th IEEE International Conference on Anti-counterfeiting,Security,and Identification.Washington D.C.,USA:IEEE Press,2017:26-29. [18] ESKANDARI S,CLARK J,BARRERA D,et al.A first look at the usability of Bitcoin key management[C]//Proceedings of 2015 Network and Distributed System Security Symposium.San Diego,USA:[S.l.],2015:40-50. [19] GURI M.BeatCoin:leaking private keys from air-gapped cryptocurrency wallets[C]//Proceedings of 2018 IEEE International Conference on Internet of Things(iThings) and IEEE Green Computing and Communications(GreenCom) and IEEE Cyber,Physical and Social Computing(CPSCom) and IEEE Smart Data(SmartData).Washington D.C.,USA:IEEE Press,2018:1308-1316. [20] ELIASI B,JAVDAN A.Comparison of blockchain e-wallet implementations[EB/OL].[2020-02-21].http://www.diva-portal.org/smash/record.jsf?pid=diva2%3A1350402&dswid=3763. [21] GUTOSKI G,STEBILA D.Hierarchical deterministic Bitcoin wallets that tolerate key leakage[C]//Proceedings of International Conference on Financial Cryptography and Data Security.Berlin,Germany:Springer,2015:497-504. [22] MAXWELL G,POELSTRA A,SEURIN Y,et al.Simple Schnorr multi-signatures with applications to Bitcoin[J].Designs,Codes and Cryptography,2019,87(9):2139-2164. [23] AITZHAN N Z,SVETINOVIC D.Security and privacy in decentralized energy trading through multi-signatures,blockchain and anonymous messaging streams[J].IEEE Transactions on Dependable and Secure Computing,2018,15(5):840-852. [24] BONEH D,GENNARO R,GOLDFEDER S.Using level-1 homomorphic encryption to improve threshold DSA signatures for Bitcoin wallet security[C]//Proceedings of International Conference on Cryptology and Information Security.Berlin,Germany:Springer,2019:352-377. [25] DIKSHIT P,SINGH K.Efficient weighted threshold ECDSA for securing Bitcoin wallet[C]//Proceedings of 2017 ISEA Asia Security and Privacy Conference.Washington D.C.,USA:IEEE Press,2017:1-9. [26] ZHOU Xiuwen,WU Qianhong,QIN Bo,et al.Distributed Bitcoin account management[C]//Proceedings of 2016 IEEE Trustcom/BigDataSE/ISPA.Washington D.C.,USA:IEEE Press,2016:105-112. [27] GENNARO R,GOLDFEDER S,NARAYANAN A.Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security[C]//Proceedings of International Conference on Applied Cryptography and Network Security.Berlin,Germany:Springer,2016:156-174. [28] ZHANG En,ZHU Junzhe,LI Gongli,et al.Outsourcing hierarchical threshold secret sharing scheme based on reputation[J].Security and Communication Networks,2019(12):221-229. [29] SHAMIR A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613. [30] THAI Q T,YIM J C,YOO T W,et al.Hierarchical Byzantine fault-tolerance protocol for permissioned blockchain systems[J].The Journal of Supercomputing,2019,75(11):7337-7365. [31] LIU Yaxue,YANG Xiaobao,LIU Yuan,et al.A blockchain-based multi-application certificate system model[J].Computer Engineering,2020,46(9):44-53.(in Chinese)刘亚雪,杨小宝,刘圆,等.一种基于区块链的多应用证书系统模型[J].计算机工程,2020,46(9):44-53. [32] KHALILI M,DAKHILALIAN M,SUSILO W.Efficient chameleon hash functions in the enhanced collision resistant model[J].Information Sciences,2020,510:155-164. |