[1] NAKAMOTO S.Bitcoin:a peer-to-peer electronic cash system[EB/OL].[2022-01-10].https://bitcoin.org/bitcoin.pdf. [2] ZHENG Q H, LI Y, CHEN P, et al.An innovative IPFS-based storage model for blockchain[C]//Proceedings of IEEE/WIC/ACM International Conference on Web Intelligence.Washington D.C., USA:IEEE Press, 2018:704-708. [3] ZAMANI M, MOVAHEDI M, RAYKOVA M.RapidChain:scaling blockchain via full sharding[C]//Proceedings of ACM SIGSAC Conference on Computer and Communications Security.New York, USA:ACM Press, 2018:931-948. [4] KANEKO Y, ASAKA T.DHT clustering for load balancing considering blockchain data size[C]//Proceedings of the 6th International Symposium on Computing and Networking.Washington D.C., USA:IEEE Press, 2018:71-74. [5] QI X D, ZHANG Z, JIN C Q, et al.BFT-store:storage partition for permissioned blockchain via erasure coding[C]//Proceedings of the 36th IEEE International Conference on Data Engineering.Washington D.C., USA:IEEE Press, 2020:1926-1929. [6] CHEPURNOY A, PAPAMANTHOU C, ZHANG Y P.Edrax:a cryptocurrency with stateless transaction validation[EB/OL].[2022-01-10].https://eprint.iacr.org/2018/968. [7] BONEH D, BÜNZ B, FISCH B.Batching techniques for accumulators with applications to IOPs and stateless blockchains[C]//Proceedings of Annual International Cryptology Conference.Berlin, Germany:Springer, 2019:561-586. [8] TOMESCU A, ABRAHAM I, BUTERIN V, et al.Aggregatable subvector commitments for stateless cryptocurrencies[C]//Proceedings of International Conference on Security and Cryptography for Networks.Berlin, Germany:Springer, 2020:45-64. [9] XU C, ZHANG C, XU J, et al.SlimChain:scaling blockchain transactions through off-chain storage and parallel processing[J].Proceedings of the VLDB Endowment, 2021, 14(11):2314-2326. [10] WOOD G.Ethereum:a secure decentralised generalised transaction ledger[EB/OL].[2022-01-10].https://ethereum.github.io/yellowpaper/paper.pdf. [11] XU L, CHEN L, GAO Z M, et al.EPBC:efficient public blockchain client for lightweight users[C]//Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers.Washington D.C., USA:IEEE Press, 2017:1-6. [12] 陈幻, 王意洁.一种面向公有链的轻量级可扩展技术[J].计算机研究与发展, 2020, 57(7):1555-1567. CHEN H, WANG Y J.A lightweight scalable protocol for public blockchain[J].Journal of Computer Research and Development, 2020, 57(7):1555-1567.(in Chinese) [13] KATE A, ZAVERUCHA G M, GOLDBERG I.Constant-size commitments to polynomials and their applications[C]//Proceedings of International Conference on the Theory and Application of Cryptology and Information Security.Berlin, Germany:Springer, 2010:177-194. [14] MO W, WANG T, ZHANG S B, et al.An active and verifiable trust evaluation approach for edge computing[J].Journal of Cloud Computing, 2020, 9(1):51. [15] FUCHSBAUER G.Subversion-zero-knowledge SNARKs[C]//Proceedings of IACR International Workshop on Public Key Cryptography.Berlin, Germany:Springer, 2018:315-347. [16] 王元庆, 刘百祥.一种去中心化的隐私保护匿名问卷方案[J].计算机工程, 2021, 47(6):123-131. WANG Y Q, LIU B X.A decentralized scheme for privacy-preserving anonymous surveying[J].Computer Engineering, 2021, 47(6):123-131.(in Chinese) [17] OZDEMIR A, WAHBY R, WHITEHAT B, et al.Scaling verifiable computation using efficient set accumulators[C]//Proceedings of the 29th USENIX Security Symposium.Washington D.C., USA:IEEE Press, 2020:2075-2092. [18] COSTAN V, DEVADAS S.Intel SGX explained[EB/OL].[2022-01-10].http://css.csail.mit.edu/6.858/2020/readings/costan-sgx.pdf. [19] 孟子琪, 张倩颖, 施智平, 等.基于可信执行环境的嵌入式双操作系统架构研究[J].计算机工程, 2019, 45(4):6-12. MENG Z Q, ZHANG Q Y, SHI Z P, et al.Research on embedded dual operating system architecture based on trusted execution environment[J].Computer Engineering, 2019, 45(4):6-12.(in Chinese) [20] CHENG R, ZHANG F, KOS J, et al.Ekiden:a platform for confidentiality-preserving, trustworthy, and performant smart contracts[C]//Proceedings of 2019 IEEE Symposium on Security and Privacy.Washington D.C., USA:IEEE Press, 2019:185-200. [21] LEE D, KOHLBRENNER D, SHINDE S, et al.Keystone:an open framework for architecting trusted execution environments[C]//Proceedings of the 15th European Conference on Computer Systems.Berlin, Germany:Springer, 2020:1-16. [22] BENALOH J, DE MARE M.One-way accumulators:a decentralized alternative to digital signatures[C]//Proceedings of Workshop on the Theory and Application of Cryptographic Techniques.Berlin, Germany:Springer, 1994:274-285. [23] 苗美霞, 武盼汝, 王贇玲.密码累加器研究进展及应用[J].西安电子科技大学学报, 2022, 49(1):78-91. MIAO M X, WU P R, WANG Y L.Research progress and applications of cryptographic accumulators[J].Journal of Xidian University, 2022, 49(1):78-91.(in Chinese) [24] FOUQUE P A, TIBOUCHI M.Close to uniform prime number generation with fewer random bits[C]//Proceedings of International Conference on Automata, Languages, and Programming.Berlin, Germany:Springer, 2014:991-1002. [25] CHOUDHURI A R, GREEN M, JAIN A, et al.Fairness in an unfair world:fair multiparty computation from public bulletin boards[C]//Proceedings of 2017 ACM SIGSAC Conference on Computer and Communications Security.New York, USA:ACM Press, 2017:719-728. [26] 唐春明, 胡业周.基于多比特全同态加密的安全多方计算[J].计算机学报, 2021, 44(4):836-845. TANG C M, HU Y Z.Secure multi-party computation based on multi-bit fully homomorphic encryption[J].Chinese Journal of Computers, 2021, 44(4):836-845.(in Chinese) [27] ABDOLMALEKI B, LIPMAA H, SIIM J, et al.On subversion-resistant SNARKs[J].Journal of Cryptology, 2021, 34(3):1-42. [28] CAMPANELLI M, FIORE D, GRECO N, et al.Incrementally aggregatable vector commitments and applications to verifiable decentralized storage[C]//Proceedings of International Conference on the Theory and Application of Cryptology and Information Security.Washington D.C., USA:IEEE Press, 2020:3-35. |