[1] CHEN Haisheng,YING Ying,GENG Deke.Digital transformation of credit supervision in zhejiang province from two perspectives[J].Zhejiang Economy,2019(20):44-45.(in Chinese)陈海盛,应瑛,耿得科.双重视角下浙江信用监管数字化转型[J].浙江经济,2019(20):44-45. [2] WANG Liming.Data sharing and personal information protection[J].Modern Law Science,2019,41(1):45-57.(in Chinese)王利明.数据共享与个人信息保护[J].现代法学,2019,41(1):45-57. [3] WANG Chao.Key management scheme of encrypted database based on elliptic curve cryptography[J].Journal of China Academy of Electronics and Information Technology,2019,14(2):177-183.(in Chinese)王超.基于椭圆曲线密码的密文数据库密钥管理方案[J].中国电子科学研究院学报,2019,14(2):177-183. [4] LIU Zirun,WANG Dian,WANG Bin.Privacy preserving technology in blockchain[J].Computer Engineering and Design,2019,40(6):1567-1573.(in Chinese)刘滋润,王点,王斌.区块链隐私保护技术[J].计算机工程与设计,2019,40(6):1567-1573. [5] ZHU Liehuang,GAO Feng,SHEN Meng,et al.Survey on privacy preserving techniques for blockchain technology[J].Journal of Computer Research and Development,2017,54(10):2170-2186.(in Chinese)祝烈煌,高峰,沈蒙,等.区块链隐私保护研究综述[J].计算机研究与发展,2017,54(10):2170-2186. [6] ZHOU Shuigeng,LI Feng,TAO Yufei,et al.Privacy preservation in database applications:a survey[J].Chinese Journal of Computers,2009,32(5):847-861.(in Chinese)周水庚,李丰,陶宇飞,等.面向数据库应用的隐私保护研究综述[J].计算机学报,2009,32(5):847-861. [7] PENG Lintian.Research on the application of blockchain technology in personal credit investigation system[J].Credit Reference,2019,37(12):48-53.(in Chinese)彭麟添.区块链技术应用于个人征信制度研究[J].征信,2019,37(12):48-53. [8] SHI Mingsheng.Analysis on the application of blockchain technology in credit investigation industry[J].Credit Reference,2018,36(1):20-24.(in Chinese)时明生.区块链技术在征信业的应用探析[J].征信,2018,36(1):20-24. [9] GE Yanqing.Discussion on building credit system with blockchain and big data to support inclusive finance by local government[J].Business,2019(29):78-79.(in Chinese)葛延青.地方政府以区块链与大数据构建信用体系支撑普惠金融的探讨[J].商讯,2019(29):78-79. [10] SUN Jiahao,MENG Xiangsi,ZHANG Haoyun,et al.Intellectual property protection model of block chain based on improved PBFT[J/OL].Computer Engineering:1-17[2019-12-11].https://doi.org/10.19678/j.issn.1000-3428.0056097.(in Chinese)孙嘉豪,孟翔斯,张浩运,等.基于改进PBFT的区块链知识产权保护模型[J/OL].计算机工程:1-17[2019-12-11].https://doi.org/10.19678/j.issn.1000-3428.0056097. [11] XU Wenyu,WU Lei,YAN Yunxue.Privacy-preserving scheme of electronic health records based on blockchain and homomorphic encryption[J].Journal of Computer Research and Development,2018,55(10):2233-2243.(in Chinese)徐文玉,吴磊,阎允雪.基于区块链和同态加密的电子健康记录隐私保护方案[J].计算机研究与发展,2018,55(10):2233-2243. [12] XUE Tengfei,FU Qunchao,WANG Cong,et al.A medical data sharing model via blockchain[J].Acta Automatica Sinica,2017,43(9):1555-1562.(in Chinese)薛腾飞,傅群超,王枞,等.基于区块链的医疗数据共享模型研究[J].自动化学报,2017,43(9):1555-1562. [13] CAI Xiaoqing,DENG Yao,ZHANG Liang,et al.The principle and core technology of blockchain[EB/OL].[2019-12-11].https://download.csdn.net/download/echo_wonderfulworld/11986674.(in Chinese)蔡晓晴,邓尧,张亮,等.区块链原理及其核心技术[EB/OL].[2019-12-11].https://download.csdn.net/download/echo_wonderfulworld/11986674. [14] ZHENG Zibin,XIE Shaoan.Blockchain challenges and opportunities:a survey[J].International Journal of Web and Grid Services,2018,14(4):352-375. [15] PASS R,SEEMAN L,SHELAT A.Analysis of the blockchain protocol in asynchronous networks[C]//Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer,2017:643-673. [16] BENTOV I,LEE C,MIZRAHI A,et al.Proof of activity:extending bitcoin's proof of work via proof of stake[J].ACM SIGMETRICS Performance Evaluation Review,2014,42(3):452-458. [17] KING S.Primecoin:cryptocurrency with prime numberproof-of-work[EB/OL].[2019-12-11].http://academictorrents.com/details/d0f9accaec8ac9d538fdf9d675105ae1392ea32b. [18] BADERTSCHER C,GAZI P,KIAYIAS A,et al.Ouroboros genesis:composable proof-of-stake blockchains with dynamic availability[C]//Proceedings of 2018 ACM SIGSAC Conference on Computer and Communications Security.New York,USA:ACM Press,2018:913-930. [19] DUONG T,FAN L,ZHOU H S.2-hop blockchain:combining proof-of-work and proof-of-stake securely[EB/OL].[2019-12-11].https://eprint.iacr.org/2016/716. [20] KIAYIAS A,RUSSELL A,DAVID B,et al.Ouroboros:a provably secure proof-of-stake blockchain protocol[C]//Proceedings of Annual International Cryptology Conference.Berlin,Germany:Springer,2017:357-388. [21] CHEPURNOY A,DUONG T,FAN L,et al.TwinsCoin:a cryptocurrency via proof-of-work and proof-of-stake[EB/OL].[2019-12-11].https://www.chainnews.com/zh-hant/papers/158251978824.htm. [22] DZIEMBOWSKI S,FAUST S,KOLMOGOROV V,et al.Proofs of space[C]//Proceedings of Annual Cryptology Conference.Berlin,Germany:Springer,2015:585-605. [23] MILUTINOVIC M,HE W,WU H,et al.Proof of luck:an efficient blockchain consensus protocol[C]//Proceedings of the 1st Workshop on System Software for Trusted Execution.New York,USA:ACM Press,2016:2-12. [24] CHEN L,XU L,SHAH N,et al.On security analysis of Proof-of-Elapsed-Time(POET)[C]//Proceedings of International Symposium on Stabilization,Safety,and Security of Distributed Systems.Berlin,Germany:Springer,2017:282-297. [25] LARIMER D.Delegated Proof-of-Stake(DPOS) white paper[EB/OL].[2019-12-11].https://bitsharestalk.org/index.php?topic=4009.60. [26] ZHANG F,EYAL I,ESCRIVA R,et al.REM:resource-efficient mining for blockchains[C]//Proceedings of the 26th USENIX Security Symposium.Vancouver,Canada;USENIX,2017:1427-1444. [27] LOBBAN T.Quorum chain consensus[EB/OL].[2019-12-11].https://github.com/jpmorganchase/quorum/wiki/QuoQuorumCh-Consensus. [28] BUTERIN V.A next-generation smart contract and decentralized application platform[EB/OL].[2019-12-11].https://www.mendeley.com/catalog/nextgeneration-smart-contract-decentralized-application-platform/. [29] SZABO N.Formalizing and securing relationships on publicnetworks[EB/OL].[2019-12-11]. http://www.firstmonday.org/ojs/index.php/fm/artic le/view/548/469. [30] HE Haiwu,YAN An,CHEN Zehua.Survey of smart contract technology and application based on blockchain[J].Journal of Computer Research and Development,2018,55(11):2452-2466.(in Chinese)贺海武,延安,陈泽华.基于区块链的智能合约技术与应用综述[J].计算机研究与发展,2018,55(11):2452-2466. [31] RIVEST R L,SHAMIR A,ADLEMAN L.A method for obtaining digital signatures and public-key cryptosystems[J].Communications of the ACM,1978,21(2):120-126. [32] PAILLIER P.Public-key cryptosystems based on composite degree residuosity classes[C]//Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer,1999:223-238. |