[1] WU Y H, WANG W P, CHEN J E.An overview of anonymous communication research[J].Small Microcomputer System, 2007, 28(4):583-587. [2] CHAUM D L.Untraceable electronic mail, return addresses, and digital pseudonyms[J].Communications of the ACM, 1981, 24(2):84-89. [3] PIZZIO R, UCHÔA-FILHOB F, RENZO M D, et al.Generalized spatial modulation for downlink multiuser MIMO systems with multicast[C]//Proceedings of the 27th IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications.New York, USA:ACM Press, 2016:1-6. [4] 胡德敏, 詹涵.差分扰动的均衡增量近邻查询位置隐私保护方法[J].小型微型计算机系统, 2018, 39(7):1483-1485. HU D M, ZHAN H.Homogeneous incremental nearest neighbor query method based on differential perturbation for location privacy protection[J].Journal of Chinese Computer Systems, 2018, 39(7):1483-1485.(in Chinese) [5] 何明星, 李鹏程, 李虓.高效的可证明安全的无证书数字签名方案[J].电子科技大学学报, 2015, 44(6):887-891. HE M X, LI P C, LI X.Efficient and provably secure certificate-less signature from bilinear pairings[J].Journal of University of Electronic Science and Technology of China, 2015, 44(6):887-891.(in Chinese) [6] 熊金波, 王敏燊, 田有亮, 等.面向云数据的隐私度量研究进展[J].软件学报, 2018, 29(7):5-8. XIONG J B, WANG M S, TIAN Y L, et al.Research progress on privacy measurement for cloud data[J].Journal of Software, 2018, 29(7):5-8.(in Chinese) [7] 谢永, 吴黎兵, 张宇波, 等.面向车联网的多服务架构的匿名双向认证与密钥协商[J].计算机研究与发展, 2016, 53(10):2228-2331. XIE Y, WU L B, ZHANG Y B, et al.Anonymous mutual authentication and key agreement protocol in multi-server architecture for VANETS[J].Journal of Computer Research and Development, 2016, 53(10):2228-2331.(in Chinese) [8] 苗付友, 王行甫, 苗辉, 等.一种支持悬赏的匿名电子举报方案[J].电子学报, 2008, 36(2):320-324. MIAO F Y, WANG X F, MIAO H, et al.An anonymous e-prosecution scheme with reward support[J].Acta Electronica Sinica, 2008, 36(2):320-324.(in Chinese) [9] 王化群, 于红, 吕显强, 等.一种支持悬赏的匿名电子举报方案的安全性分析及设计[J], 电子学报, 2009, 37(8):1826-1829. WANG H Q, YU H, LÜ X Q, et al.Cryptanalysis and design of an anonymous e-prosecution scheme with reward support[J].Acta Electronica Sinica, 2009, 37(8):1826-1829.(in Chinese) [10] 吴韬, 夏斌, 邱卫东.基于比特承诺的可撤销匿名电子检举系统[J].信息安全与通信保密, 2010, 48(1):113-115. WU T, XIA B, QIU W D.An impeaching system based on bit commitment with revocable anonymity[J].Information Security and Communications Privacy, 2010, 48(1):113-115.(in Chinese) [11] 张瑞丽, 李顺东.一种新的基于身份的匿名电子举报方案[J].计算机应用与软件, 2015, 32(1):288-290, 294. ZHANG R L, LI S D.A new identity-based anonymous electronic prosecution scheme[J].Computer Application and Software, 2015, 32(1):288-290, 294.(in Chinese) [12] NAYIR D Z, HERZIG C.Value orientations as determinants of preference for external and anonymous whistleblowing[J].Journal of Business Ethics, 2012, 107(2):197-213. [13] HUNTON J E, ROSE J M.Effects of anonymous whistle-blowing and perceived reputation threats on investigations of whistle-blowing allegations by audit committee members[J].Journal of Management Studies, 2011, 48(1):75-98. [14] ESHGHI S, TASSIULAS L.Whistleblowing games in networks[C]//Proceedings of the 52nd Annual Conference on Information Sciences and Systems.New Haven, USA:IEEE Press, 2018:1-6. [15] JAYAKRISHNAN H, MURALI R.A simple and robust end-to-end encryption architecture for anonymous and secure whistleblowing[C]//Proceedings of the 12th International Conference on Contemporary Computing.Piscataway, USA:IEEE Press, 2019:6-15. [16] YOUNG J A, COURTNEY J F, BENNETT R J.The impact of anonymous, two-way, computer-mediated communication on perceived whistleblower credibility[J].Information Technology & People, 2020, 35(6):72-83. [17] 杨小东, 陈桂兰, 李婷, 等.基于无证书密码体制的多用户密文检索方案[J].计算机工程, 2020, 46(9):129-135. YANG X D, CHEN G L, LI T, et al.Multi-uUser ciphertext retrieval scheme based on certificateless cryptosystem[J].Computer Engineering, 2020, 46(9):129-135.(in Chinese) [18] BAKIRAS S, TROJA E, XU X H, et al.Secure and anonymous communications over delay tolerant networks[J].IEEE Access, 2020, 8:88158-88169. [19] NASCIMENTO B L C D, OLIVEIRA A R.Enabling anonymous whistleblowing through online reporting mechanisms in Brazil[C]//Proceedings of the 13th International Conference on Theory and Practice of Electronic Governance.New York, USA:ACM Press, 2020:783-786. [20] DATTA A, TIU A.On unlinkability and denial of service attacks resilience of whistleblower platforms[J].Future Generation Computer Systems, 2021, 118:438-452. |