[1] CHENG L C, LIU J Q, JIN Y, et al.Account guarantee scheme:making anonymous accounts supervised in blockchain[J].ACM Transactions on Internet Technology, 2021, 21(1):1-11. [2] 李莉, 杜慧娜, 李涛.基于群签名与属性加密的区块链可监管隐私保护方案[J].计算机工程, 2022, 48(6):132-138. LI L, DU H N, LI T.Blockchain supervisable privacy protection scheme based on group signature and attribute encryption[J].Computer Engineering, 2022, 48(6):132-138.(in Chinese) [3] LIU Q Y, LIU Z, LONG Y, et al.Making Monero hard-to-trace and more efficient[C]//Proceedings of the 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering(TrustCom/BigDataSE).Washington D.C., USA:IEEE Press, 2019:514-521. [4] ZHANG Y C, LONG Y, LIU Z, et al.Z-Channel:scalable and efficient scheme in Zerocash[M].Berlin, Germany:Springer, 2018. [5] 李旭东, 牛玉坤, 魏凌波, 等.比特币隐私保护综述[J].密码学报, 2019, 6(2):133-149. LI X D, NIU Y K, WEI L B, et al.Overview on privacy protection in bitcoin[J].Journal of Cryptologic Research, 2019, 6(2):133-149.(in Chinese) [6] OBOUR A, KWAME O B, XIA Q, et al.A secured proxy-based data sharing module in IoT environments using blockchain[J].Sensors (Basel, Switzerland), 2019, 19(5):1235. [7] TRUONG N B, SUN K, LEE G M, et al.GDPR-compliant personal data management:a blockchain-based solution[J].IEEE Transactions on Information Forensics and Security, 2019, 15:1746-1761. [8] HUANG C, LIU D X, NI J B, et al.Achieving accountable and efficient data sharing in industrial Internet of Things[J].IEEE Transactions on Industrial Informatics, 2021, 17(2):1416-1427. [9] 吕建富, 赖英旭, 刘静.基于链上链下相结合的日志安全存储与检索[J].计算机科学, 2020, 47(3):298-303. LÜ J F, LAI Y X, LIU J.Log security storage and retrieval based on combination of on-chain and off-chain[J].Computer Science, 2020, 47(3):298-303.(in Chinese) [10] MIYACHI K, MACKEY T K.hOCBS:a privacy-preserving blockchain framework for healthcare data leveraging an on-chain and off-chain system design[J].Information Processing & Management, 2021, 58(3):102535. [11] LI T T, REN W, XIANG Y X, et al.FAPS:a fair, autonomous and privacy-preserving scheme for big data exchange based on oblivious transfer, Ether Cheque and smart contracts[J].Information Sciences, 2021, 544:469-484. [12] JIANG P, GUO F C, LIANG K T, et al.Searchain:blockchain-based private keyword search in decentralized storage[J].Future Generation Computer Systems, 2020, 107:781-792. [13] YANG H J, SHEN J, LU J Q, et al.A privacy-preserving data transmission scheme based on oblivious transfer and blockchain technology in the smart healthcare[J/OL].Security and Communication Networks:1-12[2021-12-04].https://doi.org/10.1155/2021/5781354. [14] WANG X A, XHAFA F, MA J F, et al.Controlled secure social cloud data sharing based on a novel identity based proxy re-encryption plus scheme[J].Journal of Parallel and Distributed Computing, 2019, 130:153-165. [15] 吴立强, 韩益亮, 杨晓元, 等.基于理想格的鲁棒门限代理重加密方案[J].电子学报, 2020, 48(9):1786-1794. WU L Q, HAN Y L, YANG X Y, et al.Robust threshold proxy re-encryption scheme from ideal lattices[J].Acta Electronica Sinica, 2020, 48(9):1786-1794.(in Chinese) [16] LIU Z, SEO H, CASTIGLIONE A, et al.Memory-efficient implementation of elliptic curve cryptography for the Internet-of-things[J].IEEE Transactions on Dependable and Secure Computing, 2019, 16(3):521-529. [17] 徐秋亮, 李大兴.椭圆曲线密码体制[J].计算机研究与发展, 1999, 36(11):1281-1288. XU Q L, LI D X.Elliptic curve cryptosystems[J].Journal of Computer Research and Development, 1999, 36(11):1281-1288.(in Chinese) [18] BANSAL M, GUPTA S, MATHUR S.Comparison of ECC and RSA algorithm with DNA encoding for IoT security[C]//Proceedings of the 6th International Conference on Inventive Computation Technologies.Washington D.C., USA:IEEE Press, 2021:1340-1343. [19] RABIN M O.How to exchange secrets by oblivious transfer:TR-81[R].Cambridge, USA:Aiken Computation Laboratory, Harvard University, 1981. [20] 李顺东, 杜润萌, 杨颜璟, 等.安全多方多数据排序[J].计算机学报, 2020, 43(8):1448-1462. LI S D, DU R M, YANG Y J, et al.Secure multiparty multi-data ranking[J].Chinese Journal of Computers, 2020, 43(8):1448-1462.(in Chinese) [21] CHOU T, ORLANDI C.The simplest protocol for oblivious transfer[M].Berlin, Germany:Springer, 2015. [22] 魏晓超, 蒋瀚, 赵川.一个高效可完全模拟的n取1茫然传输协议[J].计算机研究与发展, 2016, 53(11):2475-2481. WEI X C, JIANG H, ZHAO C.An efficient 1-out-of-n oblivious transfer protocol with full simulation[J].Journal of Computer Research and Development, 2016, 53(11):2475-2481.(in Chinese) [23] 赵圣楠, 蒋瀚, 魏晓超, 等.一个单服务器辅助的高效n取k茫然传输协议[J].计算机研究与发展, 2017, 54(10):2215-2223. ZHAO S N, JIANG H, WEI X C, et al.An efficient single server-aided k-out-of-n oblivious transfer protocol[J].Journal of Computer Research and Development, 2017, 54(10):2215-2223.(in Chinese) [24] 徐彦蛟, 李顺东, 王道顺, 等.基于椭圆曲线公钥系统的不经意传输协议[J].计算机科学, 2013, 40(12):186-191. XU Y J, LI S D, WANG D S, et al.Oblivious transfer based on elliptic curve public key cryptosystems[J].Computer Science, 2013, 40(12):186-191.(in Chinese) [25] GOYAL V, JAIN A, JIN Z Z, et al.Statistical zaps and new oblivious transfer protocols[C]//Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques.Berlin, Germany:Springer, 2020:668-699. [26] MOHAN A P, MOHAMED A A R, GLADSTON A.Merkle tree and blockchain-based cloud data auditing[J].International Journal of Cloud Applications and Computing, 2020, 10(3):54-66. [27] DAVE J, DUTTA A, FARUKI P, et al.Secure proof of ownership using Merkle tree for deduplicated storage[J].Automatic Control and Computer Sciences, 2020, 54(4):358-370. [28] 姜守旭, 李建中.一种P2P电子商务系统中基于声誉的信任机制[J].软件学报, 2007, 18(10):2551-2563. JIANG S X, LI J Z.A reputation-based trust mechanism for P2P E-commerce systems[J].Journal of Software, 2007, 18(10):2551-2563.(in Chinese) [29] 温啸林, 李长林, 张馨艺, 等.基于DPoS共识机制的区块链社区演化的可视分析方法[J].计算机科学, 2022, 49(1):328-335. WEN X L, LI C L, ZHANG X Y, et al.Visual analysis method of blockchain community evolution based on DPoS consensus mechanism[J].Computer Science, 2022, 49(1):328-335.(in Chinese) [30] GOLDREICH O.The fundamental of cryptography:basic applications[M].London, UK:Cambridge University Press, 2004. |