1 |
IMANE E A, YOUSSEF G. Network security strategies in big data context. Procedia Computer Science, 2020, 175, 730- 736.
doi: 10.1016/j.procs.2020.07.108
|
2 |
代闯闯, 栾海晶, 杨雪莹, 等. 区块链技术研究综述. 计算机科学, 2021, 48(S2): 500- 508.
URL
|
|
DAI C C, LUAN H J, YANG X Y, et al. Review of blockchain technology research. Computer Science, 2021, 48(S2): 500- 508.
URL
|
3 |
ANAND M R, ANSHUMAN K, AN B, et al. Privacy protected blockchain based architecture and implementation for sharing of students' credentials. Information Processing and Management, 2021, 58(3): 102512.
doi: 10.1016/j.ipm.2021.102512
|
4 |
FENG J, WANG Y, WANG J, et al. Blockchain-based data management and edge-assisted trusted cloaking area construction for location privacy protection in vehicular networks. IEEE Internet of Things Journal, 2021, 8(4): 2087- 2101.
doi: 10.1109/JIOT.2020.3038468
|
5 |
ABBAS Y, PARIZI REZA M, ALI D, et al. Blockchain-enabled authentication handover with efficient privacy protection in SDN-based 5G networks. IEEE Transactions on Network Science and Engineering, 2019, 8(2): 1120- 1132.
|
6 |
程冠杰, 黄诤杰, 邓水光. 基于区块链与边缘计算的物联网数据管理. 物联网学报, 2020, 4(2): 1- 9.
URL
|
|
CHENG G J, HUANG Z J, DENG S G. Data management based on blockchain and edge computing for Internet of Things. Chinese Journal on Internet of Things, 2020, 4(2): 1- 9.
URL
|
7 |
|
8 |
王群, 李馥娟, 倪雪莉, 等. 区块链数据形成与隐私威胁. 计算机工程, 2023, 49(8): 1- 12.
URL
|
|
WANG Q, LI F J, NI X L, et al. Data formation and privacy threat of blockchain. Computer Engineering, 2023, 49(8): 1- 12.
URL
|
9 |
MUNJAL K, BHATIA R. A systematic review of homomorphic encryption and its contributions in healthcare industry. Complex & Intelligent Systems, 2023, 9(4): 3759- 3786.
|
10 |
|
11 |
MARCOLLA C, SUCASAS V, MANZANO M, et al. Survey on fully homomorphic encryption, theory, and applications. Proceedings of the IEEE, 2022, 110(10): 1572- 1609.
doi: 10.1109/JPROC.2022.3205665
|
12 |
邵航, 高思琪, 钟离, 等. 同态加密在隐私计算中的应用综述. 信息通信技术与政策, 2022,(8): 75- 88.
URL
|
|
SHAO H, GAO S Q, ZHONG L, et al. Homomorphic encryption protocols and applications in privacy preserving computation. Information and Communications Technology and Policy, 2022,(8): 75- 88.
URL
|
13 |
RIVEST R L, SHAMIR A, ADLEMAN L M. Cryptographic communications system and method: US4405829[P]. 1983-09-20.
|
14 |
PAILLIER P. Public-key cryptosystems based on composite degree residuosity classes[C]//Proceedings of the 17th International Conference on Theory and Application of Cryptographic Techniques. New York, USA: ACM Press, 1999: 223-238.
|
15 |
|
16 |
李一聪, 周宽久, 王梓仲. 基于零知识证明的区块链隐私保护研究. 空间控制技术与应用, 2022, 48(1): 44- 52.
URL
|
|
LI Y C, ZHOU K J, WANG Z Z. A survey of block chain privacy protection research based on zero-knowledge proof. Aerospace Control and Application, 2022, 48(1): 44- 52.
URL
|
17 |
|
18 |
ELI BEN S, IDDO B, YINON H, et al. Scalable, transparent, and post-quantum secure computational integrity[EB/OL]. [2023-06-05]. https://eprint.iacr.org/2018/046.
|
19 |
|
20 |
BEN SASSON E, CHIESA A, GARMAN C, et al. Zerocash: decentralized anonymous payments from Bitcoin[C]//Proceedings of 2014 IEEE Symposium on Security and Privacy. Washington D. C., USA: IEEE Press, 2014: 459-474.
|
21 |
|
22 |
ZHU P, HU J, ZHANG Y, et al. A blockchain based solution for medication anti-counterfeiting and traceability. IEEE Access, 2020, 8, 184256- 184272.
doi: 10.1109/ACCESS.2020.3029196
|
23 |
|
24 |
CLAUDIA A, TUDOR C, IONUT A, et al. Distributed ledger technology review and decentralized applications development guidelines. Future Internet, 2021, 13(3): 62.
|
25 |
秦备, 卢毅, 赵俊, 等. 一种基于区块链的高可控分布式数字身份识别系统: CN114528535A[P]. 2022-05-24.
|
|
QIN B, LU Y, ZHAO J, et al. High-controllability distributed digital identity recognition system based on block chain: CN114528535A[P]. 2022-05-24. (in Chinese)
|