| 1 |
SHAMIR A . How to share a secret. Communications of the ACM, 1979, 22 (11): 612- 613.
doi: 10.1145/359168.359176
|
| 2 |
FELDMAN P. A practical scheme for non-interactive verifiable secret sharing[C]//Proceedings of the 28th Annual Symposium on Foundations of Computer Science. New York, USA: ACM Press, 1987: 427-438.
|
| 3 |
|
| 4 |
黄保华, 郑慧颖, 屈锡, 等. 联盟链高效存储访问控制方案. 计算机工程, 2023, 49 (8): 37- 45.
doi: 10.19678/j.issn.1000-3428.0064936
|
|
HUANG B H , ZHENG H Y , QU X , et al. Efficient storage access control scheme for alliance chain. Computer Engineering, 2023, 49 (8): 37- 45.
doi: 10.19678/j.issn.1000-3428.0064936
|
| 5 |
KOSBA A, MILLER A, SHI E, et al. Hawk: the blockchain model of cryptography and privacy-preserving smart contracts[C]//Proceedings of the IEEE Symposium on Security and Privacy (SP). Washington D.C., USA: IEEE Press, 2016: 839-858.
|
| 6 |
SALEH F . Blockchain without waste: Proof-of-Stake. The Review of Financial Studies, 2021, 34 (3): 1156- 1190.
doi: 10.1093/rfs/hhaa075
|
| 7 |
|
| 8 |
|
| 9 |
RABIN M O . Transaction protection by beacons. Journal of Computer and System Sciences, 1983, 27 (2): 256- 267.
doi: 10.1016/0022-0000(83)90042-9
|
| 10 |
|
| 11 |
|
| 12 |
SYTA E, JOVANOVIC P, KOGIAS E K, et al. Scalable bias-resistant distributed randomness[C]//Proceedings of the IEEE Symposium on Security and Privacy (SP). Washington D.C., USA: IEEE Press, 2017: 444-460.
|
| 13 |
SCHINDLER P, JUDMAYER A, STIFTER N, et al. HydRand: efficient continuous distributed randomness[C]//Proceedings of the IEEE Symposium on Security and Privacy (SP). Washington D.C., USA: IEEE Press, 2020: 73-89.
|
| 14 |
DAS S, KRISHNAN V, ISAAC I M, et al. SPURT: scalable distributed randomness beacon with transparent setup[C]//Proceedings of the IEEE Symposium on Security and Privacy (SP). Washington D.C., USA: IEEE Press, 2022: 2502-2517.
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
CHOI K, MANOJ A, BONNEAU J. SoK: distributed randomness beacons[C]//Proceedings of the IEEE Symposium on Security and Privacy (SP). Washington D.C., USA: IEEE Press, 2023: 75-92.
|
| 19 |
RAIKWAR M. Competitive decentralized randomness beacon protocols[C]//Proceedings of the 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure. New York, USA: ACM Press, 2022: 83-94.
|
| 20 |
|
| 21 |
REED I S , SOLOMON G . Polynomial codes over certain finite fields. Journal of the Society for Industrial and Applied Mathematics, 1960, 8 (2): 300- 304.
doi: 10.1137/0108018
|
| 22 |
|
| 23 |
CHANDRAMOULI A , CHOUDHURY A , PATRA A . A survey on perfectly secure verifiable secret-sharing. ACM Computing Surveys, 2022, 54 (11): 1- 36.
|
| 24 |
KIAMARI N , HADIAN M , MASHHADI S . Non-interactive verifiable LWE-based multi secret sharing scheme. Multimedia Tools and Applications, 2023, 82 (14): 22175- 22187.
doi: 10.1007/s11042-022-13347-4
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
BHAT A, SHRESTHA N, LUO Z T, et al. RandPiper-reconfiguration-friendly random beacons with quadratic communication[C]//Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. New York, USA: ACM Press, 2021: 3502-3524.
|
| 29 |
|
| 30 |
高山, 王诚昱, 毕成铭, 等. 基于符号执行的智能合约重入漏洞检测. 计算机工程, 2024, 50 (10): 196- 204.
doi: 10.19678/j.issn.1000-3428.0068288
|
|
GAO S , WANG C Y , BI C M , et al. Smart contract reentrancy vulnerability detection based on symbolic execution. Computer Engineering, 2024, 50 (10): 196- 204.
doi: 10.19678/j.issn.1000-3428.0068288
|