| 1 | IMANE E A, YOUSSEF G. Network security strategies in big data context. Procedia Computer Science, 2020, 175, 730- 736.  doi: 10.1016/j.procs.2020.07.108
 | 
																													
																							| 2 | 代闯闯, 栾海晶, 杨雪莹, 等. 区块链技术研究综述. 计算机科学, 2021, 48(S2): 500- 508.  URL
 | 
																													
																							|  | DAI C C, LUAN H J, YANG X Y, et al. Review of blockchain technology research. Computer Science, 2021, 48(S2): 500- 508.  URL
 | 
																													
																							| 3 | ANAND M R, ANSHUMAN K, AN B, et al. Privacy protected blockchain based architecture and implementation for sharing of students' credentials. Information Processing and Management, 2021, 58(3): 102512.  doi: 10.1016/j.ipm.2021.102512
 | 
																													
																							| 4 | FENG J, WANG Y, WANG J, et al. Blockchain-based data management and edge-assisted trusted cloaking area construction for location privacy protection in vehicular networks. IEEE Internet of Things Journal, 2021, 8(4): 2087- 2101.  doi: 10.1109/JIOT.2020.3038468
 | 
																													
																							| 5 | ABBAS Y, PARIZI REZA M, ALI D, et al. Blockchain-enabled authentication handover with efficient privacy protection in SDN-based 5G networks. IEEE Transactions on Network Science and Engineering, 2019, 8(2): 1120- 1132. | 
																													
																							| 6 | 程冠杰, 黄诤杰, 邓水光. 基于区块链与边缘计算的物联网数据管理. 物联网学报, 2020, 4(2): 1- 9.  URL
 | 
																													
																							|  | CHENG G J, HUANG Z J, DENG S G. Data management based on blockchain and edge computing for Internet of Things. Chinese Journal on Internet of Things, 2020, 4(2): 1- 9.  URL
 | 
																													
																							| 7 |  | 
																													
																							| 8 | 王群, 李馥娟, 倪雪莉, 等. 区块链数据形成与隐私威胁. 计算机工程, 2023, 49(8): 1- 12.  URL
 | 
																													
																							|  | WANG Q, LI F J, NI X L, et al. Data formation and privacy threat of blockchain. Computer Engineering, 2023, 49(8): 1- 12.  URL
 | 
																													
																							| 9 | MUNJAL K, BHATIA R. A systematic review of homomorphic encryption and its contributions in healthcare industry. Complex & Intelligent Systems, 2023, 9(4): 3759- 3786. | 
																													
																							| 10 |  | 
																													
																							| 11 | MARCOLLA C, SUCASAS V, MANZANO M, et al. Survey on fully homomorphic encryption, theory, and applications. Proceedings of the IEEE, 2022, 110(10): 1572- 1609.  doi: 10.1109/JPROC.2022.3205665
 | 
																													
																							| 12 | 邵航, 高思琪, 钟离, 等. 同态加密在隐私计算中的应用综述. 信息通信技术与政策, 2022,(8): 75- 88.  URL
 | 
																													
																							|  | SHAO H, GAO S Q, ZHONG L, et al. Homomorphic encryption protocols and applications in privacy preserving computation. Information and Communications Technology and Policy, 2022,(8): 75- 88.  URL
 | 
																													
																							| 13 | RIVEST R L, SHAMIR A, ADLEMAN L M. Cryptographic communications system and method: US4405829[P]. 1983-09-20. | 
																													
																							| 14 | PAILLIER P. Public-key cryptosystems based on composite degree residuosity classes[C]//Proceedings of the 17th International Conference on Theory and Application of Cryptographic Techniques. New York, USA: ACM Press, 1999: 223-238. | 
																													
																							| 15 |  | 
																													
																							| 16 | 李一聪, 周宽久, 王梓仲. 基于零知识证明的区块链隐私保护研究. 空间控制技术与应用, 2022, 48(1): 44- 52.  URL
 | 
																													
																							|  | LI Y C, ZHOU K J, WANG Z Z. A survey of block chain privacy protection research based on zero-knowledge proof. Aerospace Control and Application, 2022, 48(1): 44- 52.  URL
 | 
																													
																							| 17 |  | 
																													
																							| 18 | ELI BEN S, IDDO B, YINON H, et al. Scalable, transparent, and post-quantum secure computational integrity[EB/OL]. [2023-06-05]. https://eprint.iacr.org/2018/046 . | 
																													
																							| 19 |  | 
																													
																							| 20 | BEN SASSON E, CHIESA A, GARMAN C, et al. Zerocash: decentralized anonymous payments from Bitcoin[C]//Proceedings of 2014 IEEE Symposium on Security and Privacy. Washington D. C., USA: IEEE Press, 2014: 459-474. | 
																													
																							| 21 |  | 
																													
																							| 22 | ZHU P, HU J, ZHANG Y, et al. A blockchain based solution for medication anti-counterfeiting and traceability. IEEE Access, 2020, 8, 184256- 184272.  doi: 10.1109/ACCESS.2020.3029196
 | 
																													
																							| 23 |  | 
																													
																							| 24 | CLAUDIA A, TUDOR C, IONUT A, et al. Distributed ledger technology review and decentralized applications development guidelines. Future Internet, 2021, 13(3): 62. | 
																													
																							| 25 | 秦备, 卢毅, 赵俊, 等. 一种基于区块链的高可控分布式数字身份识别系统: CN114528535A[P]. 2022-05-24. | 
																													
																							|  | QIN B, LU Y, ZHAO J, et al. High-controllability distributed digital identity recognition system based on block chain: CN114528535A[P]. 2022-05-24. (in Chinese) |