| 1 |
RAY P P . Web3:a comprehensive review on background, technologies, applications, zero-trust architectures, challenges and future directions. Internet of Things and Cyber-Physical Systems, 2023, 3, 213- 248.
doi: 10.1016/j.iotcps.2023.05.003
|
| 2 |
ZHU J J , LI F , CHEN J Y . A survey of blockchain, artificial intelligence, and edge computing for Web 3.0. Computer Science Review, 2024, 54, 100667.
doi: 10.1016/j.cosrev.2024.100667
|
| 3 |
CHENG S. Applications of Web 3.0[M]//Web 3.0: Concept, Content and Context. Berlin, Germany: Springer, 2024: 109-145.
|
| 4 |
GAN W, YE Z, WAN S, et al. Web 3.0: the future of internet[C]//Proceedings of the ACM Web Conference. New York, USA: ACM Press, 2023: 1266-1275.
|
| 5 |
YU W . Theoretical explanation and institutional topology of financial risk regulation for NFT digital collectibles. Management, 2022, 10 (5): 325- 330.
|
| 6 |
MOCHRAM R A A, MAKAWOWOR C T, TANUJAYA K M, et al. Systematic literature review: blockchain security in NFT ownership[C]//Proceedings of 2022 International Conference on Electrical and Information Technology (IEIT). Washington D.C., USA: IEEE Press, 2022: 302-306.
|
| 7 |
YANG S , LI M . Web 3. 0 data infrastructure: challenges and opportunities. IEEE Network, 2023, 37 (1): 4- 5.
doi: 10.1109/MNET.2023.10110018
|
| 8 |
中共中央国务院关于构建数据基础制度更好发挥数据要素作用的意见[J]. 中华人民共和国国务院公报, 2023(1): 28-33.
|
|
Opinions of the central committee of the CPC and the state council on building basic systems for data to give full play to the role of data resources[J]. Gazette of the State Council of the People's Republic of China, 2023(1): 28-33. (in Chinese)
|
| 9 |
XU G , CHIANG J M H . The core value of Web3. 0:recognition and measurement of data assets. Journal of Information Technology & Economic Development, 2023, 13 (2): 95- 101.
|
| 10 |
XIAO W, TU Y Q, WAN P, et al. Analysis of data ownership rights in the big data era[C]//Proceedings of the 4th International Symposium on Computer Science and Intelligent Control. Washington D. C., USA: IEEE Press, 2020: 1-5.
|
| 11 |
XIA X, LI X. Researching on cloud service architecture of data products[C]//Proceedings of IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB). Washington D.C., USA: IEEE Press, 2023: 1-6.
|
| 12 |
MAMBO M , USUDA K , OKAMOTO E . Proxy signatures: delegation of the power to sign messages. IEICE Transactions on Fundamentals of Electronics, 1996, 79 (9): 1338- 1354.
|
| 13 |
PANG L J , HU Y F , ZHOU X , et al. Directed proxy signature with fast revocation proven secure in the standard model. IET Information Security, 2017, 11 (3): 168- 176.
doi: 10.1049/iet-ifs.2015.0285
|
| 14 |
|
| 15 |
张彦华, 陈岩, 刘西蒙, 等. 格上基于身份的变色龙签名方案. 电子与信息学报, 2024, 46 (2): 757- 764.
|
|
ZHANG Y H , CHEN Y , LIU X M , et al. Identity-based chameleon signature schemes over lattices. Journal of Electronics & Information Technology, 2024, 46 (2): 757- 764.
|
| 16 |
SCHMELZ D, PINTER K, BROTTRAGER J, et al. Securing the rights of data subjects with blockchain technology[C]//Proceedings of the 3rd International Conference on Information and Computer Technologies (ICICT). Washington D.C., USA: IEEE Press, 2020: 284-288.
|
| 17 |
SUN H M . Design of time-stamped proxy signatures with traceable receivers. IEE Proceedings-Computers and Digital Techniques, 2000, 147 (6): 462- 466.
doi: 10.1049/ip-cdt:20000888
|
| 18 |
DAS M L , SAXENA A , GULATI V P . An efficient proxy signature scheme with revocation. Informatica, 2004, 15 (4): 455- 464.
doi: 10.15388/Informatica.2004.072
|
| 19 |
LU E J L , HWANG M S , HUANG C J . A new proxy signature scheme with revocation. Applied Mathematics and Computation, 2005, 161 (3): 799- 806.
doi: 10.1016/j.amc.2003.12.039
|
| 20 |
SEO S H, SHIM K A, LEE S H. A mediated proxy signature scheme with fast revocation for electronic transactions[C]//Proceedings of International Conference on Trust, Privacy and Security in Digital Business. Berlin, Germany: Springer, 2005: 216-225.
|
| 21 |
LIU Z H , HU Y P , ZHANG X S , et al. Provably secure multi-proxy signature scheme with revocation in the standard model. Computer Communications, 2011, 34 (3): 494- 501.
doi: 10.1016/j.comcom.2010.05.015
|
| 22 |
PANG L J , ZHAO H Y , ZHOU X , et al. Strongly unforgeable and efficient proxy signature scheme with fast revocation secure in the standard model. International Journal of Distributed Sensor Networks, 2016, 12 (1): 3205206.
doi: 10.1155/2016/3205206
|
| 23 |
VERMA G K , SINGH B B , KUMAR N , et al. CB-PS: an efficient short-certificate-based proxy signature scheme for UAVs. IEEE Systems Journal, 2019, 14 (1): 621- 632.
|
| 24 |
王海龙, 田有亮, 尹鑫. 基于区块链的大数据确权方案. 计算机科学, 2018, 45 (2): 15-19, 24.
|
|
WANG H L , TIAN Y L , YIN X . Blockchain-based big data right confirmation scheme. Computer Science, 2018, 45 (2): 15-19, 24.
|
| 25 |
QIAN P, LIU Z G, WANG X, et al. Digital resource rights confirmation and infringement tracking based on smart contracts[C]//Proceedings of the 6th International Conference on Cloud Computing and Intelligence Systems (CCIS). Washington D. C., USA: IEEE Press, 2019: 62-67.
|
| 26 |
WANG L , HUANG S J , ZUO L N , et al. RCDS: a right-confirmable data-sharing model based on symbol mapping coding and blockchain. Frontiers of Information Technology & Electronic Engineering, 2023, 24 (8): 1194- 1213.
|
| 27 |
ZHAO H J, ZHAO B, CHENG S S. The mechanism of confirming big data property rights based on smart contract[C]//Proceedings of the 4th International Conference on Intelligent Information Technology (ICIIT). New York, USA: ACM Press, 2019: 78-82.
|
| 28 |
IKEBE K, HATA Y, NAKAMURA T, et al. Application and limitations of digital signature schemes for implementing Non-Fungible Token (NFT)[C]//Proceedings of the 4th Asia Service Sciences and Software Engineering Conference. Aizu-Wakamatsu, Japan: [s. n. ], 2023: 119-125.
|
| 29 |
WATERS B. Efficient identity-based encryption without random oracles[C]//Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin, Germany: Springer, 2005: 114-127.
|
| 30 |
YANG K D , ZHANG Z Y , TIAN Y L , et al. A secure authentication framework to guarantee the traceability of avatars in metaverse. IEEE Transactions on Information Forensics and Security, 2023, 18, 3817- 3832.
doi: 10.1109/TIFS.2023.3288689
|
| 31 |
POINTCHEVAL D, STERN J. Security proofs for signature schemes[C]//Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT). Berlin, Germany: Springer, 1996: 387-398.
|