[1] |
FENG Qi, HE Debiao, ZEADALLY S, et al. A Survey on Privacy Protection in Blockchain System[J]. Journal of Network and Computer Applications, 2019, 126: 45-58.
doi: 10.1016/j.jnca.2018.10.020
|
[2] |
ZHU Liehuang, GAO Feng, SHEN Meng, et al. Survey on Privacy Preserving Techniques for Blockchain Technology[J]. Journal of Computer Research and Development, 2017, 54(10): 2170-2186.
|
|
祝烈煌, 高峰, 沈蒙, 等. 区块链隐私保护研究综述[J]. 计算机研究与发展, 2017, 54(10): 2170-2186.
|
[3] |
WANG Chenxu, CHENG Jiacheng, SANG Xinxin, et al. Data Privacy-Preserving for Blockchain: State of the Art and Trends[J]. Journal of Computer Research and Development, 2021, 58(10): 2099-2119.
|
|
王晨旭, 程加成, 桑新欣, 等. 区块链数据隐私保护:研究现状与展望[J]. 计算机研究与发展, 2021, 58(10): 2099-2119.
|
[4] |
MAO Xiangke, LI Xinhang, GUO Suwei. A Blockchain Architecture Design that Takes into Account Privacy Protection and Regulation[C]// Springer. International Conference on Web Information Systems and Applications. Berlin:Springer, 2021: 311-319.
|
[5] |
XUE Zhiyuan, WANG Miao, ZHANG Qiuyue, et al. A Regulatable Blockchain Transaction Model with Privacy Protection[J]. International Journal of Computational Intelligence Systems, 2021, 14(1): 1642-1652.
doi: 10.2991/ijcis.d.210528.001
URL
|
[6] |
SONG Jingwen, ZHANG Dawei, HAN Xu, et al. Supervised Identity Privacy Protection Scheme in Blockchain[J]. Journal of Software, 2022: 1-21.
|
|
宋靖文, 张大伟, 韩旭, 等. 区块链中可监管的身份隐私保护方案[J]. 软件学报, 2022: 1-21.
|
[7] |
LIANG Wei, YANG Yang, YANG Ce, et al. PDPChain: A Consortium Blockchain-Based Privacy Protection Scheme for Personal Data[J]. IEEE Transactions on Reliability, 2022: 1-13.
|
[8] |
ZHANG Jianxiong, GUO Bing, DING Xuefeng, et al. Distributed Supervision Model for Enterprise Data Asset Trading Based on Blockchain Multi-Channel in Industry Alliance[J]. Sensors, 2022, 22(20): 7842-7853.
doi: 10.3390/s22207842
URL
|
[9] |
LIN Chao. Research on Technology of Privacy Protection in Blockchain Systems and Its Applications[D]. Wuhan: Wuhan University, 2020.
|
|
林超. 面向区块链系统的隐私保护技术及其应用研究[D]. 武汉: 武汉大学, 2020.
|
[10] |
GÜR K D, POLYAKOV Y, ROHLOFF K, et al. Practical Applications of Improved Gaussian Sampling for Trapdoor Lattices[J]. IEEE Transactions on Computers, 2019, 68(4): 570-584.
doi: 10.1109/TC.2018.2874479
URL
|
[11] |
WANG Xiaoyun, LIU Mingjie. Survey of Lattice-Based Cryptography[J]. Journal of Cryptologic Research, 2014, 1 (1): 13-27.
|
|
王小云, 刘明洁. 格密码学研究[J]. 密码学报, 2014, 1(1): 13-27.
doi: 10.13868/j.cnki.jcr.000002
|
[12] |
MICCIANCIO D, REGEV O. Worst-Case to Average-Case Reductions Based on Gaussian Measures[J]. SIAM Journal on Computing, 2007, 3(1): 267-302.
|
[13] |
LYUBASHEVSKY V, PEIKERT C, REGEV O. On Ideal Lattices and Learning with Errors over Rings[C]// Springer. EUROCRYPT 2010. Berlin:Springer, 2010: 1-23.
|
[14] |
BANSARKHANI R E, BUCHMANN J. Improvement and Efficient Implementation of a Lattice-Based Signature Scheme[C]// Springer. Selected Areas in Cryptography 2013. Berlin:Springer, 2014: 48-67.
|
[15] |
MICCIANCIO D, PEIKERT C. Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller[C]// Springer. EUROCRYPT 2012. Berlin:Springer, 2012: 700-718.
|
[16] |
SAHAI A, WATERS B. Fuzzy Identity-Based Encryption[C]// Springer. EUROCRYPT 2005. Berlin:Springer, 2005: 457-473.
|
[17] |
GOYAL V, PANDEY O, SAHAI A, et al. Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data[C]// ACM. 13th ACM Conference on Computer and Communications Security. New York: ACM, 2006: 89-98.
|
[18] |
WANG Yue, FAN Kai. Effective CP-ABE with Hidden Access Policy[J]. Journal of Computer Research and Development, 2019, 56(10): 2151-2159.
|
|
王悦, 樊凯. 隐藏访问策略的高效CP-ABE方案[J]. 计算机研究与发展, 2019, 56(10): 2151-2159.
|
[19] |
FENG Dengguo, CHEN Cheng. Research on Attribute-Based Cryptography[J]. Journal of Cryptologic Research, 2014, 1 (1): 1-12.
|
|
冯登国, 陈成. 属性密码学研究[J]. 密码学报, 2014, 1(1): 1-12.
doi: 10.13868/j.cnki.jcr.000001
|
[20] |
ZHANG Jiang, ZHANG Zhenfeng, GE Aijun. Ciphertext Policy Attribute-Based Encryption from Lattices[C]// ACM. 7th ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2012: 16-17.
|
[21] |
RUAN Pingcheng, KANZA Y, OOI B C, et al. LedgerView: Access-Control Views on Hyperledger Fabric[C]// ACM. 2022 International Conference on Management of Data. New York: ACM, 2022: 2218-2231.
|