| [1] |
SANAZ T B, ALPTEKIN K, ÖZNUR Ö. Integrita: A BFT Distributed Storage System[J]. Future Generation Computer Systems, 2025, 166: 1-29.
|
| [2] |
CHEN Yuanliang, MA Fuchen, ZHOU Yuanhang, et al. Survey on Dynamic Testing Technologies for Distributed Systems[J]. Journal of Software, 2025, 36(7): 2964-3002.
|
|
陈元亮, 马福辰, 周远航, 等. 分布式系统动态测试技术研究综述[J]. 软件学报, 2025, 36(7): 2964-3002.
|
| [3] |
The National People’s Congress Standing Committee. Data Security Law of the People’s Republic of China[EB/OL]. (2021-06-21) [2025-05-18]. http://www.npc.gov.cn/c2/c30834/202106/t20210610311888.html.
|
|
全国人大常委会. 中华人民共和国数据安全法[EB/OL]. (2021-06- 21)[2025-05-18]. http://www.npc.gov.cn/c2/c30834/202106/t20210610311888.html.
|
| [4] |
WU Haotian, LI Zecheng, SONG Rui, et al. Enabling Privacy-Preserving and Efficient Authenticated Graph Queries on Blockchain-Assisted Clouds[J]. IEEE Transactions on Knowledge and Data Engineering, 2023, 35(9): 9728-9742.
|
| [5] |
LIU Jianghua, HOU Jingyu, YANG Wenjie, et al. Leakage-Free Dissemination of Authenticated Tree-Structured Data with Multi-Party Control[J]. IEEE Transactions on Computers, 2021, 70(7): 1120-1131.
|
| [6] |
SHEFF I, WANG Xinwen, NI Haobin, et al. Charlotte: Composable Authenticated Distributed Data Structures, Technical Report[EB/OL]. (2019-05-09) [2025-05-10]. https://arxiv.org/pdf/1905.03888.
|
| [7] |
TAMASSIA R. Authenticated Data Structures[C]// Springer. European Symposium on Algorithms. Heidelberg: Springer, 2003: 2-5.
|
| [8] |
CHOI J A, BEILLAHI S M, SINGH S F, et al. LMPT: A Novel Authenticated Data Structure to Eliminate Storage Bottlenecks for High Performance Blockchains[J]. IEEE Transactions on Network and Service Management, 2024, 21(2): 1333-1343.
|
| [9] |
YIN Bo, ZENG Weilong, ZHANG Peng, et al. EAQ: Enabling Authenticated Complex Query Services in Sustainable-Storage Blockchain[J]. IEEE Transactions on Sustainable Computing, 2023, 8(3): 435-447.
|
| [10] |
YANG Haining, FENG Dengguo, QIN Jing. Efficient Verifiable Unbounded-Size Database from Authenticated Matrix Commitment[J]. IEEE Transactions on Dependable and Secure Computing, 2023, 20(5): 3873-3889.
|
| [11] |
LIANG Yihuai, LI Yan, SHIN B S. Dynamic Authenticated Keyword Search in Hybrid-Storage Blockchain[J]. Future Generation Computer Systems, 2024, 155: 53-65.
|
| [12] |
TONG Qiang, LONG Yin, LIU Yulong, et al. Append-Only Authenticated Data Sets Based on RSA Accumulators for Transparent Log System[EB/OL]. (2025-04-21) [2025-05-11]. https://doi.org/10.1016/j.csi.2025.103978.
|
| [13] |
LIU Dongxiao, HUANG Cheng, XUE Liang, et al. Authenticated and Prunable Dictionary for Blockchain-Based VNF Management[J]. IEEE Transactions on Wireless Communications, 2022, 21(11): 9312-9324.
|
| [14] |
MO Ruo, MA Jianfeng, LIU Ximeng, et al. Multi-Authority ABS Supporting Dendritic Access Structure[J]. Journal on Communications, 2017, 38(7): 96-104.
doi: 10.11959/j.issn.1000-436x.2017150
|
|
莫若, 马建峰, 刘西蒙, 等. 支持树形访问结构的多权威基于属性的签名方案[J]. 通信学报, 2017, 38(7): 96-104.
doi: 10.11959/j.issn.1000-436x.2017150
|
| [15] |
WANG Qiang, WANG Cong, LI Jin, et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing[C]// Springer. European Symposium on Research in Computer Security. Heidelberg: Springer, 2009: 355-370.
|
| [16] |
ZHU Yan, AHN G J, HU Hongxin, et al. Dynamic Audit Services for Outsourced Storages in Clouds[J]. IEEE Transactions on Services Computing, 2013, 6(2): 227-238.
|
| [17] |
ERWAY C C, KÜPÇÜ A, PAPAMANTHOU C, et al. Dynamic Provable Data Possession[J]. ACM Transactions on Information and System Security (TISSEC), 2015, 17(4): 1-29.
|
| [18] |
NAKAMOTO S. Bitcoin: A Peer-to-Peer Electronic Cash System[EB/OL]. (2008-10-31) [2025-05-10]. https://bitcoin.org/bitcoin.pdf.
|
| [19] |
YUAN Yong, WANG Feiyue. Blockchain: The State of the Art and Future Trends[J]. Acta Automatica Sinica, 2016, 42(4): 481-494.
|
|
袁勇, 王飞跃. 区块链技术发展现状与展望[J]. 自动化学报, 2016, 42(4): 481-494.
|
| [20] |
LI Fang, LI Zhuoran, ZHAO He. Research on the Progress in Cross-Chain Technology of Blockchains[J]. Journal of Software, 2019, 30(6): 1649-1660.
|
|
李芳, 李卓然, 赵赫. 区块链跨链技术进展研究[J]. 软件学报, 2019, 30(6): 1649-1660.
|
| [21] |
ZHANG Ce, XU Cheng, XU Jianliang, et al. GEM2-Tree: A Gas-Efficient Structure for Authenticated Range Queries in Blockchain[C]// IEEE. IEEE 35th International Conference on Data Engineering. New York: IEEE, 2019: 842-853.
|
| [22] |
LI Chenxing, BEILLAHI S M, YANG Guang, et al. LVMT: An Efficient Authenticated Storage for Blockchain[J]. ACM Transactions on Storage, 2024, 20(3): 1-34.
|