[1] 张凡,冯登国.基于模糊提取的远程双向生物认证[J].计算机研究与发展,2009,46(5):850-856.(ZHANG F, FENG D G. Fuzzy extractor based remote mutual biometric authentication[J]. Journal of Computer Research and Development, 2009, 46(5):850-856.) [2] LEE J K, RYU S R, YOO K Y. Fingerprint-based remote user authentication scheme using smart cards[J]. Electronics Letters, 2002, 38(12):554-555. [3] DODIS Y, REYZIN L, SMITH A. Fuzzy extractors:how to generate strong keys from biometrics and other noisy data[C]//Proceedings of the 2004 International Conference on Theory and Applications of Cryptographic Techniques, LNCS 3027. Berlin:Springer, 2004:523-540. [4] 杨得新,杨波,郭艾侠.基于生物特征和口令放大的远程认证协议[J].计算机工程与应用,2010,46(30):108-111.(YANG D X, YANG B, GUO A X. Remote authentication protocol based on biometrics and password amplification[J]. Computer Engineering and Applications, 2010, 46(30):108-111.) [5] DAS A K. A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor[J]. International Journal of Communication Systems, 2017, 30(1):e2933. [6] 李晓伟,杨邓奇,陈本辉,等.基于生物特征和口令的双因子认证与密钥协商协议[J].通信学报,2017,38(7):89-95.(LI X W, YANG D Q, CHEN B H, et al. Two-factor authenticated key agreement protocol based on biometric feature and password[J]. Journal on Communications, 2017, 38(7):89-95.) [7] NAKAMOTO S. Bitcoin:a peer-to-peer electronic cash system[EB/OL].[2017-11-06]. https://www.researchgate.net/publication/228640975_Bitcoin_A_peer-to-peer_electronic_cash_system. [8] ZYSKIND G, NATHAN O, PENTLAND A S. Decentralizing privacy:using blockchain to protect personal data[C]//SPW 2015:Proceedings of the 2015 IEEE Security and Privacy Workshops. Piscataway, NJ:IEEE, 2015:180-184. [9] FROMKNECHT C, VELICANU D, YAKOUBOV S. A decentralized public key infrastructure with identity retention[EB/OL].[2017-11-06]. https://eprint.iacr.org/2014/803.pdf. [10] AXON L. Privacy-awareness in blockchain-based PKI[EB/OL].[2017-11-06]. https://ora.ox.ac.uk/objects/uuid:f8377b69-599b-4cae-8df0-f0cded53e63b/datastreams/ATTACHMENT01. [11] LEWISON K, CORELLA F. Backing rich credentials with a blockchain PKI*[EB/OL].[2017-11-06]. https://pomcor.com/techreports/BlockchainPKI.pdf. [12] HAMMUDOGLU J S, SPARREBOOM J, RAUHAMAA J I, et al. Portable Trust:biometric-based authentication and blockchain storage for self-sovereign identity systems[EB/OL].[2017-11-06]. http://xueshu.baidu.com/s?wd=paperuri%3A%281561d1159da05c4d14868f231a8b5ed8%29&filter=sc_long_sign&tn=SE_xueshusource_2kduw22v&sc_vurl=http%3A%2F%2Farxiv.org%2Fpdf%2F1706.03744&ie=utf-8&sc_us=5937169664086147107. [13] 袁勇,王飞跃.区块链技术发展现状与展望[J].自动化学报,2016,42(4):481-494.(YUAN Y, WANG F Y. Blockchain:the state of the art and future trends[J]. Acta Automatica Sinica, 2016, 42(4):481-494.) [14] 蔡维德,郁莲,王荣,等.基于区块链的应用系统开发方法研究[J].软件学报,2017,28(6):1474-1487.(CAI W D, YU L, WANG R, et al. Blockchain application development techniques[J]. Journal of Software, 2017, 28(6):1474-1487.) [15] ONGARO D, OUSTERHOUT J. In search of an understandable consensus algorithm[C]//USENIX ATC'14:Proceedings of the 2014 USENIX Conference on USENIX Annual Technical Conference. Berkeley, CA:USENIX Association, 2014:305-320. |