| 1 | 
																						 
											 路爱同,赵阔,杨晶莹,等. 区块链跨链技术研究[J]. 信息网络安全, 2019, 19(8):83-90.
											 											 | 
										
																													
																						 | 
																						 
											 LU A T, ZHAO K, YANG J Y, et al. Research on cross‑chain technology of blockchain[J]. Netinfo Security, 2019, 19(8): 83-90.
											 											 | 
										
																													
																						| 2 | 
																						 
											 DENG L P, CHEN H, JING Z, et al. Research on cross‑chain technology based on sidechain and hash‑locking[C]// Proceedings of the 2018 International Conference on Edge Computing, LNCS 10973. Cham: Springer, 2018:144-151.
											 											 | 
										
																													
																						| 3 | 
																						 
											 WANG Y, YANG B Q, LIU J X, et al. Virtual chain: a storage model supporting cross‑blockchain transaction[J]. Concurrency and Computation: Practice and Experience, 2022, 34(12): No.e5899.  10.1002/cpe.5899 
											 											 | 
										
																													
																						| 4 | 
																						 
											 李芳,李卓然,赵赫. 区块链跨链技术进展研究[J]. 软件学报, 2019, 30(6):1649-1660.  10.13328/j.cnki.jos.005741 
											 											 | 
										
																													
																						 | 
																						 
											 LI F, LI Z R, ZHAO H. Research on the progress in cross‑chain technology of blockchains[J]. Journal of Software, 2019, 30(6):1649-1660.  10.13328/j.cnki.jos.005741 
											 											 | 
										
																													
																						| 5 | 
																						 
											 LI D W, LIU J W, TANG Z X, et al. AgentChain: a decentralized cross‑chain exchange system[C]// Proceedings of the 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/ 13th IEEE International Conference on Big Data Science and Engineering. Piscataway: IEEE, 2019: 491-498.  10.1109/trustcom/bigdatase.2019.00072 
											 											 | 
										
																													
																						| 6 | 
																						 
											 FUJIMOTO S, HIGASHIKADO Y, TAKEUCHI T. Connectionchain: the secure interworking of blockchains[C]// Proceedings of the 6th International Conference on Internet of Things: Systems, Management and Security. Piscataway: IEEE, 2019:514-518.  10.1109/iotsms48152.2019.8939267 
											 											 | 
										
																													
																						| 7 | 
																						 
											 张诗童,秦波,郑海彬. 基于哈希锁定的多方跨链协议研究[J]. 网络空间安全, 2018, 9(11): 57-62, 67.  10.3969/j.issn.1674-9456.2018.11.011 
											 											 | 
										
																													
																						 | 
																						 
											 ZHANG S T, QIN B, ZHENG H B. Research on the protocol of multiple cross‑chains based on the hash lock[J]. Cyberspace Security, 2018, 9(11): 57-62, 67.  10.3969/j.issn.1674-9456.2018.11.011 
											 											 | 
										
																													
																						| 8 | 
																						 
											 魏昂. 一种改进的区块链跨链技术[J]. 网络空间安全, 2019, 10(6): 40-45.
											 											 | 
										
																													
																						 | 
																						 
											 WEI A. An improved cross‑chain technology of blockchain[J]. Cyberspace Security, 2019, 10(6): 40-45.
											 											 | 
										
																													
																						| 9 | 
																						 
											 LIND J, NAOR O, EYAL I, et al. Teechain: a secure payment network with asynchronous blockchain access[C]// Proceedings of the 27th ACM Symposium on Operating Systems Principles. New York: ACM, 2019:63-79.  10.1145/3341301.3359627 
											 											 | 
										
																													
																						| 10 | 
																						 
											 孙国梓,王纪涛,谷宇. 区块链技术安全威胁分析[J]. 南京邮电大学学报(自然科学版), 2019, 39(5):48-62.  10.14132/j.cnki.1673-5439.2019.05.008 
											 											 | 
										
																													
																						 | 
																						 
											 SUN G Z, WANG J T, GU Y. Security threat analysis of blockchain technology[J]. Journal of Nanjing University of Posts and Telecommunications (Natural Science Edition), 2019, 39(5):48-62.  10.14132/j.cnki.1673-5439.2019.05.008 
											 											 | 
										
																													
																						| 11 | 
																						 
											 赵涛,张凌浩,赵其刚,等. 基于聚类簇中心的共识跨链交换模型[J]. 计算机科学, 2019, 46(11A):557-561, 566.
											 											 | 
										
																													
																						 | 
																						 
											 ZHAO T, ZHANG L H, ZHAO Q G, et al. Across block chain consensus transaction model based on cluster center[J]. Computer Science, 2019, 46(11A):557-561, 566.
											 											 | 
										
																													
																						| 12 | 
																						 
											 MERKLE R C. Protocols for public key cryptosystems[C]// Proceedings of the 1980 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 1980: 122-136.  10.1109/sp.1980.10006 
											 											 | 
										
																													
																						| 13 | 
																						 
											 HE Y C, ZHU X Y, XU F F, et al. A novel cross‑chain mechanism for blockchains[C]// Proceedings of the 2018 International Conference on Smart Blockchain, LNCS 11373. Cham: Springer, 2018:139-148.
											 											 | 
										
																													
																						| 14 | 
																						 
											 徐卓嫣,周轩. 跨链技术发展综述[J]. 计算机应用研究, 2021, 38(2):341-346.  10.19734/j.issn.1001-3695.2020.01.0025 
											 											 | 
										
																													
																						 | 
																						 
											 XU Z Y, ZHOU X. Survey on crosschain technology[J]. Application Research of Computers, 2021, 38(2):341-346.  10.19734/j.issn.1001-3695.2020.01.0025 
											 											 | 
										
																													
																						| 15 | 
																						 
											 戴炳荣,姜胜明,李顿伟,等. 基于改进PageRank算法的跨链公证人机制评价模型[J]. 计算机工程, 2021, 47(2):26-31.
											 											 | 
										
																													
																						 | 
																						 
											 DAI B R, JIANG S M, LI D W, et al. Evaluation model of cross‑chain notary mechanism based on improved PageRank algorithm[J]. Computer Engineering, 2021, 47(2):26-31.
											 											 | 
										
																													
																						| 16 | 
																						 
											 ZHAO C, ZHAO S N, ZHAO M H, et al. Secure multi‑party computation: theory, practice and applications[J]. Information Sciences, 2019, 476:357-372.  10.1016/j.ins.2018.10.024 
											 											 | 
										
																													
																						| 17 | 
																						 
											 YAN S, LIU C C, WANG M Q, et al. Promoting data circulation by secure multi‑party computation and blockchain[C]// Proceedings of 2018 International Conference on Computer, Electronic Information and Communications. Lancaster, PA: DEStech Publications, Inc., 2018:160-163.  10.12783/dtcse/ceic2018/24542 
											 											 | 
										
																													
																						| 18 | 
																						 
											 GAO C Z, CHENG Q, HE P, et al. Privacy‑preserving Naive Bayes classifiers secure against the substitution‑then‑comparison attack[J]. Information Sciences, 2018, 444:72-88.  10.1016/j.ins.2018.02.058 
											 											 | 
										
																													
																						| 19 | 
																						 
											 ZHOU J P, FENG Y X, WANG Z Y, et al. Using secure multi‑party computation to protect privacy on a permissioned blockchain[J]. Sensors, 2021, 21(4): No.1540.  10.3390/s21041540 
											 											 | 
										
																													
																						| 20 | 
																						 
											 LI D, LIAO X F, XIANG T, et al. Privacy‑preserving self‑ serviced medical diagnosis scheme based on secure multi‑party computation[J]. Computers and Security, 2020, 90: No.101701.  10.1016/j.cose.2019.101701 
											 											 | 
										
																													
																						| 21 | 
																						 
											 佘维,杨晓宇,胡跃,等. 基于联盟区块链的分布式能源交易认证模型[J]. 中国科学技术大学学报, 2018, 48(4):307-313.  10.3969/j.issn.0253-2778.2018.04.006 
											 											 | 
										
																													
																						 | 
																						 
											 SHE W, YANG X Y, HU Y, et al. Transaction certification model of distributed energy based on consortium blockchain[J]. Journal of University of Science and Technology of China, 2018, 48(4):307-313.  10.3969/j.issn.0253-2778.2018.04.006 
											 											 | 
										
																													
																						| 22 | 
																						 
											 GIFFORD D K. Weighted voting for replicated data[C]// Proceedings of the 7th ACM Symposium on Operating Systems Principles. New York: ACM, 1979: 150-162.  10.1145/800215.806583 
											 											 | 
										
																													
																						| 23 | 
																						 
											 刘桂华. 基于公证人组的区块链跨链机制[D]. 重庆:重庆邮电大学, 2020.
											 											 | 
										
																													
																						 | 
																						 
											 LIU G H. The cross‑chain mechanism of blockchain based on notary group[D]. Chongqing: Chongqing University of Posts and Telecommunications), 2020.
											 											 | 
										
																													
																						| 24 | 
																						 
											 蒋楚钰,方李西,朱建明. 基于PageRank改进的公证人节点信用排序算法[J]. 信息安全研究, 2022, 8(1):9-18.
											 											 | 
										
																													
																						 | 
																						 
											 JIANG C Y, FANG L X, ZHU J M. A credit ranking method of notary mechanism based on improved PageRank algorithm[J]. Journal of Information Security Research, 2022, 8(1):9-18.
											 											 |