| 1 | TAMERSOY A, LOUKIDES G, NERGIZ M E, et al. Anonymization of longitudinal electronic medical records[J]. IEEE Transactions on Information Technology in Biomedicine, 2012, 16(3): 413-423.  10.1109/titb.2012.2185850 | 
																													
																						| 2 | OHNO-MACHADO L. Sharing data from electronic health records within, across, and beyond healthcare institutions: current trends and perspectives[J]. Journal of the American Medical Informatics Association, 2018, 25(9): 1113-1113.  10.1093/jamia/ocy116 | 
																													
																						| 3 | LIU J, LI X, YE L, et al. BPDS: A blockchain based privacy-preserving data sharing for electronic medical records[C]// Proceedings of the 2018 IEEE Global Communications Conference. Piscataway: IEEE, 2018: 1-6.  10.1109/glocom.2018.8647713 | 
																													
																						| 4 | LIN C, HE D, HUANG X, et al. BSeIn: a blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0[J]. Journal of Network and Computer Applications, 2018, 116: 42-52.  10.1016/j.jnca.2018.05.005 | 
																													
																						| 5 | 祝烈煌,高峰,沈蒙,等. 区块链隐私保护研究综述[J]. 计算机研究与发展,2017, 54(10): 2170-2186.  10.7544/issn1000-1239.2017.20170471 | 
																													
																						|  | ZHU L H, GAO F, SHEN M, et al. Survey and privacy preserving techniques for blockchain technology[J]. Journal of Computer Research and Development, 2017, 54(10): 2170-2186.  10.7544/issn1000-1239.2017.20170471 | 
																													
																						| 6 | DUBOVITSKAYA A, XU Z, RYU S, et al. Secure and trustable electronic medical records sharing using blockchain[C]// Proceedings of the 2017 American Medical Informatics Association Annual Symposium. Washington, DC: AMIA Publications, 2017: 650.  10.4414/smi.33.00400 | 
																													
																						| 7 | USMAN M, QAMAR U. Secure electronic medical records storage and sharing using blockchain technology[J]. Procedia Computer Science, 2020, 174: 321-327.  10.1016/j.procs.2020.06.093 | 
																													
																						| 8 | AZARIA A, EKBLAW A, VIEIRA T, et al. MedRec: using blockchain for medical data access and permission management[C]// Proceedings of the 2nd International Conference on Open and Big Data. Washington, DC: IEEE Computer Society, 2016: 25-30.  10.1109/obd.2016.11 | 
																													
																						| 9 | YUE X, WANG H, JIN D, et al. Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control[J]. Journal of Medical Systems, 2016, 40(10): 1-8.  10.1007/s10916-016-0574-6 | 
																													
																						| 10 | BAEK J, SAFAVI-NAINI R, SUSILO W. Universal designated verifier signature proof (or how to efficiently prove knowledge of a signature)[C]// Proceedings of the 11th International Conference on the Theory and Application of Cryptology and Information Security, LNSC 3788. Berlin: Springer, 2005: 644-661. | 
																													
																						| 11 | CHEN X, CHEN G, ZHANG F, et al. Identity-based universal designated verifier signature proof system[J]. International Journal of Network Security, 2009, 8(1): 52-58. | 
																													
																						| 12 | ABBASINEZHAD-MOOD D, NIKOOGHADAM M. An anonymous ecc-based self-certified key distribution scheme for the smart grid[J]. IEEE Transactions on Industrial Electronics, 2018, 65(10): 7996-8004.  10.1109/tie.2018.2807383 | 
																													
																						| 13 | STEINFELD R, BULL L, WANG H, et al. Universal designated-verifier signatures[C]// Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security, LNCS 2894. Berlin: Springer, 2003: 523-542. | 
																													
																						| 14 | ZHANG R, FURUKAWA J, IMAI H. Short signature and universal designated verifier signature without random oracles[C]// Proceedings of the 3rd International Conference on Applied Cryptography and Network Security, LNSC 3531. Cham: Springer, 2005: 483-498. | 
																													
																						| 15 | HUANG X, SUSILO W, MU Y, et al. Secure universal designated verifier signature without random oracles[J]. International Journal of Information Security, 2008, 7(3): 171-183.  10.1007/s10207-007-0021-2 | 
																													
																						| 16 | LIN H Y. Secure universal designated verifier signature and its variant for privacy protection[J]. Information Technology and Control, 2013, 42(3): 268-276.  10.5755/j01.itc.42.3.3532 | 
																													
																						| 17 | RASTEGARI P, BERENJKOUB M, DAKHILALIAN M, et al. Universal designated verifier signature scheme with non-delegatability in the standard model[J]. Information Sciences, 2019, 479: 321-334.  10.1016/j.ins.2018.12.020 | 
																													
																						| 18 | SEO S H, HWANG J Y, CHOI K Y, et al. Identity-based universal designated multi-verifiers signature schemes[J]. Computer Standards & Interfaces, 2008, 30(5): 288-295.  10.1016/j.csi.2007.08.020 | 
																													
																						| 19 | CAO F, CAO Z. An identity based universal designated verifier signature scheme secure in the standard model[J]. Journal of Systems and Software, 2009, 82(4): 643-649.  10.1016/j.jss.2008.09.001 | 
																													
																						| 20 | CHANG T Y. An ID-based multi-signer universal designated multi-verifier signature scheme[J]. Information and Computation, 2011, 209(7): 1007-1015.  10.1016/j.ic.2011.03.002 | 
																													
																						| 21 | HOU S, HUANG X, LIU J K, et al. Universal designated verifier transitive signatures for graph-based big data[J]. Information Sciences, 2015, 318: 144-156.  10.1016/j.ins.2015.02.033 | 
																													
																						| 22 | LIN C, WU W, HUANG X, et al. A new universal designated verifier transitive signature scheme for big graph data[J]. Journal of Computer and System Sciences, 2017, 83(1): 73-83.  10.1016/j.jcss.2016.06.003 | 
																													
																						| 23 | WANG M, ZHANG Y, Ma J, et al. A universal designated multi verifiers content extraction signature scheme[J]. International Journal of Computational Science and Engineering, 2020, 21(1): 49-59.  10.1504/ijcse.2020.10026865 | 
																													
																						| 24 | METTLER M. Blockchain technology in healthcare: the revolution starts here[C]// Proceedings of the 18th International Conference on E-health Networking, Applications and Services. Piscataway: IEEE, 2016: 1-3.  10.1109/healthcom.2016.7749510 | 
																													
																						| 25 | ROEHRS A, COSTA C A DA, ROSA RIGHI R DA. OmniPHR: a distributed architecture model to integrate personal health records[J]. Journal of Biomedical Informatics, 2017, 71: 70-81.  10.1016/j.jbi.2017.05.012 | 
																													
																						| 26 | 薛腾飞,傅群超,王枞,等. 基于区块链的医疗数据共享模型研究[J]. 自动化学报,2017, 43(9): 1555-1562.  10.16383/j.aas.2017.c160661 | 
																													
																						|  | XUE T F, FU Q C, WANG C, et al. A medical data sharing model via blockchain[J]. Acta Automatica Sinica, 2017, 43(9): 1555-1562.  10.16383/j.aas.2017.c160661 | 
																													
																						| 27 | WU S, DU J. Electronic medical record security sharing model based on blockchain[C]// Proceedings of the 3rd International Conference on Cryptography, Security and Privacy. New York: ACM, 2019: 13-17.  10.1145/3309074.3309079 | 
																													
																						| 28 | LI L, YUE Z, WU G. Electronic medical record sharing system based on hyperledger fabric and interplanetary file system[C]// Proceedings of the 5th International Conference on Compute and Data Analysis. New York: ACM, 2021: 149-154.  10.1145/3456529.3456555 | 
																													
																						| 29 | ZHANG Z, YANG K, ZHANG J, et al. Security of the SM2 signature scheme against generalized key substitution attacks[C]// Proceedings of the 2nd International Conference on Research in Security Standardisation, LNSC 9497. Cham: Springer, 2015: 140-153. |