| 1 | BEN-SASSON E, CHIESA A, GARMAN C, et al. Zerocash: decentralized anonymous payments from bitcoin[C]// Proceedings of the 2014 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2014: 459-474.  10.1109/sp.2014.36 | 
																													
																						| 2 | 杨亚涛,蔡居良,张筱薇,等. 基于SM9算法可证明安全的区块链隐私保护方案[J]. 软件学报, 2019, 30(6):1692-1704. | 
																													
																						|  | YANG Y T, CAI J L, ZHANG X W, et al. Privacy preserving scheme in block chain with provably secure based on SM9 algorithm[J]. Journal of Software, 2019, 30(6):1692-1704. | 
																													
																						| 3 | 高峰,毛洪亮,吴震,等. 轻量级比特币交易溯源机制[J]. 计算机学报, 2018, 41(5):989-1004.  10.11897/SP.J.1016.2018.00989� | 
																													
																						|  | GAO F, MAO H L, WU Z, et al. Lightweight transaction tracing technology for bitcoin[J]. Chinese Journal of Computers, 2018, 41(5):989-1004.  10.11897/SP.J.1016.2018.00989� | 
																													
																						| 4 | 魏松杰,李莎莎,王佳贺. 基于身份密码系统和区块链的跨域认证协议[J]. 计算机学报, 2021, 44(5):908-920.  10.11897/SP.J.1016.2021.00908 | 
																													
																						|  | WEI S J, LI S S, WANG J H. A cross-domain authentication protocol by identity-based cryptography on consortium blockchain[J]. Chinese Journal of Computers, 2021, 44(5):908-920.  10.11897/SP.J.1016.2021.00908 | 
																													
																						| 5 | LI Y N, YANG G M, SUSILO W, et al. Traceable Monero: anonymous cryptocurrency with enhanced accountability[J]. IEEE Transactions on Dependable and Secure Computing, 2021, 18(2):679-691.  10.1109/tdsc.2019.2910058 | 
																													
																						| 6 | GIRAULT M. Self-certified public keys[C]// Proceedings of the 1991 Workshop on the Theory and Application of Cryptographic Techniques, LNCS 547. Berlin: Springer, 1991: 490-497. | 
																													
																						| 7 | AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[C]// Proceedings of the 2003 International Conference on the Theory and Application of Cryptology and Information Security, LNCS 2894. Berlin: Springer, 2003:452-473. | 
																													
																						| 8 | 魏爽,江荣旺. 一种无证书签名方案的分析和改进[J]. 软件, 2021, 42(1):29-31, 58.  10.3969/j.issn.1003-6970.2021.01.009 | 
																													
																						|  | WEI S, JIANG R W. Analysis and improvement of a certificateless signature scheme[J]. Computer Engineering and Software, 2021, 42(1):29-31, 58.  10.3969/j.issn.1003-6970.2021.01.009 | 
																													
																						| 9 | 程朝辉. 基于SM2的无证书加密算法[J]. 密码学报, 2021, 8(1): 87-95. | 
																													
																						|  | CHENG Z H. Certificateless public key encryption based on SM2[J]. Journal of Cryptologic Research, 2021, 8(1): 87-95. | 
																													
																						| 10 | CHENG Z H, CHEN L Q. Certificateless public key signature schemes from standard algorithms[C]// Proceedings of the 2018 International Conference on Information Security Practice and Experience, LNCS 11125. Cham: Springer, 2018: 179-197. | 
																													
																						| 11 | 侯红霞,杨波,张丽娜,等. 安全的两方协作SM2签名算法[J]. 电子学报, 2020, 48(1):1-8.  10.3969/j.issn.0372-2112.2020.01.001 | 
																													
																						|  | HOU H X, YANG B, ZHANG L N, et al. Secure two-party SM2 signature algorithm[J]. Acta Electronica Sinica, 2020, 48(1):1-8.  10.3969/j.issn.0372-2112.2020.01.001 | 
																													
																						| 12 | CHEN Y, ZHAO Y, XIONG H, et al. A certificateless strong designated verifier signature scheme with non-delegatability[J]. International Journal of Network Security, 2017, 19(4): 573-582. | 
																													
																						| 13 | 杨龙海,王学渊,蒋和松. 改进SM2签名方法的区块链数字签名方案[J]. 计算机应用, 2021, 41(7):1983-1988. | 
																													
																						|  | YANG L H, WANG X Y, JIANG H S. Blockchain digital signature scheme with improved SM2 signature method[J]. Journal of Computer Applications, 2021, 41(7):1983-1988. | 
																													
																						| 14 | SHAMIR A. Identity-based cryptosystems and signature schemes[C]// Proceedings of the 1984 Workshop on the Theory and Application of Cryptographic Techniques, LNCS 196. Berlin: Springer, 1985: 47-53. | 
																													
																						| 15 | BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing[C]// Proceedings of the 2001 Annual International Cryptology Conference, LNCS 2139. Berlin: Springer, 2001: 213-229. | 
																													
																						| 16 | SAKAI R, OHGISHI K, KASAHARA M. Cryptosystems based on pairing[C]// Proceedings of the 2000 Symposium on Cryptography and Information Security. Okinawa: [s.n.], 2000:26-28. | 
																													
																						| 17 | CHOON J C, CHEON J H. An identity-based signature from gap Diffie-Hellman groups[C]// Proceedings of the 2003 International Workshop on Public Key Cryptography, LNCS 2567. Berlin: Springer, 2003: 18-30. | 
																													
																						| 18 | LIN C Y, WU T C, ZHANG F G. A structured multisignature scheme from the gap Diffie-Hellman group[EB/OL]. [2020-08-10].. | 
																													
																						| 19 | BARRETO P S L M, NAEHRIG M. Pairing-friendly elliptic curves of prime order[C]// Proceedings of the 2005 International Workshop on Selected Areas in Cryptography, LNCS 3897. Berlin: Springer, 2006: 319-331. | 
																													
																						| 20 | 李艳琼,李继国,张亦辰. 标准模型下安全的无证书签名方案[J]. 通信学报, 2015, 36(4):186-194.  10.11959/j.issn.1000-436x.2015098 | 
																													
																						|  | LI Y Q, LI J G, ZHANG Y C. Certificateless signature scheme without random oracles[J]. Journal on Communications, 2015, 36(4): 186-194.  10.11959/j.issn.1000-436x.2015098 |