| [1] |
NAKAMOTO S. Bitcoin: a peer-to-peer electronic cash system [EB/OL]. [2024-05-07]. .
|
| [2] |
ZHANG Y, ZHENG D, DENG R H. Security and privacy in smart health: efficient policy-hiding attribute-based access control[J]. IEEE Internet of Things Journal, 2018, 5(3): 2130-2145.
|
| [3] |
ZHANG Y, LIU X. An attribute-based cross-domain access control model for a distributed multiple autonomous network[J]. International Journal of Software Engineering and Knowledge Engineering, 2020, 30(11/12): 1851-1865.
|
| [4] |
SUN S, DU R, CHEN S, et al. Blockchain-based IoT access control system: towards security, lightweight, and cross-domain[J]. IEEE Access, 2021, 9: 36868-36878.
|
| [5] |
FENG C, LIU B, GUO Z, et al. Blockchain-based cross-domain authentication for intelligent 5G-enabled internet of drones[J]. IEEE Internet of Things Journal, 2022, 9(8): 6224-6238.
|
| [6] |
HAO X, REN W, FEI Y, et al. A blockchain-based cross-domain and autonomous access control scheme for internet of things[J]. IEEE Transactions on Services Computing, 2023, 16(2): 773-786.
|
| [7] |
CHANG J, NI J, XIAO J, et al. SynergyChain: a multichain-based data-sharing framework with hierarchical access control[J]. IEEE Internet of Things Journal, 2022, 9(16): 14767-14778.
|
| [8] |
HUANG M, YUAN L, PAN X, et al. Trusted edge and cross-domain privacy enhancement model under multi-blockchain[J]. Computer Networks, 2023, 234: No.109881.
|
| [9] |
TAN M, WANG X, SHANG S, et al. Blockchain-based cross-domain access control mechanism[C]// Proceedings of the 2022 5th International Conference on Information Communication and Signal Processing. Piscataway: IEEE, 2022: 499-506.
|
| [10] |
CUI J, DUAN L, NI W, et al. Secure cross-domain medical data sharing based on distributed cloud and blockchain services[C]// Proceedings of the 2023 IEEE International Conference on Web Services. Piscataway: IEEE, 2023: 698-700.
|
| [11] |
WANG S, WANG X, ZHANG Y. A secure cloud storage framework with access control based on blockchain[J]. IEEE Access, 2019, 7: 112713-112725.
|
| [12] |
BA Y, HU X, CHEN Y, et al. A blockchain-based CP-ABE scheme with partially hidden access structures[J]. Security and Communication Networks, 2021, 2021: 1-16.
|
| [13] |
ZHANG Z, ZHANG J, YUAN Y, et al. An expressive fully policy-hidden ciphertext policy attribute-based encryption scheme with credible verification based on blockchain[J]. IEEE Internet of Things Journal, 2022, 9(11): 8681-8692.
|
| [14] |
WANG M, GUO Y, ZHANG C, et al. MedShare: a privacy-preserving medical data sharing system by using blockchain[J]. IEEE Transactions on Services Computing, 2023, 16(1): 438-451.
|
| [15] |
LI M, CHEN Y, LAL C, et al. Eunomia: anonymous and secure vehicular digital forensics based on blockchain[J]. IEEE Transactions on Dependable and Secure Computing, 2023, 20(1): 225-241.
|
| [16] |
GAO S, PIAO G, ZHU J, et al. TrustAccess: a trustworthy secure ciphertext-policy and attribute hiding access control scheme based on blockchain[J]. IEEE Transactions on Vehicular Technology, 2020, 69(6): 5784-5798.
|
| [17] |
YANG K, YANG B, ZHOU Y, et al. Privacy protection of task in crowdsourcing: policy-hiding and attribute updating attribute-based access control based on blockchain[J]. Wireless Communications and Mobile Computing, 2022, 2022: No.7787866.
|
| [18] |
WU N, XU L, ZHU L. A blockchain based access control scheme with hidden policy and attribute[J]. Future Generation Computer Systems, 2023, 141: 186-196.
|
| [19] |
SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612-613.
|
| [20] |
唐飞,凌国玮,单进勇.基于国密SM2和SM9的加法同态加密方案[J].密码学报,2022,9(3):535-549.
|
|
TANG F, LING G W, SHAN J Y. Additive homomorphic encryption schemes based on SM2 and SM9[J]. Journal of Cryptologic Research, 2022, 9(3): 535-549.
|
| [21] |
SHANKS D. Class number, a theory of factorization, and genera[J]. Proceedings of Symposia of Pure Mathematics, 1971, 20: 415-440.
|
| [22] |
State Cryptography Administration. Public key cryptographic algorithm SM2 based on elliptic curves — Part 4: public key encryption: GM/T 0003.4-2012 [S/OL]. [2024-03-12]..
|
| [23] |
BUTERIN V. Chain interoperability[R/OL]. [2024-02-01]..
|
| [24] |
ONGARO D, OUSTERHOUT J. In search of an understandable consensus algorithm[C]// Proceedings of the 2014 USENIX Annual Technical Conference. Berkeley: USENIX Association, 2014: 305-319.
|
| [25] |
DESMEDT Y G. Threshold cryptography[J]. European Transactions on Telecommunications, 1994, 5(4): 449-458.
|
| [26] |
LIU X, DENG R H, K-KR CHOO, et al. An efficient privacy-preserving outsourced calculation toolkit with multiple keys[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(11): 2401-2414.
|
| [27] |
WU J, BU X, LI G, et al. Data privacy protection model based on blockchain in mobile edge computing[J]. Software: Practice and Experience, 2024, 54(9): 1671-1696.
|
| [28] |
XU S, ZHONG J, WANG L, et al. A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mHealth[J]. Connection Science, 2023, 35(1): No.2186316.
|