[1] 陈纯. 自主可控联盟链的技术难点和案例[N]. 中国信息化周报,2017-10-23(7).(CHEN C. Technical difficulties and cases of autonomous controllable alliance chain[N]. China Information Weekly,2017-10-23(7).) [2] 汪朝晖, 张振峰. SM2椭圆曲线公钥密码算法综述[J]. 信息安全研究,2016,2(11):972-982.(WANG Z H,ZHANG Z F. Overview on public key cryptographic algorithm SM2 based on elliptic curves[J]. Information Security Research,2016,2(11):972-982.) [3] 刘懿中, 刘建伟, 张宗洋, 等. 区块链共识机制研究综述[J]. 密码学报,2019,6(4):395-432.(LIU Y Z,LIU J W,ZHANG Z Y, et al. Overview on blockchain consensus mechanisms[J]. Journal of Cryptologic Research,2019,6(4):395-432.) [4] 甘俊, 李强, 陈子豪, 等. 区块链实用拜占庭容错共识算法的改进[J]. 计算机应用,2019,39(7):2148-2155.(GAN J,LI Q, CHEN Z H,et al. Improvement of blockchain practical Byzantine fault tolerant consensus algorithm[J]. Journal of Computer Applications,2019,39(7):2148-2155.) [5] 苏吟雪, 田海博. 基于SM2的双方共同签名协议及其应用[J]. 计算机学报,2020,43(4):701-710.(SU Y X,TIAN H B. A twoparty SM2 signing protocol and its application[J]. Chinese Journal of Computers,2020,43(4):701-710.) [6] 侯红霞, 杨波, 张丽娜, 等. 安全的两方协作SM2签名算法[J]. 电子学报,2020,48(1):1-8.(HOU H X,YANG B,ZHANG L N,et al. Secure two-party SM2 signature algorithm[J]. Acta Electronica Sinica,2020,48(1):1-8.) [7] 兰修文. ECC计算算法的优化及其在SM2实现中的运用[D]. 成都:电子科技大学,2019. (LAN X W. Optimization of ECC calculation algorithm and its application in SM2 realization[D]. Chengdu:University of Electronic Science and Technology of China,2019.) [8] 肖帅, 王绪安, 潘峰. 无模逆运算的椭圆曲线数字签名算法[J]. 计算机工程与应用,2020,56(11):118-123.(XIAO S,WANG X A, PAN F. Elliptic curve digital signature algorithm without modular inverse operation[J]. Computer Engineering and Applications,2020,56(11):118-123.) [9] 韩嗣诚, 朱晓荣, 张秀贤. 优化可扩展的拜占庭容错共识算法[J]. 物联网学报,2020,4(2):18-25.(HAN S C,ZHU X R, ZHANG X X. Optimized scalable Byzantine fault tolerance algorithm[J]. Chinese Journal of the Internet of Things,2020,4(2):18-25.) [10] POTLAPALLY N R,RAVI S,RAGHUNATHAN A,et al. A study of the energy consumption characteristics of cryptographic algorithms and security protocols[J]. IEEE Transactions on Mobile Computing,2006,5(2):128-143. [11] SEO J H. Efficient digital signatures from RSA without random oracles[J]. Information Sciences,2020,512:471-480. [12] 吴邱涵, 胡卫. 基于SM2算法和区块链的移动端身份认证协议设计[J]. 网络与信息安全学报,2018,4(9):60-65.(WU Q H, HU W. Design of identity authentication agreement in mobile terminal based on SM2 algorithm and blockchain[J]. Chinese Journal of Network and Information Security,2018,4(9):60-65.) [13] FENG Q,HE D,LIU Z,et al. Distributed signing protocol for IEEE P1363-compliant identity-based signature scheme[J]. IET Information Security,2020,14(4):443-451. [14] TAHAT N,ALOMARI A K,AL-HAZAIMEH O M,et al. An efficient self-certified multi-proxy signature scheme based on elliptic curve discrete logarithm problem[J]. Journal of Discrete Mathematical Sciences and Cryptography,2020,23(4):935-948. [15] 宋琪杰, 陈铁明, 陈园, 等. 面向物联网区块链的共识机制优化研究[J]. 电信科学,2020,36(2):1-12.(AN Q J,CHEN T M, CHEN Y,et al. Research on consensus mechanism optimization for IoT blockchain[J]. Telecommunications Science,2020,36(2):1-12.) |