[1] 姚建国, 高志远, 杨胜春. 能源互联网的认识和展望[J]. 电力系统自动化,2015,39(23):9-14.(YAO J G,GAO Z Y,YANG S C. Understanding and prospects of Energy Internet[J]. Automation of Electric Power Systems,2015,39(23):9-14.) [2] 郭庆来,王博弘,田年丰, 等. 能源互联网数据交易:架构与关键技术[J]. 电工技术学报,2020,35(11):2285-2295.(GUO Q L, WANG B H, TIAN N F, et al. Data transactions in Energy Internet:architecture and key technologies[J]. Transactions of China Electrotechnical Society,2020,35(11):2285-2295.) [3] 刘世成,张东霞,朱朝阳, 等. 能源互联网中大数据技术思考[J]. 电力系统自动化,2016,40(8):14-21,56.(LIU S C, ZHANG D X,ZHU C Y,et al. A view on big data in Energy Internet[J]. Automation of Electric Power Systems,2016,40(8):14-21,56.) [4] 赵曰浩,彭克,徐丙垠, 等. 能源区块链应用工程现状与展望[J]. 电力系统自动化,2019,43(7):14-22,58.(ZHAO Y H, PENG K,XU B Y,et al. Status and prospect of pilot project of energy blockchain[J]. Automation of Electric Power Systems, 2019,43(7):14-22,58.) [5] LIANG Y H,LI Y,SHIN B S. FairCs-Blockchain-based fair crowdsensing scheme using trusted execution environment[J]. Sensors,2020,20(11):No. 3172. [6] LU Y L,HUANG X H,DAI Y Y,et al. Blockchain and federated learning for privacy-preserved data sharing in industrial IoT[J]. IEEE Transactions on Industrial Informatics,2020,16(6):4177-4186. [7] LYU Q Y, QI Y Z, ZHANG X C, et al. SBAC:a secure blockchain-based access control framework for information-centric networking[J]. Journal of Network and Computer Applications, 2020,149:No. 102444. [8] THWIN T T, VASUPONGAYYA S. Blockchain-based access control model to preserve privacy for personal health record systems[J]. Security and Communication Networks, 2019, 2019:No. 8315614. [9] YANG X D,LI T,PEI X Z,et al. Medical data sharing scheme based on attribute cryptosystem and blockchain technology[J]. IEEE Access,2020,8:45468-45476. [10] NIU J,LI X L,GAO J T,et al. Blockchain-based anti-keyleakage key aggregation searchable encryption for IoT[J]. IEEE Internet of Things Journal,2020,7(2):1502-1518. [11] SULTANA T,ALMOGREN A,AKBAR M,et al. Data sharing system integrating access control mechanism using blockchainbased smart contracts for IoT devices[J]. Applied Sciences, 2020,10(2):No. 488. [12] 杨艳,陈性元,杜学绘. 多机构身份及属性加密机制综述[J]通信学报,2018,39(10):118-129.(YANG Y,CHEN X Y,DU X H. Survey of multi-authority identity-based and attribute-based encryption scheme[J]. Journal on Communications,2018,39(10):118-129.) [13] 范运东,吴晓平. 基于策略隐藏属性加密的云存储访问控制方案[J]. 计算机工程,2018,44(7):139-144,149.(FAN Y D, WU X P. Cloud storage access control scheme based on policy hiding attribute encryption[J]. Computer Engineering,2018,44(7):139-144,149.) [14] SAHAI A,WATERS B. Fuzzy identity-based encryption[C]//Proceedings of the 2005 Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 3494. Berlin:Springer,2005:457-473. [15] BETHENCOURT J,SAHAI A,WATERS B. Ciphertext-policy attribute-based encryption[C]//Proceedings of the 2007 IEEE Symposium on Security and Privacy. Piscataway:IEEE,2007:321-334. [16] LEWKO A, WATERS B. Decentralizing attribute-based encryption[C]//Proceedings of the 2011 Annual International Conference on the Theory and Applications of Cryptographic Techniques,LNCS 6632. Berlin:Springer,2011:568-588. [17] ZHANG X,WU F G,YAO W,et al. Multi-authority attributebased encryption scheme with constant-size ciphertexts and user revocation[J]. Concurrency and Computation:Practice and Experience,2019,31(21):No. e4678. [18] ZHANG L Y,REN J,MU Y,et al. Privacy-preserving multiauthority attribute-based data sharing framework for smart grid[J]. IEEE Access,2020,8:23294-23307. [19] BANERJEE S,ROY S,ODELU V,et al. Multi-authority CPABE-based user access control scheme with constant-size key and ciphertext for IoT deployment[J]. Journal of Information Security and Applications,2020,53:No. 102503. [20] 邵奇峰,金澈清,张召, 等. 区块链技术:架构及进展[J]. 计算机学报,2018,41(5):969-988.(SHAO Q F,JIN C Q,ZHANG Z,et al. Blockchain:architecture and research progress[J]. Chinese Journal of Computers,2018,41(5):969-988.) [21] 李燕,马海英,王占君. 区块链关键技术的研究进展[J]. 计算机工程与应用,2019,55(20):13-23,100.(LI Y,MA H Y, WANG Z J. Research progress on key technologies of blockchain[J]. Computer Engineering and Applications,2019,55(20):13-23,100.) [22] 郭朝,郭帅印,张胜利, 等. 区块链跨链技术分析[J]. 物联网学报,2020,4(2):35-48.(GUO Z,GUO S Y,ZHANG S L, et al. Analysis of cross-chain technology of blockchain[J]. Chinese Journal on Internet of Things,2020,4(2):35-48.) [23] 李芳,李卓然,赵赫. 区块链跨链技术进展研究[J]. 软件学报,2019,30(6):1649-1660. (LI F,LI Z R,ZHAO H. Research on the progress in cross-chain technology of blockchains[J]. Journal of Software,2019,30(6):1649-1660.) [24] YANG K,JIA X H. Attribute-based access control for multiauthority system in cloud storage[C]//Proceedings of the IEEE 32nd International Conference on Distributed Computing Systems. Piscataway:IEEE,2012:536-545. |