[1] |
Baoyan SONG, Junxiang DING, Junlu WANG, Haolin ZHANG.
Consortium blockchain modification method based on chameleon hash and verifiable secret sharing
[J]. Journal of Computer Applications, 2024, 44(7): 2087-2092.
|
[2] |
Na ZHOU, Ming CHENG, Menglin JIA, Yang YANG.
Medical image privacy protection based on thumbnail encryption and distributed storage
[J]. Journal of Computer Applications, 2023, 43(10): 3149-3155.
|
[3] |
Chunming TANG, Yuqing CHEN, Zidi ZHANG.
Improved consensus algorithm based on binomial swap forest and HotStuff
[J]. Journal of Computer Applications, 2022, 42(7): 2112-2117.
|
[4] |
Wenyong YUAN, Xiuguang LI, Ruifeng LI, Zhengge YI, Xiaoyuan YANG.
Trusted integrity verification scheme of cloud data without bilinear pairings
[J]. Journal of Computer Applications, 2022, 42(12): 3769-3774.
|
[5] |
Xiaoqiong PANG, Ting YANG, Wenjun CHEN, Yunting WANG, Tianye LIU.
Digital rights management scheme based on secret sharing in blockchain environment
[J]. Journal of Computer Applications, 2021, 41(11): 3257-3265.
|
[6] |
WANG Yunye, CHENG Yage, JIA Zhijuan, FU Junjun, YANG Yanyan, HE Yuchu, MA Wei.
Auditable signature scheme for blockchain based on secure multi-party
[J]. Journal of Computer Applications, 2020, 40(9): 2639-2645.
|
[7] |
LI Jing, JING Xu, YANG Huijun.
Blockchain electronic counting scheme based on practical Byzantine fault tolerance algorithm
[J]. Journal of Computer Applications, 2020, 40(4): 954-960.
|
[8] |
CHENG Yage, JIA Zhijuan, HU Mingsheng, GONG Bei, WANG Lipeng.
Threshold signature scheme suitable for blockchain electronic voting scenes
[J]. Journal of Computer Applications, 2019, 39(9): 2629-2635.
|
[9] |
ZHANG Guochao, WANG Ruijin.
Blockchain shard storage model based on threshold secret sharing
[J]. Journal of Computer Applications, 2019, 39(9): 2617-2622.
|
[10] |
WANG Yan, HOU Zhengfeng, ZHANG Xueqi, HUANG Mengjie.
Dynamic threshold signature scheme based on Chinese remainder theorem
[J]. Journal of Computer Applications, 2018, 38(4): 1041-1045.
|
[11] |
ZUO Liming, CHEN Zuosong, XIA Pingping, YI Chuanjia.
Efficient and provably secure short proxy signature scheme
[J]. Journal of Computer Applications, 2018, 38(12): 3455-3461.
|
[12] |
LI Haoyu, ZHANG Longjun, LI Qingpeng.
Dynamic provable data possession scheme based on B+ tree
[J]. Journal of Computer Applications, 2017, 37(7): 1931-1935.
|
[13] |
LUO Xiaoshuang, YANG Xiaoyuan, WANG Xu'an.
A private set intersection protocol against malicious attack
[J]. Journal of Computer Applications, 2017, 37(6): 1593-1598.
|
[14] |
YUAN Dazeng, HE Mingxing, LI Xiao, ZENG Shengke.
Private information retrieval protocol based on point function secret sharing
[J]. Journal of Computer Applications, 2017, 37(2): 494-498.
|
[15] |
LIU Jingrong, DU Huimin, DU Qinqin.
Improvement of sub-pixel morphological anti-aliasing algorithm
[J]. Journal of Computer Applications, 2017, 37(10): 2871-2874.
|