| [1] | Baoyan SONG, Junxiang DING, Junlu WANG, Haolin ZHANG. 
														
															Consortium blockchain modification method based on chameleon hash and verifiable secret sharing
														[J]. Journal of Computer Applications, 2024, 44(7): 2087-2092. | 
																																																																																
													| [2] | Na ZHOU, Ming CHENG, Menglin JIA, Yang YANG. 
														
															Medical image privacy protection based on thumbnail encryption and distributed storage
														[J]. Journal of Computer Applications, 2023, 43(10): 3149-3155. | 
																																																																																
													| [3] | Xiaoqiong PANG, Ting YANG, Wenjun CHEN, Yunting WANG, Tianye LIU. 
														
															Digital rights management scheme based on secret sharing in blockchain environment
														[J]. Journal of Computer Applications, 2021, 41(11): 3257-3265. | 
																																																																																
													| [4] | WANG Yunye, CHENG Yage, JIA Zhijuan, FU Junjun, YANG Yanyan, HE Yuchu, MA Wei. 
														
															Auditable signature scheme for blockchain based on secure multi-party
														[J]. Journal of Computer Applications, 2020, 40(9): 2639-2645. | 
																																																																																
													| [5] | CHENG Yage, JIA Zhijuan, HU Mingsheng, GONG Bei, WANG Lipeng. 
														
															Threshold signature scheme suitable for blockchain electronic voting scenes
														[J]. Journal of Computer Applications, 2019, 39(9): 2629-2635. | 
																																																																																
													| [6] | ZHANG Guochao, WANG Ruijin. 
														
															Blockchain shard storage model based on threshold secret sharing
														[J]. Journal of Computer Applications, 2019, 39(9): 2617-2622. | 
																																																																																
													| [7] | LUO Xiaoshuang, YANG Xiaoyuan, WANG Xu'an. 
														
															A private set intersection protocol against malicious attack
														[J]. Journal of Computer Applications, 2017, 37(6): 1593-1598. | 
																																																																																
													| [8] | XU Shengwei, LIN Muqing. 
														
															Anonymous broadcast encryption based access control method for cloud storage
														[J]. Journal of Computer Applications, 2017, 37(2): 473-482. | 
																																																																																
													| [9] | YUAN Dazeng, HE Mingxing, LI Xiao, ZENG Shengke. 
														
															Private information retrieval protocol based on point function secret sharing
														[J]. Journal of Computer Applications, 2017, 37(2): 494-498. | 
																																																																																
													| [10] | HAO Wei, YANG Xiaoyuan, WANG Xu'an, WU Liqiang. 
														
															Proxy re-encryption scheme based on conditional asymmetric cross-cryptosystem
														[J]. Journal of Computer Applications, 2016, 36(9): 2452-2458. | 
																																																																																
													| [11] | HAO Wei, YANG Xiaoyuan, WANG Xu'an, ZHANG Yingnan, WU Liqiang. 
														
															Asymmetric proxy re-encryption scheme of efficient access to outsourcing data for mobile users
														[J]. Journal of Computer Applications, 2016, 36(8): 2225-2230. | 
																																																																																
													| [12] | XU Xiaojie, WANG Lisheng. 
														
															Birkhoff interpolation-based verifiable hierarchical threshold secret sharing algorithm
														[J]. Journal of Computer Applications, 2016, 36(4): 952-955. | 
																																																																																
													| [13] | HUANG Wenzhen, YANG Xiaoyuan, WANG Xu'an, WU Liqiang. 
														
															Identity-based broadcast encryption based on lattice
														[J]. Journal of Computer Applications, 2016, 36(4): 956-961. | 
																																																																																
													| [14] | LUO Xiaoshuang, YANG Xiaoyuan, WANG Xu'an. 
														
															Privacy preserving interest matching scheme for social network
														[J]. Journal of Computer Applications, 2016, 36(12): 3322-3327. | 
																																																																																
													| [15] | XIANG Wen, YANG Xiaoyuan, WU Liqiang. 
														
															Revocable fuzzy identity based encryption scheme over ideal lattice
														[J]. Journal of Computer Applications, 2016, 36(10): 2733-2737. |