[1] BRANDT F. How to obtain full privacy in auctions[J]. International Journal of Information Security, 2006, 5(4):201-216. [2] BRANDT F,SANDHOLM T. Efficient privacy-preserving protocols for multi-unit auctions[C]//FC 2005:Proceedings of the 2005 International Conference on Financial Cryptography and Data Security. Berlin:Springer,2005:298-312. [3] BOGETOFT P,DAMGARD I,JAKOBSEN T P,et al. A practical implementation of secure auctions based on multiparty integer computation[C]//FC 2006:Proceedings of the 200610th International Conference on Financial Cryptography and Data Security. Berlin:Springer,2006:142-147. [4] WU C,CHANG C,LIN I,et al. New sealed-bid electronic auction with fairness,security and efficiency[J]. Journal of Computer Science and Technology,2008,23(2):253-264. [5] LEE C C,HO P F,HWANG M S. A secure e-auction scheme based on group signatures[J]. Information Systems Frontiers, 2009,11(3):335-343. [6] SUN Y,SUN Y,LUO M,et al. Comment on Lee et al. 's group signature and e-auction scheme[J]. Information Systems Frontiers, 2013,15(1):133-139. [7] 王鑫, 张晓琳, 高明, 等. 一种高效的密封式电子拍卖方案[J]. 青岛大学学报(自然科学版),2015,28(1):64-69.(WANG X, ZHANG X L,GAO M,et al. An efficient sealed electronic auction scheme[J]. Journal of Qingdao University (Natural Science Edition),2015,28(1):64-69.) [8] 程文娟, 董莹莹, 韩俊光. 一种简单高效的密封式电子拍卖方案[J]. 计算机工程,2014,40(03):171-174.(CHENG W Y, DONG Y Y,HAN J G. A simple and efficient sealed-bid electronic auction scheme[J]. Computer Engineering, 2014, 40(3):171-174.) [9] 曹刚. 基于不可信第三方的电子拍卖方案[J]. 计算机工程, 2010,36(20):140-141+144.(CAO G. Electronic auction scheme based on trustless third-party[J]. Computer Engineering,2010,36(20):140-141+144.) [10] GALAL H S,YOUSSEF A M. Verifiable sealed-bid auction on the Ethereum blockchain[C]//FC 2018:Proceedings of the 2018 International Conference on Finanacial Cryptography and Data Security. Berlin:Springer,2018:265-278. [11] GALAL H S,YOUSSEF A M. Succinctly verifiable sealed-bid auction smart contract[C]//DPM 2018/CBT 2018:Proceedings of the 2018 Data Privacy Management, Cryptocurrencies and Blockchain Technology. Cham:Springer,2018:3-19. [12] 彭烨, 高莹, 吴进喜. 基于区块链的隐私保护密封式电子拍卖方案[J]. 网络空间安全,2018,9(8):1-7.(PENG Y,GAO Y, WU J X. A privacy preserving sealed-bid auction scheme based on block chains[J]. Cyberspace Security,2018,9(8):1-7.) [13] XIONG J,WANG Q. Anonymous auction protocol based on timereleased encryption atop consortium blockchain[J]. International Journal of Advanced Information Technology,2019,9(1):1-16. [14] NAKAMOTO S. Bitcoin:a peer-to-peer electronic cash system[EB/OL].[2019-11-03]. https://bitcoin.org/bitcoin.pdf. [15] 范吉立, 李晓华, 聂铁铮, 等. 区块链系统中智能合约技术综述[J]. 计算机科学,2019,46(11):1-10.(FAN J L,LI X H,NIE T Z,et al. Survey on smart contract based on blockchain system[J]. Computer Science,2019,46(11):1-10.) [16] 祝烈煌, 高峰, 沈蒙, 等. 区块链隐私保护研究综述[J]. 计算机研究与发展,2017,54(10):2170-2186.(ZHU L H,GAO F, SHEN M, et al. Survey on privacy preserving techniques for blockchain technology[J]. Journal of Computer Research and Development,2017, 54(10):2170-2186.) [17] 刘敖迪, 杜学绘, 王娜, 等. 区块链技术及其在信息安全领域的研究进展[J]. 软件学报,2018,29(7):2092-2115.(LIU A D, DU X H,WANG N,et al. Research progress of blockchain technology and its application in information security[J]. Journal of Software,2018,29(7):2092-2115.) [18] COURTOIS N T, MERCER R. Stealth address and key management techniques in blockchain systems[C]//ICISSP:Proceedings of the 2017 International Conference on Information Systems Security & Privacy. Porto:Science and Technology Publications,2017:559-566. [19] ZYSKIND G, NATHAN O. Decentralizing privacy:using blockchain to protect personal data[C]//SPW 2017:Proceedings of the 2017 IEEE Security & Privacy Workshops. Piscataway:IEEE,2015:180-184. [20] MIERS I,GARMAN C,GREEN M,et al. Zerocoin:anonymous distributed E-cash from bitcoin[C]//SP 2013:Proceedings of the 2013 IEEE Symposium on Security and Privacy. Piscataway:IEEE,2013:397-411. [21] PEDERSEN T P. Non-interactive and information-theoretic secure verifiable secret sharing[C]//CRYPTO 1991:Proceedings of the 1991 International Cryptology Conference. Berlin:Springer, 1992:129-140. [22] BÜNZ B,BOOTLE J,BONEH D,et al. Bulletproofs:short proofs for confidential transactions and more[C]//SP 2018:Proceedings of the 2018 IEEE Symposium on Security and Privacy. Piscataway:IEEE,2018:315-334. [23] GROTH J,MALLER M. Snarky signatures:minimal signatures of knowledge from simulation-extractable snarks[C]//CRYPTO 2017:Proceedings of the 2017 International Cryptology Conference. Cham:Springer,2017:581-612. [24] BEN-SASSON E, BENTOV I, HORESH Y, et al. Scalable, transparent,and post-quantum secure computational integrity[R/OL]. (2018-03-06)[2020-04-12]. https://eprint.iacr.org/2018/046.pdf. |