Computer Science ›› 2018, Vol. 45 ›› Issue (11): 52-59.doi: 10.11896/j.issn.1002-137X.2018.11.006
Special Issue: Block Chain Technology
• Surveys • Previous Articles Next Articles
DONG Gui-shan, CHEN Yu-xiang, ZHANG Zhao-lei, BAI Jian, HAO Yao
CLC Number:
[1]ITU-T X.1250《Enhancing Trust and Interoperability in global identity management》..http://www.zbgb.org/129/StandardDetail2192142.htm. [2]Christopher Allen.The Path to Self-Sovereign Identity. .http://www.coindesk.com/path-self-so-vereign-identity. [3]MSN Historical Timeline:A brief history of milestone events in the life of MSN from the past ten years ..http://www.microsoft.com/presspass/press/2002/nov02/11-08MSN8GlobalTimeLine.mspx. [4]STAAIJ R V D.Handboek identity & access management.Netherlands:Academic Service,2014. [5]KONING M,KORENHOF P,ALPÁR G,et al.The ABC of ABC:an Analysis of Attribute-Based Credentials in the Light of Data Protection,Privacy and Identity∥Proceedings of the 10th International Conference on Internet,Law & Politics.2014:357-372. [6]ALPÁR G,JACOBS B.Credential Design in Attribute-Based Identity Management.Wolf Legal Publishers,2013:189-204. [8]胡可欣.FIDO UAF认证协议的安全性研究.合肥:中国科学技术大学,2016. [9]NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system..https://bitcoin.org/bitcoin.pdf. [10]OneName:The Bridge Between Physical & DigitalIdentity | Blockchain for the Billions on WordPress.com...https://rywalk.wordpress.com/2015/02/13/onename-the-bridge-between-physical-digital-identity. [11]Qiy Foundation | Technology..https://www.qiyfoundation.org/qiy-scheme/what-is-a-scheme/technology. SURF|Op SURFconext aangesloten diensten..https://www.surf.nl/ diensten-en-producten/surfconext/op-surfconext-aangesloten-diensten/index.html. [13]ANDREW M,et al.PoC KYC on blockchain with Tradle.Tech.rep.Utrecht:Rabobank Nederland,..https://www.newsbtc.com/2015/08/24/tradle-integrating-block-chain-technology-with-kyc-requirements. [14]Estonia’s new e-residents are surpassing the country's birth rate ..https://thenextweb.com/eu/2017/07/25/estonias-new-e-residents-surpassing-countrys-birth-rate. [15]DJURI B.Towards Self-Sovereign Identity using Blockchain Technology ..http://essay.utwente.nl/71274/1/Baars_MA_BMS.pdf. [16]BERGAN T,ANDERSON O,DEVIETTI J,et al.CryptoNote v 2.0..https://cryptonote.org/whitepaper.pdf. [17]TRAVEL identity of the future..ht- tps://shocard.com. [18]uPort The Wallet is the New Browser - Medium. .https://medium.Com/@ ConsenSys/uport-the-wallet-is-the-new-browser-b133a83fe73%7B%5C#%7D.1l0vsfq2p. [19]IDHub数字身份白皮书..http://www.idhub.network. [20]SelfKey..https://selfkey.org/wp-content/uploads/2017/11/selfkey-whitepaper-en.pdf. [21]Civic WHITEPAPER..https://tokensale.civic.com/CivicTokenSaleWhitePaper.pdf. [22]ANTONOPOULOS A M.Mastering Bitcoin:Unlocking Digital Cryptocurrencies[M].USA:O’Reilly Media,Inc.,2014. [23]Hyperledger.Project Charter..https://www.hyperledger.org/about/charter. [24]ANONYMOUS.New kid on the blockchain.New Scientist,2015,225(3009):7. [25]SWAN M.Blockchain thinking:the brain as a decentralized autonomous corporation.IEEE Technology and Society Magazine,2015,34(4):41-52. [26]ETHEREUM White Paper.A next-generation smart contract and decentralized application platform ..https://github.com/ethereum/wiki/wiki/White Paper. [27]Merkle R C.Protocols for Public Key Cryptosystems∥1980 IEEE Symposium on Security and Privacy.IEEE,2014:122-122. [28]ALLISON I.Ethereum’s Vitalik Buterin explains how state channels solve privacy and scalability..http://www.ibtimes.co.uk/ethereums-vitalik-buterin-explains-how-state-channels-address-privacy-scalability-1566068. [29]SASSON E B,CHIESA A,GARMAN C,et al.Zerocash:Decentralized Anonymous Payments from Bitcoin∥Security and Privacy.IEEE,2014:459-474. [30]DAVID B.Blockchain revolution.Amsterdam..http://www.slideshare.net/15Mb/blockchain-revolution. [31]DAVID B.Identity is the new Money..http://www.dgwbirch.com/words/book-identity-is-the-new.html. [32]Scalability - Bitcoin Wiki..https://en.bitcoin.it/wiki/ Scalability. [33]Building trust in government..https://www-01.ibm.com/ common/ssi/cgi-bin/ssialias?Htmlfid=GBE03801USEN&. |
[1] | WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317. |
[2] | JIAN Qi-rui, CHEN Ze-mao, WU Xiao-kang. Authentication and Key Agreement Protocol for UAV Communication [J]. Computer Science, 2022, 49(8): 306-313. |
[3] | ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776. |
[4] | FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461. |
[5] | GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468. |
[6] | MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530. |
[7] | CHEN Yan-bing, ZHONG Chao-ran, ZHOU Chao-ran, XUE Ling-yan, HUANG Hai-ping. Design of Cross-domain Authentication Scheme Based on Medical Consortium Chain [J]. Computer Science, 2022, 49(6A): 537-543. |
[8] | LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728. |
[9] | WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38. |
[10] | SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295. |
[11] | YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332. |
[12] | REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340. |
[13] | FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339. |
[14] | SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353. |
[15] | WANG Xin, ZHOU Ze-bao, YU Yun, CHEN Yu-xu, REN Hao-wen, JIANG Yi-bo, SUN Ling-yun. Reliable Incentive Mechanism for Federated Learning of Electric Metering Data [J]. Computer Science, 2022, 49(3): 31-38. |
|