Computer Science ›› 2024, Vol. 51 ›› Issue (11A): 240200079-7.doi: 10.11896/jsjkx.240200079
• Information Security • Previous Articles Next Articles
SUN Min, LI Xinyu, ZHANG Xin
CLC Number:
[1]LIU Y H,ZHANG J B,MUHAMMD S P,et al.Research onidentity authentication system of Internet of Things based on blockchain technology[J].Journal of King Saud University - Computer and Information Sciences,2022,34(10,Part B):10365-10377. [2]HUANG H,ZHU P,XIAO F,et al.A blockchain-based scheme for privacy-preserving and secure sharing of medical data[J].Computers & Security,2020,99:102010. [3]YANG X,LI W.A zero-knowledge-proof-based digital identitymanagement scheme in blockchain[J].Computers & Security,2020,99:102050. [4]LI W,MEESE C,GUO H,et al.Blockchain-Enabled IdentityVerification for Safe Ridesharing Leveraging Zero-Knowledge Proof[C]//2020 3rd International Conference on Hot Information-Centric Networking(HotICN).2020:18-24. [5]LIU Y,ZHOU Y,ZHANG R,et al.(Full) Leakage resilience of Fiat-Shamir signatures over lattices[J].Frontiers of Computer Science,2022,16(5):165819. [6]WU N,XU L,ZHU L.A blockchain based access controlscheme with hidden policy and attribute[J].Future Generation Computer Systems,2023,141:186-196. [7]CHEN B,LI X,XIANG T,et al.SBRAC:Blockchain-basedsealed-bid auction with bidding price privacy and public verifiability[J].Journal of Information Security and Applications,2022,65:103082. [8]ŞAHIN M S,AKLEYLEK S.A constant-size lattice-based partially-dynamic group signature scheme in quantum random oracle model[J].Journal of King Saud University-Computer and Information Sciences,2022,34(10,Part B):9852-9866. [9]FENG M,LIN C,WU W,et al.SM2-DualRing:Efficient SM2-based ring signature schemes with logarithmic size[J].Compu-ter Standards & Interfaces,2024,87:103763. [10]SANKA A I,CHEUNG R C C.A systematic review of blockchain scalability:Issues,solutions,analysis and future research[J].Journal of Network and Computer Applications,2021,195:103232. [11]KUMARI P L S,DEVI C H S,THIVAHARAN S,et al.A resilient group session key authentication methodology for secured peer to peer networks using zero knowledge protocol[J].Optik,2023,273:170345. [12]CASTELLON C,ROY S,KREIDL P,et al.Energy EfficientMerkle Trees for Blockchains[C]// IEEE The 20th International Conference on Trust,Security and Privacy in Computing and Communications(TRUSTCOM 2021).Los Alamitos:IEEE Computer Soc,2021:1093-1099. [13]HAQ I,WANG J,ZHU Y,et al.A survey of authenticated key agreement protocols for multi-server architecture[J].Journal of Information Security and Applications,2020,55:102639. [14]TAN P L,WANG R S,ZENG W H,et al.Overview of blockchain consensus algorithms [J].Computer Science,2023,50(S1):691-702. [15]FIAT A,SHAMIR A.How To Prove Yourself:Practical Solutions to Identification and Signature Problems[M]//ODLYZKO A M.Advances in Cryptology-CRYPTO' 86:Vol.263.Berlin,Heidelberg:Springer Berlin Heidelberg,2006:186-194. [16]LIPMAA H,SIIM J,ZAJAC M.Counting Vampires:From Univariate Sumcheck to Updatable ZK-SNARK[C]//Advances in Cryptology-ASIACRYPT 2022.Cham:Springer International Publishing Ag,2022:249-278. |
[1] | WANG Dong, LI Xiaoruo, ZHU Bingnan. Transaction Granularity Modifiable Consortium Blockchain Scheme Based on Dual Merkel Trees Block Structure [J]. Computer Science, 2024, 51(9): 408-415. |
[2] | ZANG Wenyang, LYU Jinlai. Study on Time Rotation Notary Group Model Based on Threshold Signature [J]. Computer Science, 2024, 51(8): 403-411. |
[3] | XIANG Yanjie, HUANG Xiaofang, XIANG Kefeng, ZHENG Ji’nan. Blockchain Certificateless Encryption Mechanism Based on National Secret Algorithm [J]. Computer Science, 2024, 51(8): 440-446. |
[4] | SUN Li. Application,Challenge and New Strategy of Block Chain Technology in Metaverse [J]. Computer Science, 2024, 51(7): 373-379. |
[5] | FU Yanming, ZHANG Siyuan. Privacy Incentive Mechanism for Mobile Crowd-sensing with Comprehensive Scoring [J]. Computer Science, 2024, 51(7): 397-404. |
[6] | LI Zhiyuan, XU Binglei, ZHOU Yingyi. Blockchain Anonymous Transaction Tracking Method Based on Node Influence [J]. Computer Science, 2024, 51(7): 422-429. |
[7] | ZHU Jun, ZHANG Guoyin, WAN Jingjing. Study on Data Security Framework Based on Identity and Blockchain Integration [J]. Computer Science, 2024, 51(6A): 230400056-5. |
[8] | LAN Yajie, MA Ziqiang, CHEN Jiali, MIAO Li, XU Xin. Survey on Application of Searchable Attribute-based Encryption Technology Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230800016-14. |
[9] | SUN Min, DING Xining, CHENG Qian. Federated Learning Scheme Based on Differential Privacy [J]. Computer Science, 2024, 51(6A): 230600211-6. |
[10] | TAN Zhiwen, XU Ruzhi, WANG Naiyu, LUO Dan. Differential Privacy Federated Learning Method Based on Knowledge Distillation [J]. Computer Science, 2024, 51(6A): 230600002-8. |
[11] | TAN Jingqi, XUE Lingyan, HUANG Haiping, CHEN Long, LI Yixuan. Data Security Management Scheme Based on Editable Medical Consortium Chain [J]. Computer Science, 2024, 51(6A): 240400056-8. |
[12] | KANG Zhong, WANG Maoning, MA Xiaowen, DUAN Meijiao. New Design of Redactable Consortium Blockchain Scheme Based on Multi-user Chameleon Hash [J]. Computer Science, 2024, 51(6A): 230600004-6. |
[13] | GENG Qian, CHUAI Ziang, JIN Jian. Operational Consistency Model Based on Consortium Blockchain for Inter-organizational Data Exchange [J]. Computer Science, 2024, 51(6A): 230800145-9. |
[14] | WANG Chenzhuo, LU Yanrong, SHEN Jian. Study on Fingerprint Recognition Algorithm for Fairness in Federated Learning [J]. Computer Science, 2024, 51(6A): 230800043-9. |
[15] | TIAN Hongliang, XIAN Mingjie, GE Ping. Fine Grained Security Access Control Mechanism Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230400080-7. |
|