Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 250100131-10.doi: 10.11896/jsjkx.250100131
• Information Security • Previous Articles Next Articles
YANG Ke1, GUO Qinglei2,3, SHEN Yiming4, BAI Neng4, SONG Wenting5, WANG Weiyu2,3
CLC Number:
| [1]Guiding Opinions of the State Council on Accelerating the Establishment and Improvement of a Green,Low Carbon,and Circular Development Economic System[M].China Enterprise Reform and Development 2021 Blue Book State Counci,2021:5.DOI:10.26914/c.cnkihy.2021.070330. [2]WANG Q L,REN Z Y,WU X Y,et al.Blockchain-based Internet of Things Traceable and Anonymous Cross-domain AuthenticationScheme[J].Computer Science,2025,52(5):337-344. [3]TIAN H L,XIAN M J,GE P.Fine Grained Security Access Control Mechanism Based on Blockchain[J].Computer Science,2024,51(S1):1035-1041. [4]FAN C I,WU C N,SUN W Z.Multi-recastable E-BiddingScheme[C]//2008 Eighth International Conference on Intelligent Systems Design and Applications.IEEE,2008:462-466. [5]XU J,SONG J.A new management system for Intelligent E-Bidding[C]//2013 IEEE 4th International Conference on Software Engineering and Service Science.IEEE,2013:158-161. [6]CHEN Y H,CHEN S H,LIN I C.Blockchain based smart contract for bidding system[C]//2018 IEEE International Confe-rence on Applied System Invention(ICASI).IEEE,2018:208-211. [7]TRINH V A,TRINH V C.One-Verifier Signature Scheme andIts Applications[C]//Proceedings of the 10th International Symposium on Information and Communication Technology.2019:261-266. [8]MANIMARAN P,DHANALAKSHMI R.Blockchain-basedsmart contract for e-bidding system[C]//2019 2nd International Conference on Intelligent Communication and Computational Techniques(ICCT).IEEE,2019:55-59. [9]WANG D,ZHAO J,MU C.Research on blockchain-based e-bidding system[J].Applied Sciences,2021,11(9):4011. [10]SARFARAZ A,CHAKRABORTTY R K,ESSAM D L.A tree structure-based improved blockchain framework for a secure online bidding system[J].Computers & Security,2021,102:102147. [11]OMAR I A,HASAN H R,JAYARAMAN R,et al.Implemen-ting decentralized auctions using blockchain smart contracts[J].Technological Forecasting and Social Change,2021,168:120786. [12]XU D,YANG Q.The systems approach and design path of electronic bidding systems based on blockchain technology[J].Electronics,2022,11(21):3501. [13]MERKLER C.Secrecy,authentication,and public key systems[M].Stanford University,1979. [14]LAURIE B.Certificate transparency[J].Communications of the ACM,2014,57(10):40-46. [15]ZHANG Y Z,DENG R H,XU S M,et al.Attribute-based encryption for cloud computing access control:A survey[J].ACM Computing Surveys,2020,53(4):141. [16]ZHANG Y,DENG R H,XU S,et al.Attribute-based encryption for cloud computing access control:A survey[J].ACM Computing Surveys,2020,53(4):1-41. [17]LIU Z,CAO Z,WONGD S.Efficient generation of linear secret sharing scheme matrices from threshold access trees[J].Cryptology ePrint Archive,2010. [18]SHEN M,LIU H,ZHU L,et al.Blockchain-assisted secure device authentication for cross-domain industrial IoT[J].IEEE Journal on Selected Areas in Communications,2020,38(5):942-954. [19]JIA X,HU N,SU S,et al.IRBA:An identity-based cross-domain authentication scheme for the internet of things[J].Electronics,2020,9(4):634. |
| [1] | ZHOU Tao, DU Yongping, XIE Runfeng, HAN Honggui. Vulnerability Detection Method Based on Deep Fusion of Multi-dimensional Features from Heterogeneous Contract Graphs [J]. Computer Science, 2025, 52(9): 368-375. |
| [2] | LI Li, CHEN Jie, ZHU Jiangwen. Multi-authority Revocable Ciphertext-policy Attribute-based Encryption Data Sharing Scheme [J]. Computer Science, 2025, 52(9): 388-395. |
| [3] | JIAO Jian, CHEN Ruixiang, HE Qiang, QU Kaiyang, ZHANG Ziyi. Study on Smart Contract Vulnerability Repair Based on T5 Model [J]. Computer Science, 2025, 52(4): 362-368. |
| [4] | SUN Li. Application,Challenge and New Strategy of Block Chain Technology in Metaverse [J]. Computer Science, 2024, 51(7): 373-379. |
| [5] | TIAN Hongliang, XIAN Mingjie, GE Ping. Fine Grained Security Access Control Mechanism Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230400080-7. |
| [6] | XU Yiran, ZHOU Yu. Prompt Learning Based Parameter-efficient Code Generation [J]. Computer Science, 2024, 51(6): 61-67. |
| [7] | LIU Wei, LIU Yuzhao, TANG Congke, WANG Yuanyuan, SHE Wei, TIAN Zhao. Study on Blockchain Based Federated Distillation Data Sharing Model [J]. Computer Science, 2024, 51(3): 39-47. |
| [8] | JIANG Luhan, TIAN Youliang, XIANG Axin. CP-ABE Scheme Supports Fully Policy and Attribute Hidden [J]. Computer Science, 2024, 51(12): 317-325. |
| [9] | LI Qiuyue, HAN Daojun, ZHANG Lei, XU Tao. Fine-grained Vulnerability Detection Based on Hierarchical Attention Networks and Integral Gradients [J]. Computer Science, 2024, 51(12): 326-333. |
| [10] | YAN Li, YIN Tian, LIU Peishun, FENG Hongxin, WANG Gaozhou, ZHANG Wenbin, HU Hailin, PAN Fading. Overview of Attribute-based Searchable Encryption [J]. Computer Science, 2024, 51(11A): 231100137-12. |
| [11] | MEN Ruirui, JIA Hongyong, DU Jinru. Study on Stream Data Authorization Revocation Scheme Based on Smart Contracts [J]. Computer Science, 2024, 51(10): 372-379. |
| [12] | TONG Fei, SHAO Ranran. Study on Blockchain Based Access Control Model for Cloud Data [J]. Computer Science, 2023, 50(9): 16-25. |
| [13] | ZHAO Yuhao, CHEN Siguang, SU Jian. Privacy-enhanced Federated Learning Algorithm Against Inference Attack [J]. Computer Science, 2023, 50(9): 62-67. |
| [14] | ZHAO Mingmin, YANG Qiuhui, HONG Mei, CAI Chuang. Smart Contract Fuzzing Based on Deep Learning and Information Feedback [J]. Computer Science, 2023, 50(9): 117-122. |
| [15] | ZHENG Hong, QIAN Shihui, LIU Zerun, DU Wen. Formal Verification of Supply Chain Contract Based on Coloured Petri Nets [J]. Computer Science, 2023, 50(6A): 220300220-7. |
|
||