Computer Science ›› 2018, Vol. 45 ›› Issue (2): 53-56.doi: 10.11896/j.issn.1002-137X.2018.02.009
Special Issue: Block Chain Technology
Previous Articles Next Articles
YUAN Chao, XU Mi-xue and SI Xue-ming
[1] PEASE M,SHOSTAK R,LAMPORT L.Reaching Agreement in the Presence of Faults[J].Journal of the ACM,1980,7(2):228-234. [2] LAMPORT,LESLIE,SHOSTAK,et al.Byzantine Generals Pro-blem[J].ACM Transactions on Programming Languages and Systems,1982,4(3):382-401. [3] FISCHER M.The Consensus Problem in Unreliable Distributed Systems (a Brief Survey)[C]∥International Fct-conference on Fundamentals of Computation Theory.1982:127-140. [4] CHANDRA T,TOREG S.Unreliable Failure Detectors for Reliable Distributed Systems[J].Journal of the ACM,1996,43(2):225-267. [5] SATOSHI N.Bitcoin:A Peer-to-Peer Electronic Cash System[EB/OL].https://bitcoin.org/bitcoin.pdf. [6] Delegated Proof-of-Stake Consensus[EB/OL].http://bitshares.org/technology/delegated-proof-stake-consensus. [7] BRASSAI S T,BAKO L,DAN S.FPGA Parallel Implementation of CMAC Type Neural Network with on Chip Learning[C]∥International Symposium on Applied Computation Intelligence and Informatics.2007:111-115 . [8] DANEZIS G,MEIKLEJOHN S.Centrally Banked Cryptocur-rencies.https://arxiv.org/abs/1505.06895. [9] 张铮文.一种用于区块链的拜占庭容错法[EB/OL].[2016-04-07].http://www.onchain.com/paper/66c677 3b.pdf. [10] CASTRO M,LISKOV B.Practical Byzantine fault tolerance[C]∥OSDI.1999:173-186. [11] YANG T,KONG L B,HU J B,et al.Survey on Aggregate Signature and Its Applications[J].Journal of Computer Research and Development,2012,49(S2):192-199.(in Chinese) 杨涛,孔令波,胡建斌,等.聚合签名及其应用研究综述[J].计算机研究与发展,2012,49(S2):192-199 [12] ZHANG Y L,ZHOU D R,LI C Y,et al..Certificateless-based efficient aggregate signature scheme with universal designated verifier[J].Journal on Communications,2015,36(2):1-8.(in Chinese) 张玉磊,周冬瑞,李臣意,等.高效的无证书广义指定验证者聚合签名方案[J].通信学报,2015,36(2):1-8. [13] SCHUBERT S.Simple BFT [EB/OL].http://jira.hyperledger.org/browse/FAB-378. [14] SOXT E.Ethereum [M].Wiesbaden:Springer Fachmedien Wies-baden,2017. [15] CHANDRAN N,GROTH J,SAHAI A.Ring signatures of sub-linear size without random oracles[C]∥International Collo-quium on Automata,Languages,and Programming.Springer,2007:423-434. [16] ZHANG Y Q,WANG X F,LIU X F,et al.Survey on Cloud Computing Security[J].Journal of Software,2010,27(6):1328-1348.(in Chinese) 张玉清,王晓菲,刘雪峰,等.云计算环境安全综述[J].软件学报,2010,27(6):1328-1348. [17] CASTRO M,LISKOV B.Practical Byzantine Fault Toleranceand Proactive Recovery[J].ACM Transactions on Computer Systems, 2002,20(4):398-461. [18] YUAN Y,WANG F Y.Blockchain:The State of the Art and Future Trends[J].Acta Automatica Sinica,2016,2(4):481-494.(in Chinese) 袁勇,王飞跃.区块链技术发展现状与展望[J].自动化学报,2016,2(4):481-494. [19] CHEN H,WEI S M,ZHU C J,et al.Security CertificatelessAggregate Signature Scheme[J].Journal of Software,2015,26(5):1173-1180.(in Chinese) 陈虎,魏仕民,朱昌杰,等.安全的无证书聚合签名方案[J].软件学报,2015,26(5):1173-1180. [20] LU H J,YU X Y,XIE Q.Provably Secure Certificateless Aggregate Signature with Constant Length[J].Journal of Shanghai Jiaotong University,2012,6(2):259-263.(in Chinese) 陆海军,于秀源,谢琪.可证安全的常数长度无证书聚合签名方案[J].上海交通大学学报,2012,6(2):259-263. |
No related articles found! |
|