Computer Science ›› 2024, Vol. 51 ›› Issue (8): 440-446.doi: 10.11896/jsjkx.230400203
• Information Security • Previous Articles
XIANG Yanjie1, HUANG Xiaofang1, XIANG Kefeng2, ZHENG Ji’nan1
CLC Number:
[1]AO W,FU S,ZHANG C,et al.A secure identity authentication scheme based on blockchain and identity-based cryptography[C]//2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology(CCET).IEEE,2019:90-95. [2]YANG H Z,YUAN L Y,WANG S.Blockchain Design Based on SM2 National Secret Algorithm Optimization [J].Computer Engineering and Design,2021,42(3):622-627. [3]PEOPLE’s BANK of CHINA.Financial distributed ledger technology security specification[EB/OL].(2020-02-05)[2022-12-07].https://www.cfstc.org/bzgk/gk/view/yulan.jsp?i_id=1855&s_file_id=1741. [4]Al-RIYAMI S S,PATERSON K G.Certificateless public keycryptography [C]//International Conference on the Theory and Application of Cryptology and Information Security.Springer,2003:452-473. [5]SU Y,LI Y P,CAO Q,et al.Authorized certificateless conjunctive keyword search on encrypted EHRs from WSNs [J].Journal of Information Science & Engineering,2020,36(4):881-896. [6]XU G X,DONG J N,MA C,et al.A certificateless encryption scheme based on blockchain [J].Peer-to-Peer Networking and Applications,2021,14(5):2952-2960. [7]ZHOU Y W,YANG B.Leakage-resilient CCA2-secure certifi-cateless public-key encryption scheme without bilinear pairing [J].Information Processing Letters,2018,130:16-24. [8]ZHENG X Y,ZHOU Y Y,YE Y L,et al.A cloud data deduplication scheme based on certificateless proxy re-encryption [J].Journal of Systems Architecture,2020,102:101666. [9]HASSAN A,WANG Y,ELHABOB R,et al.An efficient certificateless public key encryption scheme with authorized equality test in healthcare environments [J].Journal of Systems Architecture,2020,109:101776. [10]MA M M,FAN S Q,FENG D G.Multi-user certificateless public key encryption with conjunctive keyword search for cloud-based telemedicine [J].Journal of Information Security and Applications,2020,55:102652. [11]SENOUCI M R,BENKHADDRA I,SENOUCI A,et al.An efficient and secure certificateless searchable encryption scheme against keyword guessing attacks [J].Journal of Systems Architecture,2021,119:102271. [12]ZHANG R R,NIU H X.Security-enhanced certificatelesssearchable public key encryption scheme [J].Microelectronics &Computer,2022,39(6):89-98. [13]QU H P,YAN Z,LIN X J,et al.Certificateless public key encryption with equality test [J].Information Sciences,2018,462:76-92. [14]LUO M,PEI Y S,CHEN A.Cross-domain encryption schemewith equality test for wireless body area networks [J].Wireless Networks,2022,28(5):2105-2114. [15]CHENG C H.A Certificateless encryption algorithm based on SM2 [J].Journal of Cryptologic Research,2021,8(1):87-95. [16]ODOOM J,HUANG X F,DANSO S A.COVID-19 and future pandemics:A blockchain-based privacy-aware secure borderless travel solution from electronic health records[J].Software:Practice and Experience,2022,52(10):2263-2287. [17]PAN W,HUANG X F.Identity Management and Authentica-tion Model Based on Smart Contracts [J].Computer Enginee-ring and Design,2020,41(4):915-919. [18]TOMAR A,TRIPATHI S.BCAV:Blockchain-based certificate-less authentication system for vehicular network [J].Peer-to-Peer Networking and Applications,2022,15(3):1733-1756. [19]WANG Z H,HUO R,WANG S.A Lightweight Certificateless Group Key Agreement Method without Pairing Based on Blockchain for Smart Grid [J].Future Internet,2022,14(4):119. [20]XU G X,DONG J N,MA C,et al.A Certificateless Signcryption Mechanism Based on Blockchain for Edge Computing [J].IEEE Internet of Things Journal,2022,10(14):11960-11974. [21]ELTAYIEB N,SUN L,WANG K,et al.A certificateless proxy re-encryption scheme for cloud-based blockchain [C]//International Conference on Frontiers in Cyber Security.Springer,2019:293-307. [22]STATE CRYPTOGRAPHY ADMINISTRATION.SM2 Elliptic Curve Public Key Cryptography Algorithm [S].Beijing:China Standard Press.2010. [23]MONRAT A A,SCHELÉN O,ANDERSSON K.A survey of blockchain from the perspectives of applications,challenges,and opportunities [J].IEEE Access,2019,7:117134-117151. [24]CUI J,ZHANG J,ZHONG H,et al.An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks[J].Information Sciences,2018,451:1-15. [25]YANG X,TIAN T,WANG J,et al.Blockchain-based multi-user certificateless encryption with keyword search for electronic health record sharing[J].Peer-to-Peer Networking and Applications,2022,15(5):2270-2288. |
[1] | ZANG Wenyang, LYU Jinlai. Study on Time Rotation Notary Group Model Based on Threshold Signature [J]. Computer Science, 2024, 51(8): 403-411. |
[2] | SUN Li. Application,Challenge and New Strategy of Block Chain Technology in Metaverse [J]. Computer Science, 2024, 51(7): 373-379. |
[3] | LI Zhiyuan, XU Binglei, ZHOU Yingyi. Blockchain Anonymous Transaction Tracking Method Based on Node Influence [J]. Computer Science, 2024, 51(7): 422-429. |
[4] | ZHU Jun, ZHANG Guoyin, WAN Jingjing. Study on Data Security Framework Based on Identity and Blockchain Integration [J]. Computer Science, 2024, 51(6A): 230400056-5. |
[5] | LAN Yajie, MA Ziqiang, CHEN Jiali, MIAO Li, XU Xin. Survey on Application of Searchable Attribute-based Encryption Technology Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230800016-14. |
[6] | TAN Jingqi, XUE Lingyan, HUANG Haiping, CHEN Long, LI Yixuan. Data Security Management Scheme Based on Editable Medical Consortium Chain [J]. Computer Science, 2024, 51(6A): 240400056-8. |
[7] | KANG Zhong, WANG Maoning, MA Xiaowen, DUAN Meijiao. New Design of Redactable Consortium Blockchain Scheme Based on Multi-user Chameleon Hash [J]. Computer Science, 2024, 51(6A): 230600004-6. |
[8] | GENG Qian, CHUAI Ziang, JIN Jian. Operational Consistency Model Based on Consortium Blockchain for Inter-organizational Data Exchange [J]. Computer Science, 2024, 51(6A): 230800145-9. |
[9] | TIAN Hongliang, XIAN Mingjie, GE Ping. Fine Grained Security Access Control Mechanism Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230400080-7. |
[10] | ZANG Hongrui, YANG Tingting, LIU Hongbo, MA Kai. Study on Cryptographic Verification of Distributed Federated Learning for Internet of Things [J]. Computer Science, 2024, 51(6A): 230700217-5. |
[11] | ZHANG Ruirong, NIU Baoning, FAN Xing. Multi-attribute Blockchain Decentralization Degree Measurement Model [J]. Computer Science, 2024, 51(5): 382-389. |
[12] | LI Fengyun, CHEN Mingming, WANG Lin, LI Peng , JU Xianyin. Study on Trust Management Mechanism of Internet of Vehicles Based on Blockchain [J]. Computer Science, 2024, 51(4): 381-387. |
[13] | LIU Wei, LIU Yuzhao, TANG Congke, WANG Yuanyuan, SHE Wei, TIAN Zhao. Study on Blockchain Based Federated Distillation Data Sharing Model [J]. Computer Science, 2024, 51(3): 39-47. |
[14] | WANG Dong, LI Zheng, XIAO Bingbing. Blockchain Coin Mixing Scheme Based on Homomorphic Encryption [J]. Computer Science, 2024, 51(3): 335-339. |
[15] | DONG Hao, ZHAO Hengtai, WANG Ziyao, YUAN Ye, ZHANG Aoqian. Parallel Transaction Execution Models Under Permissioned Blockchains [J]. Computer Science, 2024, 51(1): 124-132. |
|