[1] |
TILBORGH C A , JAJIDIA S . Encyclopedia of cryptography and security[M]. US:Springer, 2011.
|
[2] |
GANESH C , ORLANDI C , TSCHUDI D . Proof-of-stake protocols for privacy-aware blockchains[C]// Advances in Cryptology – EUROCRYPT 2019, 2019.
|
[3] |
KIAYIAS A , RUSSELL A , DAVID B ,et al. Ouroboros:a provably secure proof-of-stake blockchain protocol[C]// Advances in Cryptology – CRYPTO, 2017.
|
[4] |
KERBER T , KIAYIAS A , KOHLWEISS M ,et al. Ouroboros crypsinous:privacy-preserving proof-of-stake[C]// Proceedings of 2019 IEEE Symposium on Security and Privacy. 2019: 157-174.
|
[5] |
FAN X X , CHAI Q . Roll-DPoS:a randomized delegated proof of stake scheme for scalable blockchain-based Internet of things systems[C]// Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems:Computing,Networking and Services. 2018.
|
[6] |
BUCHMAN E , KWON J , MILOSEVIC Z ,et al. The latest gossip on BFT consensus[EB].
|
[7] |
ALZAHRANI N , BULUSU N . Towards true decentralization:a blockchain consensus protocol based on game theory and randomness[C]// Decision and Game Theory for Security, 2018.
|
[8] |
BENTOV I , LEE C , MIZRAHI A ,et al. Proof of activity[J]. ACM SIGMETRICS Performance Evaluation Review, 2014,42(3): 34-37.
|
[9] |
CHEPURNOY A . Interactive proof-of-stake[EB].
|
[10] |
SABZMAKAN A , MIRTAHERI S L . An improved distributed access control model in cloud computing by blockchain[C]// Proceedings of 2021 26th International Computer Conference,Computer Society of Iran (CSICC). 2016: 1-4.
|
[11] |
GILAD Y , HEMO R , MICALI S ,et al. Algorand:scaling Byzantine agreements for cryptocurrencies[C]// Proceedings of the 26th Symposium on Operating Systems Principles. 2017.
|
[12] |
OMAR M , CHALLAL Y , BOUABDALLAH A . Reliable and fully distributed trust model for mobile ad hoc networks[J]. Computers& Security, 2009,28(3/4): 199-214.
|
[13] |
ZHAN Y , WANG B C , LU R X ,et al. DRBFT:Delegated randomization Byzantine fault tolerance consensus protocol for blockchains[J]. Information Sciences, 2021,559: 8-21.
|
[14] |
DONG C Y , WANG Y L , ALDWEESH A ,et al. Betrayal,distrust,and rationality:smart counter-collusion contracts for verifiable cloud computing[EB].
|
[15] |
CHEN H , LAINE K , PLAYER R . Simple encrypted arithmetic library - SEAL v2.1[M]. Berlin: Springer, 2016.
|
[16] |
ANDERW M , YU X , KUYLE C ,et al. The Honey badger of BFT Protocols[R]. 2016.
|
[17] |
JALALZAI M , BUSCH C , JII G R . Proteus:a scalable bft consesus protocol for blockchains[C]// CORR. 2019.
|
[18] |
LESSMANN S , BAESENS B , SEOW H V ,et al. Benchmarking state-of-the-art classification algorithms for credit scoring:an update of research[J]. European Journal of Operational Research, 2015,247(1): 124-136.
|
[19] |
王缵, 田有亮, 岳朝跃 ,等. 基于门限密码方案的共识机制[J]. 计算机研究与发展, 2019,56(12): 2671-2683.
|
|
WANG Z , TIAN Y L , YUE C Y ,et al. Consensus mechanism based on threshold cryptography scheme[J]. Journal of Computer Research and Development, 2019,56(12): 2671-2683.
|
[20] |
YU Y L , CHEN T S . An efficient threshold group signature scheme[J]. Applied Mathematics and Computation, 2005,167(1): 362-371.
|