[1] |
CHEN J C , XUE Y Z . Bootstrapping a blockchain based ecosystem for big data exchange[C]// Proceedings of 2017 IEEE International Congress on Big Data (BigData Congress). Piscataway:IEEE Press, 2017: 460-463.
|
[2] |
LIANG X P , ZHAO J , SHETTY S ,et al. Integrating blockchain for data sharing and collaboration in mobile healthcare applications[C]// Proceedings of 2017 IEEE 28th Annual International Symposium on Personal,Indoor,and Mobile Radio Communications. Piscataway:IEEE Press, 2017: 1-5.
|
[3] |
THEODOULI A , ARAKLIOTIS S , MOSCHOU K ,et al. On the design of a blockchain-based system to facilitate healthcare data sharing[C]// Proceedings of 2018 17th IEEE International Conference on Trust,Security and Privacy In Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering. Piscataway:IEEE Press, 2018: 1374-1379.
|
[4] |
GORDON W J , CATALINI C . Blockchain technology for healthcare:facilitating the transition to patient-driven interoperability[J]. Computational and Structural Biotechnology Journal, 2018,16: 224-230.
|
[5] |
AZARIA A , EKBLAW A , VIEIRA T ,et al. MedRec:using blockchain for medical data access and permission management[C]// Proceedings of 2016 2nd International Conference on Open and Big Data. Piscataway:IEEE Press, 2016: 25-30.
|
[6] |
YANG H , YANG B . A blockchainbased approach to the secure sharing of healthcare data[C]// Proceedings of the Norwegian Information Security Conference.[S.l.:s.n.], 2017: 100-111.
|
[7] |
CAO S , ZHANG G X , LIU P F ,et al. Cloud-assisted secure eHealth systems for tamper-proofing EHR via blockchain[J]. Information Sciences, 2019,485: 427-440.
|
[8] |
刘彦松, 夏琦, 李柱 ,等. 基于区块链的链上数据安全共享体系研究[J]. 大数据, 2020,6(5): 92-105.
|
|
LIU Y S , XIA Q , LI Z ,et al. Research on secure data sharing system based on blockchain[J]. Big Data Research, 2020,6(5): 92-105.
|
[9] |
YU K P , TAN L , ALOQAILY M ,et al. Blockchain-enhanced data sharing with traceable and direct revocation in IIoT[J]. IEEE Transactions on Industrial Informatics, 2021,17(11): 7669-7678.
|
[10] |
ZHANG Y , WEN J T . An IoT electric business model based on the protocol of bitcoin[C]// Proceedings of 2015 18th International Conference on Intelligence in Next Generation Networks. Piscataway:IEEE Press, 2015: 184-191.
|
[11] |
W?RNER D , VON BOMHARD T . When your sensor earns money:exchanging data for cash with Bitcoin[C]// Proceedings of 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing:Adjunct Publication. New York:ACM Press, 2014: 295-298.
|
[12] |
?ZYILMAZ K R , DO?AN M , YURDAKUL A . IDMoB:IoT data marketplace on blockchain[C]// Proceedings of 2018 Crypto Valley Conference on Blockchain Technology. Piscataway:IEEE Press, 2018: 11-19.
|
[13] |
SHAFAGH H , BURKHALTER L , HITHNAWI A ,et al. Towards blockchain-based auditable storage and sharing of IoT data[C]// Proceedings of 2017 on Cloud Computing Security Workshop.[S.l.:s.n.], 2017: 45-50.
|
[14] |
PAN J L , WANG J Y , HESTER A ,et al. EdgeChain:an edge-IoT framework and prototype based on blockchain and smart contracts[J]. IEEE Internet of Things Journal, 2019,6(3): 4719-4732.
|
[15] |
张召, 田继鑫, 金澈清 . 链上存证、链下传输的可信数据共享平台[J]. 大数据, 2020,6(5): 106-117.
|
|
ZHANG Z , TIAN J X , JIN C Q . Onchain witness and off-chain transmission trustworthy data sharing platform[J]. Big Data Research, 2020,6(5): 106-117.
|
[16] |
袁勇, 王飞跃 . 区块链技术发展现状与展望[J]. 自动化学报, 2016,42(4): 481-494.
|
|
YUAN Y , WANG F Y . Blockchain:the state of the art and future trends[J]. Acta Automatica Sinica, 2016,42(4): 481-494.
|
[17] |
SHAMIR A , . Identity-based cryptosystems and signature schemes[C]// Proceedings of 1984 Workshop on the Theory and Application of Cryptographic Techniques. Heidelberg:Springer, 1985: 47-53.
|
[18] |
GOYAL V , PANDEY O , SAHAI A ,et al. Attribute-based encryption for finegrained access control of encrypted data[C]// Proceedings of the 13th ACM Conference on Computer and Communications Security. New York:ACM Press, 2006: 89-98.
|
[19] |
BONEH D , SAHAI A , WATERS B . Functional encryption:definitions and challenges[C]// Proceedings of 2011 Theory of Cryptography Conference. Heidelberg:Springer, 2011: 253-273.
|
[20] |
GROTH J , . On the size of pairing-based non-interactive arguments[C]// Proceedings of 2016 Annual International Conference on the Theory and Applications of Cryptographic Techniques. Heidelberg:Springer, 2016: 305-326.
|
[21] |
ABDALLA M , BOURSE F , CARO A D ,et al. Simple functional encryption schemes for inner products[C]// Proceedings of the IACR International Workshop on Public Key Cryptography. Heidelberg:Springer, 2015: 733-751.
|