[13] |
张方国, 王常杰, 王育民 . 基于椭圆曲线的数字签名与盲签名[J]. 通信学报, 2001(8): 22-28.
|
|
ZHANG F G , WANG C J , WANG Y M . Digital signature and blind signature based in elliptic curve[J]. Journal of China Institute of Communications, 2001(8): 22-28.
|
[14] |
王化群, 张力军, 赵君喜 . 基于椭圆曲线的Schnorr盲签名[J]. 计算机工程与设计, 2005,26(7): 1819-1822.
|
|
WANG H Q , ZHANG L J , ZHAO J X . Schnorr blind signature based on elliptic curve[J]. Computer Engineering and Design, 2005,26(7): 1819-1822.
|
[15] |
SZABO N . Formalizing and securing relation-ships on public networks[DB/OL]. .
|
[16] |
KOSBA A , MILLER A , SHI E ,et al. Hawk:the blockchain model of cryptography and privacy-preserving smart contracts[C]// Security and Privacy. 2016: 839-858.
|
[1] |
CHAUM D . Untraceable electronic mail,return address,and digital pseudonyms[J]. Communications of the ACM, 1981,28(2): 84-88.
|
[2] |
MERRITT M J , . Cryptographic protocols[C]// The Fourteenth ACM Symposium on Theory of Computing. 1982: 383-400.
|
[3] |
苏云学, 逯海军, 祝跃飞 . 一个无需中央机构的电子投票协议[J]. 计算机工程, 2004,30(11): 96-97.
|
|
SU Y X , LU H J , ZHU Y F . An electronic vote protocol without authority[J]. Computer Engineering, 2004,30(11): 96-97
|
[4] |
FUJIOKA A , OKAMOTO T , OHTA K . A practical secret voting scheme for large scale elections[C]// Advances in Cryptology—Ausocrpt’92. 1993.
|
[5] |
丛清日, 胡金初 . 基于椭圆曲线盲数字签名的电子选举[J]. 计算机工程, 2010,36(13): 156-158.
|
|
CONG Q R , HU J C . E-elections based on elliptic curve blind digital signature[J]. Computer Engineering, 2010,36(13): 156-158.
|
[6] |
NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[EB/OL]. .
|
[7] |
田海博, 何杰杰, 付利青 . 基于公开区块链的隐私保护公平合同签署协议[J]. 密码学报, 2017,4(2): 187-198.
|
|
TIAN H B , HE J J , FU L Q . A privacy preserving fair contract signing protocol based on block chains[J]. Journal of Cryptologic Research, 2017,4(2): 187-198.
|
[8] |
Hyperledger-fabricdocs documentation[EB/OL]. .
|
[9] |
KIAYIAS A , ZHOU H S , ZIKAS V . Fair and robust multi-party computation using a global transaction ledger[C]// The Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2016: 705-734.
|
[10] |
MCCORRY P , SHAHANDASHTI S F , HAO F . A smart contract for boardroom voting with maximum voter privacy[C]// Financial Cryptography and Data Security. 2017.
|
[11] |
龚俭, 陆晟, 王倩 . 计算机网络安全导论[M]. 南京: 东南大学出版社, 2005: 144-147.
|
|
GONG J , LU C , WANG Q . Introduction to network security[M]. Nanjing: Southeast University PressPress, 2005: 144-147.
|
[12] |
SCHNEIER B . Applied cryptography,second edition:protocols,algorithms,and source code in C[J]. Government Information Quarterly, 1997,13(3):336.
|