[1] |
YU Y , LIU S M , YEOH P L ,et al. LayerChain:a hierarchical edge-cloud blockchain for large-scale low-delay industrial Internet of Things applications[J]. IEEE Transactions on Industrial Informatics, 2021,17(7): 5077-5086.
|
[2] |
LI H T , GUO F , WANG L L ,et al. A blockchain-based public auditing protocol with self-certified public keys for cloud data[J]. Security and Communication Networks, 2021,2021: 1-10.
|
[3] |
薛锐, 吴迎, 刘牧华 ,等. 可验证计算研究进展[J]. 中国科学:信息科学, 2015,45(11): 1370-1388.
|
|
XUE R , WU Y , LIU M H ,et al. Progress in verifiable computation[J]. Scientia Sinica (Informationis), 2015,45(11): 1370-1388.
|
[4] |
NIGAM R , PATHAK R K , KUMAR A ,et al. PCP framework to expose malware in devices[C]// Proceedings of 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC). Piscataway:IEEE Press, 2020: 1-6.
|
[5] |
杨亚涛, 赵阳, 张卷美 ,等. 同态密码理论与应用进展[J]. 电子与信息学报, 2021(2): 475-487.
|
|
YANG Y T , ZHAO Y , ZHANG J M ,et al. Recent development of theory and application on homomorphic encryption[J]. Journal of Electronics & Information Technology, 2021(2): 475-487.
|
[6] |
CHANG J Y , JI Y Y , SHAO B L ,et al. Certificateless homomorphic signature scheme for network coding[J]. IEEE/ACM Transactions on Networking, 2020,28(6): 2615-2628.
|
[7] |
CHAUM D , PEDERSEN T . Wallet databases with observers[C]// Proceedings of Annual International Cryptology Conference. Berlin:Springer, 1993: 89-105.
|
[8] |
LONE A H , NAAZ R . Demystifying cryptography behind blockchains and a vision for post-quantum blockchains[C]// Proceedings of 2020 IEEE International Conference for Innovation in Technology (INOCON). Piscataway:IEEE Press, 2020: 1-6.
|
[9] |
WANG S P , ZHANG D , ZHANG Y L . Blockchain-based personal health records sharing scheme with data integrity verifiable[J]. IEEE Access, 2019,7: 102887-102901.
|
[10] |
GUO Y , ZHANG C , JIA X H . Verifiable and forward-secure encrypted search using blockchain techniques[C]// Proceedings of ICC 2020 2020 IEEE International Conference on Communications (ICC). Piscataway:IEEE Press, 2020: 1-7.
|
[11] |
GUO R , ZHUANG C Y , SHI H X ,et al. A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing[J]. International Journal of Distributed Sensor Networks, 2020,16(2): 155014772090679.
|
[12] |
DIMITRIOU T . Efficient,coercion-free and universally verifiable blockchain-based voting[J]. Computer Networks, 2020,174: 107234.
|
[13] |
WANG S P , ZHANG Y L , ZHANG Y L . A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems[J]. IEEE Access, 2018,6: 38437-38450.
|
[14] |
DORSALA M R , SASTRY V N , CHAPRAM S . Fair protocols for verifiable computations using bitcoin and Ethereum[C]// Proceedings of 2018 IEEE 11th International Conference on Cloud Computing (CLOUD). Piscataway:IEEE Press, 2018: 786-793.
|
[15] |
ZHANG Y H , DENG R H , SHU J G ,et al. TKSE:trustworthy keyword search over encrypted data with two-side verifiability via blockchain[J]. IEEE Access, 2018,6: 31077-31087.
|
[16] |
YAO H L , WANG C F , HAI B ,et al. Homomorphic hash and blockchain based authentication key exchange protocol for strangers[C]// Proceedings of 2018 Sixth International Conference on Advanced Cloud and Big Data (CBD). Piscataway:IEEE Press, 2018: 243-248.
|
[17] |
REN W , TONG X , DU J ,et al. Privacy-preserving using homomorphic encryption in Mobile IoT systems[J]. Computer Communications, 2021,165: 105-111.
|
[18] |
WANG C , CHOW S S M , WANG Q ,et al. Privacy-preserving public auditing for secure cloud storage[J]. IEEE Transactions on Computers, 2013,62(2): 362-375.
|
[19] |
BUCCAFURRI F , LAX G , NICOLAZZ S ,et al. Range query integrity in cloud data streams with efficient insertion[C]// International Conference on Cryptology and Network Security. Cham:Springer International Publishing, 2016: 719-724.
|
[20] |
武朵朵, 来齐齐, 杨波 . 矩阵乘积的高效可验证安全外包计算[J]. 密码学报, 2017,4(4): 322-332.
|
|
WU D D , LAI Q Q , YANG B . Efficient,verifiable and secure outsourcing of matrix multiplication[J]. Journal of Cryptologic Research, 2017,4(4): 322-332.
|
[21] |
SATHYA A , RAJA S K S . Privacy preservation-based access control intelligence for cloud data storage in smart healthcare infrastructure[J]. Wireless Personal Communications, 2021,118(4): 3595-3614.
|