[1] |
GRIDER D , MAXIMO M . The metaverse:Web 3.0 virtual cloud economies[J]. Grayscale Research, 2021.
|
[2] |
WANG Y T , SU Z , ZHANG N ,et al. A survey on metaverse:fundamentals,security,and privacy[J]. arXiv preprint,2022,arXiv:2203.02662.
|
[3] |
WANG F Y . Parallel intelligence in metaverses:welcome to Hanoi![J]. IEEE Intelligent Systems, 2022,37(1): 16-20.
|
[4] |
沈阳. 元宇宙发展研究报告2.0版[R]. 2022.
|
|
SHEN Y . Metaverse development research report version 2.0[R]. 2022.
|
[5] |
ALOMAR N , ALSALEH M , ALARIFI A . Social authentication applications,attacks,defense strategies and future research directions:a systematic review[J]. IEEE Communications Surveys & Tutorials, 2017,19(2): 1080-1111.
|
[6] |
DUNPHY P , PETITCOLAS F A P . A first look at identity management schemes on the blockchain[J]. IEEE Security & Privacy, 2018,16(4): 20-29.
|
[7] |
ALPáR G , HOEPMAN J H , SILJEE J . The identity crisis.security,privacy and usability issues in identity management[J]. Journal of Information System Security, 2011: 1-15.
|
[8] |
CHRISTOPHER A . The path to self-sovereign identity[Z]. 2016.
|
[9] |
W3C. Decentralized identifiers (DIDs) v1.0[Z]. 2021.
|
[10] |
W3C. Verifiable credentials data model v1.1[Z]. 2022.
|
[11] |
BANDARA E , LIANG X P , FOYTIK P ,et al. A blockchain and self- sovereign identity empowered digital identity platform[C]// Proceedings of 2021 International Conference on Computer Communications and Networks. Piscataway:IEEE Press, 2021: 1-7.
|
[12] |
ZHOU T , LI X F , ZHAO H . EverSSDI:blockchain-based framework for verification,authorisation and recovery of self-sovereign identity using smart contracts[J]. International Journal of Computer Applications in Technology, 2019,60(3): 281.
|
[13] |
BELCHIOR R , PUTZ B , PERNUL G ,et al. SSIBAC:self-sovereign identity based access control[C]// Proceedings of 2020 IEEE 19th International Conference on Trust,Security and Privacy in Computing and Communications. Piscataway:IEEE Press, 2020: 1935-1943.
|
[14] |
SAMIR E , WU H Y , AZAB M ,et al. DT-SSIM:a decentralized trustworthy self-sovereign identity management framework[J]. IEEE Internet of Things Journal, 2022,9(11): 7972-7988.
|
[15] |
STOKKINK Q , ISHMAEV G , EPEMA D ,et al. A truly self-sovereign identity system[C]// Proceedings of 2021 IEEE 46th Conference on Local Computer Networks. Piscataway:IEEE Press, 2021: 1-8.
|
[16] |
VOIGT P , VON DEM BUSSCHE A . The EU general data protection regulation (GDPR)[M]. Switzerland: Springer, 2017.
|
[17] |
KOBLITZ N , MENEZES A , VANSTONE S . The state of elliptic curve cryptography[J]. Designs,Codes and Cryptography, 2000,19(2): 173-193.
|
[18] |
PAILLIER P . Public-key cryptosystems based on composite degree residuosity classes[M]// Advances in cryptology - EUROCRYPT’99. Heidelberg: Springer, 1999: 223-238.
|
[19] |
HANSER C , SLAMANIG D . Structure-preserving signatures on equivalence classes and their application to anonymous credentials[C]// Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security. Heidelberg:Springer, 2014: 491-511.
|
[20] |
SOLTANI R , NGUYEN U T , AN A J . A survey of self-sovereign identity ecosystem[J]. Security and Communication Networks,2021, 2021:8873429.
|
[21] |
LYU Q Y , CHENG S P , LI H ,et al. NSSIA:a new self-sovereign identity scheme with accountability[J]. arXiv preprint,2022 arXiv:2206.04911.
|
[22] |
CHEN J , YAO S X , YUAN Q ,et al. CertChain:public and efficient certificate audit based on blockchain for TLS connections[C]// Proceedings of IEEE INFOCOM 2018-IEEE Conference on Computer Communications. Piscataway:IEEE Press, 2018: 2060-2068.
|