[1] |
Nakamoto S. Bitcoin:A Peer-to-Peer electronic cash system[EB/OL].[2008-10-31].http://www.bitcoin.org.
|
[2] |
Mei Ying.The utilizing blockchain-based method of the secure storage of medical records[J].Journal of Jiangxi Normal University(Natural Science),2017,41(5):484-490.(in Chinese)
|
[3] |
Wang Fei,Shen Su-bin.A solution for decentralized data shar- ing based on blockchain[J].Computer Technology and Development,2020,30(9):115-121.(in Chinese)
|
[4] |
Yue X, Wang H J,Jin D W,et al.Healthcare data gateways:Found healthcare intelligence on blockchain with novel privacy risk control[J].Journal of Medical Systems,2016,40(10):218.1-218.8.
|
[5] |
Arumugam M,Deepa S,Arun G,et al.Secure data sharing for mobile cloud computing using RSA[J].IOP Conference Series:Materials Science and Engineering,2020,1055:012108.
|
[6] |
Li Li, Zeng Qing-xian, Wen Yi-hong,et al.Data sharing scheme based on the blockchain and the proxy re-encryption[J].Netinfo Security,2020,20(8):16-24.(in Chinese)
|
[7] |
Zhang A Q, Lin X D.Towards secure and privacy-preserving data sharing in e-health systems via consortium blockchain[J].Journal of Medical Systems,2018,42(8):140.1-140.18.
|
[8] |
Qin Zhi-guang,Xu Jun,Nie Xu-yun,et al.Summarization of public key searchable encryption system[J].Journal of Information Security,2017,2(3):1-12.(in Chinese)
|
[9] |
Guo Nai-wang,Ni Wei-dong.Privacy protection data sharing based on blockchain[J].Communications Technology,2019,52(8):1982-1986.(in Chinese)
|
[10] |
Koblitz N. Elliptic curve cryptosystems[J]. Mathematics of Computation, 1987, 48(177):203-209.
|
[11] |
Miller V S. Use of elliptic curves in cryptography[M]∥Advances in Cryptology. Williams. Berlin: Springer-Verlag Berlin Heidelberg,1986:417-426.
|
[12] |
Luo Shu-dan.Research on certified key agreement protocol[D].Chengdu:University of Electronic Science and Technology of China,2009.(in Chinese)
|
[13] |
Karati A,Islam S H,Biswas G P.A pairing-free and provably secure certificateless signature scheme[J].Information Sciences,2018,450:378-391.
|
[14] |
Szabo N. Formalizing and securing relationships on public networks[J].First Monday,1997,2(9):1.
|
[15] |
Xie Yu-qing, Wang Yuan, Jiang Ying, et al. Privacy protection method of power grid data lake for data sharing [J]. Computer Engineering and Applications, 2021,57(2):113-118.(in Chinese)
|
[16] |
Yao Hao-nan,Lu Qing-hua,Zhang Wei-shan,et al.Design patterns for data management of blockchain-based systems[J].Computer Systems & Applications,2020,29(7):12-23.(in Chinese)
|
|
附中文参考文献:
|
[2] |
梅颖.安全存储医疗记录的区块链方法研究[J].江西师范大学学报(自然科学版),2017,41(5):484-490.
|
[3] |
汪菲,沈苏彬.一种基于区块链的可信数据共享解决方案[J].计算机技术与发展,2020,30(9):115-121.
|
[6] |
李莉,曾庆贤,文义红,等.基于区块链与代理重加密的数据共享方案[J].信息网络安全,2020,20(8):16-24.
|
[8] |
秦志光,徐骏,聂旭云,等.公钥可搜索加密体制综述[J].信息安全学报,2017,2(3):1-12.
|
[9] |
郭乃网,倪玮栋.基于区块链的隐私保护数据共享[J].通信技术,2019,52(8):1982-1986.
|
[12] |
罗淑丹.认证密钥协商协议的研究[D].成都:电子科技大学,2009.
|
[15] |
谢裕清,王渊,江樱,等.便于数据共享的电网数据湖隐私保护方法[J].计算机工程与应用,2021,57(2):113-118.
|
[16] |
姚浩男,卢清华,张卫山,等.基于区块链的数据管理设计模式[J].计算机系统应用,2020,29(7):12-23.
|