[1] |
SONG D X, WAGNER D, PERRIG A. Practical Techniques for Searches on Encrypted Data[C]//Proceeding 2000 IEEE Symposium on Security and Privacy.Piscataway:IEEE, 2000: 44-55.
|
[2] |
李经纬, 贾春福, 刘哲理, 等. 可搜索加密技术研究综述[J]. 软件学报, 2015, 26(1):109-128.
|
|
LI Jingwei, JIA Chunfu, LIU Zheli, et al. Research Review on Searchable Encryption Technology[J]. Journal of Software, 2015, 26(1):109-128.
|
[3] |
BONEH D, DI CRESCENZO G, OSTROVSKY R, et al. Public Key Encryption with Keyword Search[C]//Advances in Cryptology -EUROCRYPT 2004. Heidelberg:Springer, 2004:506-522.
|
[4] |
张玉磊, 文龙, 王浩浩, 等. 多用户环境下无证书认证可搜索加密方案[J]. 电子与信息学报, 2020, 42(5):1094-1101.
|
|
ZHANG Yulei, WEN Long, WANG Haohao, et al. A Searchable Encryption Scheme in a Multi-User Environment without Certificate Authentication[J]. Journal of Electronics and Information Technology, 2020, 42(5):1094-1101.
|
[5] |
SUN L, CAO Z, DONG X, et al. LMCLAEKS:LWE-Assisted Multi-Recipient Certificateless Authenticated Encryption with Keyword Search[J]. Information Sciences, 2023,648:119554.
|
[6] |
VARRI U S, PASUPULETI S K, KADAMBARI K V. Practical Verifiable Multi-Keyword Attribute-Based Searchable Signcryption in Cloud Storage[J]. Journal of Ambient Intelligence and Humanized Computing, 2023, 14(9):11455-11467.
|
[7] |
CHAUDHARI P, DAS M L. Privacy Preserving Searchable Encryption with Fine-Grained Access Control[J]. IEEE Transactions on Cloud Computing, 2019, 9(2):753-762.
|
[8] |
CHU C K, WENG J, CHOW S S, et al. Conditional Proxy Broadcast Re-Encryption[C]//Australasian Conference on Information Security and Privacy. Heidelberg:Springer, 2009:327-342.
|
[9] |
翟社平, 陆娴婧, 霍媛媛, 等. 一种改进条件广播代理重加密的数据共享方案[J]. 西安电子科技大学学报, 2024, 51(2):224-238.
|
|
ZHAI Sheping, LU Xianjing, HUO Yuanyuan, et al. An Improved Conditions for Broadcasting Proxy Heavily Encrypted Data Sharing Scheme[J]. Journal of Xidian University, 2024, 51(2):224-238.
|
[10] |
杨亚涛, 蔡居良, 张筱薇, 等. 基于SM9算法可证明安全的区块链隐私保护方案[J]. 软件学报, 2019, 30(6):1692-1704.
|
|
YANG Yatao, CAI Juliang, ZHANG Xiaowei, et al. A Provable Security Blockchain Privacy Protection Scheme Based on SM9 Algorithm[J]. Journal of Software, 2019, 30(6):1692-1704.
|
[11] |
张磊, 郑志勇, 袁勇. 基于区块链的电子医疗病历可控共享模型[J]. 自动化学报, 2021, 47(9):2143-2153.
|
|
ZHANG Lei, ZHENG Zhiyong, YUAN Yong. Controllable Sharing Model of Electronic Medical Record Based on Blockchain[J]. Acta Automatica Sinica, 2021, 47(9):2143-2153.
|
[12] |
牛淑芬, 陈俐霞, 李文婷, 等. 基于区块链的电子病历数据共享方案[J]. 自动化学报, 2022, 48(8):2028-2038.
|
|
NIU Shufen, CHEN Lixia, LI Wenting, et al. Electronic Medical Record Data Sharing Scheme Based on Blockchain[J]. Acta Automatica Sinica, 2022, 48(8):2028-2038.
|
[13] |
牛淑芬, 刘文科, 陈俐霞, 等. 基于联盟链的可搜索加密电子病历数据共享方案[J]. 通信学报, 2020, 41(8):204-214.
doi: 10.11959/j.issn.1000-436x.2020116
|
|
NIU Shufen, LIU Wenke, CHEN Lixia, et al. A Searchable Encrypted Electronic Medical Record Data Sharing Scheme Based on Alliance Chain[J]. Journal of Communications, 2020, 41(8):204-214.
|
[14] |
TIAN M, ZHANG Y, ZHU Y, et al. BPPIR:Blockchain-Assisted Privacy-Preserving Similarity Image Retrieval over Multiple Clouds[J]. Journal of King Saud University-Computer and Information Sciences, 2023, 35(1):324-334.
|
[15] |
杜瑞忠, 谭艾伦, 田俊峰. 基于区块链的公钥可搜索加密方案[J]. 通信学报, 2020, 41(4):114-122.
doi: 10.11959/j.issn.1000-436x.2020070
|
|
DU Ruizhong, TAN Ailun, TIAN Junfeng. Public Key Searchable Encryption Scheme Based on Blockchain[J]. Journal on Communications, 2020, 41(4):114-122.
doi: 10.11959/j.issn.1000-436x.2020070
|
[16] |
牛淑芬, 谢亚亚, 杨平平, 等. 加密邮件系统中基于身份的可搜索加密方案[J]. 电子与信息学报, 2020, 42(7):1803-1810.
|
|
NIU Shufen, XIE Yaya, YANG Pingping, et al. Identity-Based Searchable Encryption Scheme in Encrypted Mail System[J]. Journal of Electronics and Information Technology, 2020, 42(7):1803-1810.
|
[17] |
郑东, 朱天泽, 郭瑞. 基于区块链的多用户环境中公钥可搜索加密方案[J]. 通信学报, 2021, 42(10):140-152.
doi: 10.11959/j.issn.1000-436x.2021130
|
|
ZHENG Dong, ZHU Tianze, GUO Rui. Public-Key Searchable Encryption Scheme in Multi-User Environment Based on Blockchain[J]. Journal of Communications, 2021, 42(10):140-152.
|
[18] |
牛淑芬, 韩松, 谢亚亚, 等. 基于区块链的多关键字属性基可搜索加密方案[J]. 信息安全学报, 2023, 8(1):131-143.
|
|
NIU Shufen, HAN Song, XIE Yaya, et al. A Searchable Encryption Scheme Based on Multi-Keyword Attribute Base Based on Blockchain[J]. Journal of Information Security, 2023, 8(1):131-143.
|
[19] |
翟社平, 童彤, 白喜芳. 基于区块链的属性代理重加密数据共享方案[J]. 计算机工程与应用, 2023, 59(8):270-279.
doi: 10.3778/j.issn.1002-8331.2205-0115
|
|
ZHAI Sheping, TONG Tong, BAI Xifang. Reencryption Data Sharing Scheme of Attribute Proxy Based on Blockchain[J]. Computer Engineering and Applications, 2023, 59(8):270-279.
doi: 10.3778/j.issn.1002-8331.2205-0115
|
[20] |
韩笑, 曾琦, 曹永明. 一种有效的带关键字搜索的代理重加密方案[J]. 计算机与现代化, 2019(3):117-121.
|
|
HAN Xiao, ZENG Qi, CAO Yongming. An Effective Proxy Re-Encryption Scheme with Keyword Search[J]. Computer and Modernization, 2019(3):117-121.
|
[21] |
WANG Y H, CAI S B, LIN C L, et al. Study of Blockchain’s Consensus Mechanism Based on Credit[J]. IEEE Access, 2019,7:10224-10231.
|
[22] |
ZHU S C, ZHANG Z Y, CHEN L Q, et al. A PBFT Consensus Scheme with Reputation Value Voting Based on Dynamic Clustering[C]//Security and Privacy in Digital Economy: First International Conference,SPDE 2020.Heidelberg:Springer, 2020:336-354.
|
[23] |
吴晓彤, 柳平增. 基于备选投票机制的低时延PBFT改进研究[J]. 计算机工程, 2021, 47(7):117-125,134.
doi: 10.19678/j.issn.1000-3428.0058362
|
|
WU Xiaotong, LIU Pingzeng. Research on Improvement of Low-Delay PBFT Based on Alternative Voting Mechanism[J]. Computer Engineering, 2021, 47(7):117-125,134.
doi: 10.19678/j.issn.1000-3428.0058362
|
[24] |
陈润宇, 王伦文, 朱然刚. 基于信誉值投票与随机数选举的PBFT共识算法[J]. 计算机工程, 2022, 48(6):42-49,56.
doi: 10.19678/j.issn.1000-3428.0063904
|
|
CHEN Runyu, WANG Lunwen, ZHU Rangang. PBFT Consensus AlgorithmBased on Reputation Voting and Random Number Election[J]. Computer Engineering, 2022, 48(6):42-49,56.
doi: 10.19678/j.issn.1000-3428.0063904
|