Page 451 - 《软件学报》2025年第4期
P. 451

陶静怡 等: 基于区块链和去中心化可问责属性认证的众包方案                                                   1857


                  [3]  Feng W, Yan Z. MCS-Chain: Decentralized and trustworthy mobile crowdsourcing based on blockchain. Future Generation Computer
                     Systems, 2019, 95: 649–666. [doi: 10.1016/j.future.2019.01.036]
                  [4]  Tan L, Xiao H, Shang XL, Wang Y, Ding F, Li WJ. A blockchain-based trusted service mechanism for crowdsourcing system. In: Proc.
                     of the 91st IEEE Vehicular Technology Conf. Antwerp: IEEE, 2020. 1–6. [doi: 10.1109/VTC2020-Spring48590.2020.9128425]
                  [5]  Chaum D. Blind signatures for untraceable payments. In: Chaum D, Rivest RL, Sherman AT, eds. Advances in Cryptology. Boston:
                     Springer, 1983. 199–203. [doi: 10.1007/978-1-4757-0602-4_18]
                  [6]  Camenisch J, Lysyanskaya A. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In:
                     Proc. of the 2001 Int’l Conf. on the Theory and Application of Cryptographic Techniques. Innsbruck: Springer, 2001. 93–118. [doi: 10.
                     1007/3-540-44987-6_7]
                  [7]  Chaum D, van Heyst E. Group signatures. In: Proc. of the 1991 Workshop on the Theory and Application of Cryptographic Techniques.
                     Brighton: Springer, 1991. 257–265. [doi: 10.1007/3-540-46416-6_22]
                  [8]  Liu JK, Yuen TH, Zhou JY. Forward secure ring signature without random oracles. In: Proc. of the 13th Int’l Conf. on Information and
                     Communications Security. Beijing: Springer, 2011. 1–14. [doi: 10.1007/978-3-642-25243-3_1]
                  [9]  Li J, Au MH, Susilo W, Xie DQ, Ren K. Attribute-based signature and its applications. In: Proc. of the 5th ACM Symp. on Information,
                     Computer and Communications Security. Beijing: ACM, 2010. 60–69. [doi: 10.1145/1755688.1755697]

                 [10]  Tan SY, Groß T. MoniPoly—An expressive q-SDH-based anonymous attribute-based credential system. In: Proc. of the 26th Int’l Conf.
                     on the Theory and Application of Cryptology and Information Security. Daejeon: Springer, 2020. 498–526. [doi: 10.1007/978-3-030-
                     64840-4_17]
                 [11]  Gu K, Wang KM, Yang LL. Traceable attribute-based signature. Journal of Information Security and Applications, 2019, 49: 102400.
                     [doi: 10.1016/j.jisa.2019.102400]
                 [12]  Kaaniche N, Laurent M. Attribute-based signatures for supporting anonymous certification. In: Proc. of the 21st European Symp. on
                     Research in Computer Security. Heraklion: Springer, 2016. 279–300. [doi: 10.1007/978-3-319-45744-4_14]
                 [13]  Ding SL, Zhao YM, Liu YY. Efficient traceable attribute-based signature. In: Proc. of the 13th IEEE Int’l Conf. on Trust, Security and
                     Privacy in Computing and Communications. Beijing: IEEE, 2014. 582–589. [doi: 10.1109/TrustCom.2014.74]
                 [14]  Guo YW, Tang HK, Tan AD, Xu L, Gai KK, Jia XW. A privacy-preserving auditable approach using threshold tag-based encryption in
                     consortium blockchain. In: Proc. of the 6th Int’l Conf. on Smart Computing and Communication. New York: Springer, 2022. 265–275.
                     [doi: 10.1007/978-3-030-97774-0_24]
                 [15]  Zheng HB, Wu QH, Guan ZY, Qin B, He SY, Liu JW. Achieving liability in anonymous communication: Auditing and tracing. Computer
                     Communications, 2019, 145: 1–13. [doi: 10.1016/j.comcom.2019.05.021]
                 [16]  Hwang JY, Chen LQ, Cho HS, Nyang D. Short dynamic group signature scheme supporting controllable linkability. IEEE Trans. on
                     Information Forensics and Security, 2015, 10(6): 1109–1124. [doi: 10.1109/TIFS.2015.2390497]
                 [17]  Fujisaki E, Suzuki K. Traceable ring signature. In: Proc. of the 10th Int’l Conf. on Practice and Theory in Public-key Cryptography.
                     Beijing: Springer, 2007. 181–200. [doi: 10.1007/978-3-540-71677-8_13]
                 [18]  Au MH, Liu JK, Susilo W, Yuen TH. Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction.
                     Theoretical Computer Science, 2013, 469: 1–14. [doi: 10.1016/j.tcs.2012.10.031]
                 [19]  Rahaman  S,  Cheng  L,  Yao  DF,  Li  H,  Park  JM.  Provably  secure  anonymous-yet-accountable  crowdsensing  with  scalable  sublinear
                     revocation. Proc. on Privacy Enhancing Technologies, 2017, 2017(4): 384–403. [doi: 10.1515/popets-2017-0055]
                 [20]  Lin C, He DB, Zeadally S, Kumar N, Choo KKR. SecBCS: A secure and privacy-preserving blockchain-based crowdsourcing system.
                     Science China Information Sciences, 2020, 63(3): 130102. [doi: 10.1007/s11432-019-9893-2]
                 [21]  Lu Y, Tang Q, Wang GL. ZebraLancer: Private and anonymous crowdsourcing system atop open blockchain. In: Proc. of the 38th IEEE
                     Int’l Conf. on Distributed Computing Systems. Vienna: IEEE, 2018. 853–865. [doi: 10.1109/ICDCS.2018.00087]
                 [22]  Li P, Lai JZ, Wu YD. Accountable attribute-based authentication with fine-grained access control and its application to crowdsourcing.
                     Frontiers of Computer Science, 2023, 17(1): 171802. [doi: 10.1007/s11704-021-0593-4]
                 [23]  Chen F, Wang JH, Jiang CK, Xiang T, Yang YY. Blockchain based non-repudiable IoT data trading: Simpler, faster, and cheaper. In:
                     Proc. of the 2022 IEEE Conf. on Computer Communications. London: IEEE, 2022. 1958–1967. [doi: 10.1109/INFOCOM48880.2022.
                     9796857]
                 [24]  Shamir A. How to share a secret. Communications of the ACM, 1979, 22(11): 612–613. [doi: 10.1145/359168.359176]
                 [25]  Blakley GR. Safeguarding cryptographic keys. In: Proc. of the 1979 Int’l Workshop on Managing Requirements Knowledge. New York:
                     IEEE, 1979. 313–313. [doi: 10.1109/MARK.1979.8817296]
                 [26]  Pedersen  TP.  A  threshold  cryptosystem  without  a  trusted  party.  In:  Proc.  of  the  1991  Workshop  on  the  Theory  and  Application  of
   446   447   448   449   450   451   452   453   454   455   456