Page 452 - 《软件学报》2025年第4期
P. 452
1858 软件学报 2025 年第 36 卷第 4 期
Cryptographic Techniques. Brighton: Springer, 1991. 522–526. [doi: 10.1007/3-540-46416-6_47]
[27] Goyal V, Pandey O, Sahai A, Waters B. Attribute-based encryption for fine-grained access control of encrypted data. In: Proc. of the 13th
ACM Conf. on Computer and Communications Security. Alexandria: ACM, 2006. 89–98. [doi: 10.1145/1180405.1180418]
[28] Rouselakis Y, Waters B. Efficient statically-secure large-universe multi-authority attribute- based encryption. In: Proc. of the 19th Int’l
Conf. on Financial Cryptography and Data Security. San Juan: Springer, 2015. 315–332. [doi: 10.1007/978-3-662-47854-7_19]
[29] Lewko A, Waters B. Decentralizing attribute-based encryption. In: Proc. of the 30th Annual Int’l Conf. on the Theory and Applications of
Cryptographic Techniques. Tallinn: Springer, 2011. 568–588. [doi: 10.1007/978-3-642-20465-4_31]
[30] Ben-Sasson E, Chiesa A, Tromer E, Virza M. Succinct non-interactive zero knowledge for a von neumann architecture. In: Proc. of the
23rd USENIX Conf. Security Symp. San Diego: USENIX Association, 2014. 781–796.
[31] Elgamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. on Information Theory, 1985,
31(4): 469–472. [doi: 10.1109/TIT.1985.1057074]
[32] Zheng HB, Wu QH, Qin B, Zhong L, He SY, Liu JW. Linkable group signature for auditing anonymous communication. In: Proc. of the
23rd Australasian Conf. Wollongong: Springer, 2018. 304–321. [doi: 10.1007/978-3-319-93638-3_18]
[33] Okamoto T, Takashima K. Decentralized attribute-based signatures. In: Proc. of the 16th Int’l Conf. on Practice and Theory in Public-key
Cryptography. Nara: Springer, 2013: 125–142. [doi: 10.1007/978-3-642-36362-7_9]
[34] Lu AR, Li WH, Yao YZ, Yu NH. TCABRS: An efficient traceable constant-size attribute-based ring signature scheme for electronic
专业会员, 主
health record system. In: Proc. of the 6th IEEE Int’l Conf. on Data Science in Cyberspace. Shenzhen: IEEE, 2021. 106–113. [doi: 10.1109/
DSC53577.2021.00022]
[35] El Kaafarani A, Chen LQ, Ghadafi E, Davenport J. Attribute-based signatures with user-controlled linkability. In: Proc. of the 13th Int’l
Conf. Heraklion: Springer, 2014. 256–269. [doi: 10.1007/978-3-319-12280-9_17]
[36] El Kaafarani A, Ghadafi E. Attribute-based signatures with user-controlled linkability without random oracles. In: Proc. of the 16th IMA
Int’l Conf. Oxford: Springer, 2017. 161–184. [doi: 10.1007/978-3-319-71045-7_9]
[37] Hong JN, Xue KP, Gai N, Wei DSL, Hong PL. Service outsourcing in F2C architecture with attribute-based anonymous access control
and bounded service number. IEEE Trans. on Dependable and Secure Computing, 2020, 17(5): 1051–1062. [doi: 10.1109/TDSC.2018.
2845381]
[38] Ghaffaripour S, Miri A. A decentralized, privacy-preserving and crowdsourcing-based approach to medical research. In: Proc. of the 2020
IEEE Int’l Conf. on Systems, Man, and Cybernetics. Toronto: IEEE, 2020. 4510–4515. [doi: 10.1109/SMC42975.2020.9283027]
[39] Li M, Weng J, Yang AJ, Lu W, Zhang Y, Hou L, Liu JN, Xiang Y, Deng RH. CrowdBC: A blockchain-based decentralized framework
for crowdsourcing. IEEE Trans. on Parallel and Distributed Systems, 2019, 30(6): 1251–1266. [doi: 10.1109/TPDS.2018.2881735]
[40] Feng W, Yan Z, Yang LT, Zheng QH. Anonymous authentication on trust in blockchain-based mobile crowdsourcing. IEEE Internet of
Things Journal, 2022, 9(16): 14185–14202. [doi: 10.1109/JIOT.2020.3018878]
[41] Botrel G, Piellard T, Tabaie T, et al. Consensys/gnark: v0.10.0. 2024. https://zenodo.org/records/11034183 [doi: 10.5281/zenodo.
5819104]
[42] Josefsson S, Liusvaara I. Edwards-curve digital signature algorithm (EdDSA). 2017. https://www.rfc-editor.org/pdfrfc/rfc8032.txt.pdf
陶静怡(1999-), 女, 硕士生, 主要研究领域为区 阚海斌(1971-), 男, 博士, 特聘教授, CCF 杰出
块链, 属性密码. 会员, 主要研究领域为密码学, 编码理论, 算法与
计算复杂性, 区块链.
张亮(1989-), 男, 博士, 讲师, CCF
要研究领域为区块链, 应用密码学.