Page 452 - 《软件学报》2025年第4期
P. 452

1858                                                       软件学报  2025  年第  36  卷第  4  期


                     Cryptographic Techniques. Brighton: Springer, 1991. 522–526. [doi: 10.1007/3-540-46416-6_47]
                 [27]  Goyal V, Pandey O, Sahai A, Waters B. Attribute-based encryption for fine-grained access control of encrypted data. In: Proc. of the 13th
                     ACM Conf. on Computer and Communications Security. Alexandria: ACM, 2006. 89–98. [doi: 10.1145/1180405.1180418]
                 [28]  Rouselakis Y, Waters B. Efficient statically-secure large-universe multi-authority attribute- based encryption. In: Proc. of the 19th Int’l
                     Conf. on Financial Cryptography and Data Security. San Juan: Springer, 2015. 315–332. [doi: 10.1007/978-3-662-47854-7_19]
                 [29]  Lewko A, Waters B. Decentralizing attribute-based encryption. In: Proc. of the 30th Annual Int’l Conf. on the Theory and Applications of
                     Cryptographic Techniques. Tallinn: Springer, 2011. 568–588. [doi: 10.1007/978-3-642-20465-4_31]
                 [30]  Ben-Sasson E, Chiesa A, Tromer E, Virza M. Succinct non-interactive zero knowledge for a von neumann architecture. In: Proc. of the
                     23rd USENIX Conf. Security Symp. San Diego: USENIX Association, 2014. 781–796.
                 [31]  Elgamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. on Information Theory, 1985,
                     31(4): 469–472. [doi: 10.1109/TIT.1985.1057074]
                 [32]  Zheng HB, Wu QH, Qin B, Zhong L, He SY, Liu JW. Linkable group signature for auditing anonymous communication. In: Proc. of the
                     23rd Australasian Conf. Wollongong: Springer, 2018. 304–321. [doi: 10.1007/978-3-319-93638-3_18]
                 [33]  Okamoto T, Takashima K. Decentralized attribute-based signatures. In: Proc. of the 16th Int’l Conf. on Practice and Theory in Public-key
                     Cryptography. Nara: Springer, 2013: 125–142. [doi: 10.1007/978-3-642-36362-7_9]
                 [34]  Lu AR, Li WH, Yao YZ, Yu NH. TCABRS: An efficient traceable constant-size attribute-based ring signature scheme for electronic
                                                  专业会员, 主
                     health record system. In: Proc. of the 6th IEEE Int’l Conf. on Data Science in Cyberspace. Shenzhen: IEEE, 2021. 106–113. [doi: 10.1109/
                     DSC53577.2021.00022]
                 [35]  El Kaafarani A, Chen LQ, Ghadafi E, Davenport J. Attribute-based signatures with user-controlled linkability. In: Proc. of the 13th Int’l
                     Conf. Heraklion: Springer, 2014. 256–269. [doi: 10.1007/978-3-319-12280-9_17]
                 [36]  El Kaafarani A, Ghadafi E. Attribute-based signatures with user-controlled linkability without random oracles. In: Proc. of the 16th IMA
                     Int’l Conf. Oxford: Springer, 2017. 161–184. [doi: 10.1007/978-3-319-71045-7_9]
                 [37]  Hong JN, Xue KP, Gai N, Wei DSL, Hong PL. Service outsourcing in F2C architecture with attribute-based anonymous access control
                     and bounded service number. IEEE Trans. on Dependable and Secure Computing, 2020, 17(5): 1051–1062. [doi: 10.1109/TDSC.2018.
                     2845381]
                 [38]  Ghaffaripour S, Miri A. A decentralized, privacy-preserving and crowdsourcing-based approach to medical research. In: Proc. of the 2020
                     IEEE Int’l Conf. on Systems, Man, and Cybernetics. Toronto: IEEE, 2020. 4510–4515. [doi: 10.1109/SMC42975.2020.9283027]
                 [39]  Li M, Weng J, Yang AJ, Lu W, Zhang Y, Hou L, Liu JN, Xiang Y, Deng RH. CrowdBC: A blockchain-based decentralized framework
                     for crowdsourcing. IEEE Trans. on Parallel and Distributed Systems, 2019, 30(6): 1251–1266. [doi: 10.1109/TPDS.2018.2881735]
                 [40]  Feng W, Yan Z, Yang LT, Zheng QH. Anonymous authentication on trust in blockchain-based mobile crowdsourcing. IEEE Internet of
                     Things Journal, 2022, 9(16): 14185–14202. [doi: 10.1109/JIOT.2020.3018878]
                 [41]  Botrel  G,  Piellard  T,  Tabaie  T,  et  al.  Consensys/gnark:  v0.10.0.  2024.  https://zenodo.org/records/11034183  [doi:  10.5281/zenodo.
                     5819104]
                 [42]  Josefsson S, Liusvaara I. Edwards-curve digital signature algorithm (EdDSA). 2017. https://www.rfc-editor.org/pdfrfc/rfc8032.txt.pdf

                             陶静怡(1999-), 女, 硕士生, 主要研究领域为区                 阚海斌(1971-), 男, 博士, 特聘教授, CCF  杰出
                            块链, 属性密码.                                    会员, 主要研究领域为密码学, 编码理论, 算法与
                                                                         计算复杂性, 区块链.



                             张亮(1989-), 男, 博士, 讲师, CCF
                            要研究领域为区块链, 应用密码学.
   447   448   449   450   451   452   453   454   455   456   457