Page 407 - 《软件学报》2025年第8期
P. 407

3830                                                       软件学报  2025  年第  36  卷第  8  期


                 [18]  libsnark. 2023. https://github.com/scipr-lab/libsnark
                 [19]  Ames S, Hazay C, Ishai Y, Venkitasubramaniam M. Ligero: Lightweight sublinear arguments without a trusted setup. In: Proc. of the
                     2017 ACM Sigsac Conf. on Computer and Communications Security. Dallas: ACM, 2017. 2087–2104. [doi: 10.1145/3133956.3134104]
                 [20]  Ben-Sasson  E,  Bentov  I,  Horesh  Y,  Riabzev  M.  Scalable,  transparent,  and  post-quantum  secure  computational  integrity.  Cryptology
                     ePrint Archive, 2018. 046. https://eprint.iacr.org/2018/46
                 [21]  Setty S. Spartan: Efficient and general-purpose zkSNARKs without trusted setup. In: Proc. of the 40th Annual Int’l Cryptology Conf. on
                     Advances in Cryptology. Santa Barbara: Springer, 2020. 704–737. [doi: 10.1007/978-3-030-56877-1_25]
                 [22]  Wahby R S, Tzialla I, Shelat A, Thaler J, Walfish M. Doubly-efficient zkSNARKs without trusted setup. In: Proc. of the 2018 IEEE
                     Symp. on Security and Privacy (SP). San Francisco: IEEE, 2018. 926–943. [doi: 10.1109/SP.2018.00060]
                 [23]  Wang XD, Hirsch C, Kang S, Lacor C. Multi-objective optimization of turbomachinery using improved NSGA-II and approximation
                     model. Computer Methods in Applied Mechanics and Engineering, 2011, 200(9–12): 883–895. [doi: 10.1016/j.cma.2010.11.014]
                 [24]  Yusoff Y, Ngadiman MS, Zain AM. Overview of NSGA-II for optimizing machining process parameters. Procedia Engineering, 2011,
                     15: 3978–3983. [doi: 10.1016/j.proeng.2011.08.745]
                 [25]  Zheng WJ, Liu YF, Doerr B. A first mathematical runtime analysis of the non-dominated sorting genetic algorithm II (NSGA-II). In:
                     Proc. of the 2022 AAAI Conf. on Artificial Intelligence. Palo Alto: AAAI, 2022. 10408–10416. [doi: 10.1609/aaai.v36i9.21283]
                 [26]  Bünz B, Bootle J, Boneh D, Poelstra A, Wuille P, Maxwell G. Bulletproofs: Short proofs for confidential transactions and more. In: Proc.
                     of the 2018 IEEE Symp. on Security and Privacy (SP). San Francisco: IEEE, 2018. 315–334. [doi: 10.1109/SP.2018.00020]
                 [27]  Ben-Sasson E, Chiesa A, Riabzev M, Spooner N, Virza M, Ward NP. Aurora: Transparent succinct arguments for R1CS. In: Proc. of the
                     38th Annual Int’l Conf. on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology. Darmstadt: Springer,
                     2019. 103–128. [doi: 10.1007/978-3-030-17653-2_4]

                             张子龙(2000-), 男, 博士生, 主要研究领域为区                 蒋硕轩(1999-), 男, 硕士, 主要研究领域为区块
                            块链, 数字货币.                                    链, 数字货币.




                             贾林鹏(1995-), 男, 博士, 助理研究员, CCF  专             孙毅(1979-), 男, 博士, 研究员, 博士生导师,
                            业会员, 主要研究领域为区块链高通量技术.                        CCF  杰出会员, 主要研究领域为区块链, 社交
                                                                         视频.
   402   403   404   405   406   407   408   409   410   411   412