Page 139 - 《软件学报》2026年第1期
P. 139
136 软件学报 2026 年第 37 卷第 1 期
3345649]
[116] Durumeric Z, Ma Z, Springall D, Barnes R, Sullivan N, Bursztein E, Bailey M, Halderman JA, Paxson V. The security impact of
HTTPS interception. In: Proc. of the 2017 Network and Distributed System Security (NDSS) Symp. 2017. San Diego, 2017.
[117] Wang XW, Zhao H, Zhu JK. GRPC: A communication cooperation mechanism in distributed systems. ACM SIGOPS Operating
Systems Review, 1993, 27(3): 75–86. [doi: 10.1145/155870.155881]
[118] CMBaaS. 2024 (in Chinese). https://it.10086.cn/services/cmbaas/
[119] Demers A, Greene D, Hauser C, Irish W, Larson J, Shenker S, Sturgis H, Swinehart D, Terry D. Epidemic algorithms for replicated
database maintenance. In: Proc. of the 6th Annual ACM Symp. on Principles of Distributed Computing. Vancouver: ACM, 1987. 1–12.
[doi: 10.1145/41840.41841]
[120] Wang X, Jiang X, Liu YX, Wang JP, Sun Y. Data propagation for low latency blockchain systems. IEEE Journal on Selected Areas in
Communications, 2022, 40(12): 3631–3644. [doi: 10.1109/JSAC.2022.3213330]
[121] Banerjee-Mishra T, Sahni S. PubSub: An efficient publish/subscribe system. IEEE Trans. on Computers, 2015, 64(4): 1119–1132. [doi:
10.1109/TC.2014.2315636]
[122] Gervais A, Karame GO, Wüst K, Glykantzis V, Ritzdorf H, Capkun S. On the security and performance of proof of work blockchains.
In: Proc. of the 2016 ACM SIGSAC Conf. on Computer and Communications Security. Vienna: ACM, 2016. 3–16. [doi: 10.1145/
2976749.2978341]
[123] Kiayias A, Russell A, David B, Oliynykov R. Ouroboros: A provably secure proof-of-stake blockchain protocol. In: Proc. of the 37th
Annual Int’l Cryptology Conf. on Advances in Cryptology. Santa Barbara: Springer, 2017. 357–388. [doi: 10.1007/978-3-319-63688-
7_12]
[124] Castro M, Liskov B. Practical Byzantine fault tolerance. In: Proc. of the 3rd Symp. on Operating Systems Design and Implementation.
New Orleans: USENIX Association, 1999. 173–186.
[125] Veronese GS, Correia M, Bessani AN, Lung LC, Verissimo P. Efficient Byzantine fault-tolerance. IEEE Trans. on Computers, 2013,
62(1): 16–30. [doi: 10.1109/TC.2011.221]
[126] Buchman E. Tendermint: Byzantine fault tolerance in the age of blockchains [MS. Thesis]. Guelph: The University of Guelph, 2016.
[127] Castro M, Liskov B. Practical Byzantine fault tolerance and proactive recovery. ACM Trans. on Computer Systems, 2002, 20(4):
398–461. [doi: 10.1145/571637.571640]
[128] Decouchant J, Kozhaya D, Rahli V, Taïani F, Zappa N. DAMYSUS: Streamlined BFT consensus leveraging trusted components. In:
Proc. of the 17th European Conf. on Computer Systems (EuroSys 2022). Rennes: ACM, 2022. 1–16. [doi: 10.1145/3492321.3519568]
[129] MAXBFT. The self-developed assembly line consensus algorithm project of Changan Chain 2.0 version. 2024 (in Chinese). https://git.
chainmaker.org.cn/chainmaker/consensus-maxbft
[130] Micali S, Rabin M, Vadhan S. Verifiable random functions. In: Proc. of the 40th Annual Symp. on Foundations of Computer Science.
New York: IEEE, 1999. 120–130. [doi: 10.1109/SFFCS.1999.814584]
[131] Vyper. Overview. 2024. https://docs.vyperlang.org/en/stable/
[132] WebAssembly. Guides. 2024. https://developer.mozilla.org/en-US/docs/WebAssembly
[133] Docker. Dockerdocs. 2024. https://docs.docker.com/docker-hub/
[134] Kubernetes. Kubernetes documentation. 2024. https://kubernetes.io/docs/home/
[135] Bathula PN, Sreenivasulu M. An integrated blockchain framework for secure data sharing in IoT fog computing. Tsinghua Science and
Technology, 2025, 30(3): 957–977. [doi: 10.26599/TST.2024.9010082]
[136] Wang C, Zhang N, Wang C. Managing privacy in the digital economy. Fundamental Research, 2021, 1(5): 543–551. [doi: 10.1016/J.
FMRE.2021.08.009]
[137] Lindell Y. Secure multiparty computation. Communications of the ACM, 2020, 64(1): 86–96. [doi: 10.1145/3387108]
[138] Martins P, Sousa L, Mariano A. A survey on fully homomorphic encryption: An engineering perspective. ACM Computing Surveys,
2017, 50(6): 83. [doi: 10.1145/3124441]
[139] Bender A, Katz J, Morselli R. Ring signatures: Stronger definitions, and constructions without random oracles. Journal of Cryptology,
2009, 22(1): 114–138. [doi: 10.1007/s00145-007-9011-9]
[140] Sabt M, Achemlal M, Bouabdallah A. Trusted execution environment: What it is, and what it is not. In: Proc. of the 2015 IEEE Trustcom/
BigDataSE/ISPA. Helsinki: IEEE, 2015. 57–64. [doi: 10.1109/Trustcom.2015.357]
[141] Zamani M, Movahedi M, Raykova M. RapidChain: Scaling blockchain via full sharding. In: Proc. of the 2018 ACM SIGSAC Conf. on
Computer and Communications Security. Toronto: ACM, 2018. 931–948. [doi: 10.1145/3243734.3243853]
[142] Xiong A, Zhang W, Song Y, Wang D, Li D, Guo QL, Bai DS. Asynchronous consensus algorithm integrating dynamic weight sharding

