[1] D. Chaum, “Blind Signatures for Untraceable Payments,” Advances in Cryptology, Springer, US, pp. 199-203, 1983 [2] D. Chaum, “Untraceable Electronic Cash,”Advances in Cryptology, pp. 319-327, 1988 [3] A. Narayanan and J. Clark, “Bitcoin’s Academic Pedigree,” Communications of the ACM, Vol. 60, No. 12, pp 36-45, 2017 [4] Y. Yuan and F. Y. Wang, “Development Status and Prospects of Blockchain Technology,” Journal of Automation, Vol. 42, No. 4, pp. 481-494, 2016 [5] H. Xie and J. Wang, “Blockchain Technology and its Application,”Information Network Security, No. 9, pp. 192-195, 2016 [6] Y. Zhu, G. H. Gan, D. Deng, et al., “Research on Security in Blockchain Key Technologies,” Information Security Research, Vol. 2, No. 12, pp. 1090-1097, 2016 [7] R. C. Merkle, “Protocols for Public Key Cryptosystems,” IEEE Symposium on Security and Privacy, No. 3, pp. 122, April 1980 [8] P. Bailis, A. Narayanan, A. Miller,S. Han, “Research for Practice: Cryptocurrencies, Blockchains, and Smart Contracts; Hardware for Deep Learning,” Communications of The ACM, Vol. 60, No. 5, pp. 48-51, July 2017 [9] X. Shen, Q. Q.Pei and X. F. Liu, “The Blockchain Technology,” Network and Information Security Journal, Vol. 2, No. 11, 2016 [10] Y. Sompolinsky and A. Zohar, “Bitcoin’s Security Model Revisited,” October 2016 [11] P. Zhou, “China Blockchain Technology and Application Development White Paper,” Ministry of Industry and Information Technology, Beijing, China, October 2016 [12] D. E.Denning and M. Smid, “Key Escrowing Today,” Communications Magazine IEEE, Vol. 32, No. 9, pp. 58-68, September 1994 [13] A. Shamir, “Partial Key Escrow: A New Approach to Software Key Escrow,” in Proceedings of the Key Escrow Conference, Washington, 1995 [14] Y. Li, L. N.Lei and Y. Zhu, “Research on Ciphertext Access Control and its Application,” Information Security Research, Vol. 2, No. 8, pp. 721-728, 2016 [15] J. S. Su, D. Cao, X. F. Wang, et al., “Attribute-based Encryption Mechanism,” Chinese Journal of Software, Vol. 22, No. 6, pp.1299-1315, 2011 [16] D. G.Geng and C. Chen, “Research on Attribute Cryptography,” Chinese Journal of Cryptography, Vol. 1, No. 1, pp. 1-12, 2014 [17] L. Lin, J. Huai and X. X. Li, “Attribute-based Access Control Strategy Synthesis Algebra,” Journal of Software, Vol. 20, No. 2, pp. 403-414, 2009 [18] Z. R. Shen, W. Xue and J. W. Shu, “Research and Development of Searchable Encryption Mechanism,” Journal of Software, Vol. 25, No. 4, pp. 880-895, 2014 [19] Y. Q. Ye, “Blockchain and Protection of Digital Identity Security,”Financial and Technological Times, No. 12, pp. 92-93, 2016 [20] B. Pinkas and T. Sander, “Securing Passwords Against Dictionary Attacks,” inProceedings of ACM Conference on Computer and Communications Security, pp. 161-170, November 2002 |