[1] 熊金波,张媛媛,田有亮,等.基于角色对称加密的云数据安全去重[JI.通信学报, 2018, 39(5):63-77. Xiong J B, Zhang Y Y, Tian Y L, et al. Cloud data security deduplication based on role symmetric encryption[J]. Journal on Communications, 2018, 39(5):63-77. (in Chinese) [2] Xia P. Data security risk and preventive measures of virtual cloud server based on cloud computing[M].[S.l.]:Springer, 2020. [3] Mohamed K S. Cloud, fog, and edge computing[M]. Cham:Springer, 2020. [4] Yang Y, Huang X, Liu X M, et al. A comprehensive survey on secure outsourced computation and its applications[J]. IEEE Access, 2019, 7:159426-159465. [5] Li Z D, Li W M, Jin Z P, et al. An efficient ABE scheme with verifiable outsourced encryption and decryption[J]. IEEE Access, 2019, 7:29023-29037. [6] Tong L, Yu J, Zhang H L. Secure outsourcing algorithm for bilinear pairings without precomputation[C]//2019 IEEE Conference on Dependable and Secure Computing, 2019:1-7. [7] Chen X F, Susilo W, Li J, et al. Efficient algorithms for secure outsourcing of bilinear pairings[J]. Theoretical Computer Science, 2015(562):112-121. [8] Tian H B, Zhang F G, Ren K. Secure bilinear pairing outsourcing made more efficient and flexible[C]//Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. New York:ACM, 2015, 417-426. [9] Ren Y L, Ding N, Wang T Y, et al. New algorithms for verifiable outsourcing of bilinear pairings[J]. Science China Information Sciences, 2016, 59(9):1-3. [10] Dong M, Ren Y L. Efficient and secure outsourcing of bilinear pairings with single server[J]. Science China Information Sciences, 2018, 61(3):1-3. [11] Huang H, Chen X F, Wu Q H, et al. Bitcoin-based fair payments for outsourcing computations of fog devices[J]. Future Generation Computer Systems, 2016, 78(2):850-858. [12] Ateniese G, Goodrich M T, Lekakis V, et al. Accountable storage[C]//International Conference on Applied Cryptography and Network Security. Cham:Springer, 2017:623-644. [13] Boneh D, Franklin M. Identity-based encryption from the weil pairing[C]//Annual International Cryptology Conference. Berlin:Springer, 2001, 2139:213-229 [14] Boneh D, Lynn B, Shacham H. Short signatures from the weil pairing[C]//International Conference on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2001, 2248:514-532 [15] Galbraith S, Paterson K, Smart N. Pairings for cryptographers[J]. Discrete Applied Mathematics, 2008, 156(16):3113-3121. [16] 任艳丽,徐丹婷,张新鹏,等.基于门限环签名的可删除区块链[J].通信学报, 2019, 40(4):71-82. Ren Y L, Xu D T, Zhang X P, et al. Deletable blockchain based on threshold ring signature[J]. Journal on Communications, 2019, 40(4):71-82. (in Chinese) [17] Huang D, Ma X, Zhang S. Performance analysis of the raft consensus algorithm for private blockchains[J]. IEEE Transaction on Systems Man & Cybernetics Systems, 2018, 50(1):172- 181. [18] Aoki Y, Koshizuka N, Seike H. Fork rate-based analysis of the longest chain growth time interval of a PoW blockchain[C]//2019 IEEE International Conference on Blockchain, 2019:253-260. [19] Thilagavathi M. Enhancing blockchain performance using parallel Merkle root and parallel proof of work[J]. Journal of Advanced Research in Dynamical and Control Systems, 2020, 12(1 Special Issue):609-620. [20] Yalla S T, Nikhileenad P. An overview on blockchain technology and its applications[M]. Singapore:Springer, 2020. [21] Ye J, Wang J. Secure outsourcing of modular exponentiation with single untrusted server[C]//IEEE 201518th International Conference on Network-Based Information Systems, 2015:643-645. [22] 沈楠,李瑞琪,贾春福,等.基于密钥协商和身份匿名技术的社交发现隐私保护方案[J]. 四川大学学报(工程科学版), 2019, 51(6):168-174. Shen N, Li R Q, Jia C F, et al. Social discovery privacy protection scheme based on key agreement and identity anonymity technology[J]. Journal of Sichuan University (Engineering Science Edition), 2019, 51(6):168-174. (in Chinese) |