计算机与控制工程 |
|
|
|
|
区块链中可公开验证密钥共享技术 |
何苗1,2(),柏粉花1,2,于卓3,沈韬1,2,*() |
1. 昆明理工大学 信息工程与自动化学院,云南 昆明 650500 2. 昆明理工大学 云南省计算机技术应用重点实验室,云南 昆明 650500 3. 北京中电普华信息技术有限公司,北京 100192 |
|
Publicly verifiable secret sharing technology in blockchain |
Miao HE1,2(),Fen-hua BAI1,2,Zhuo YU3,Tao SHEN1,2,*() |
1. Faculty of Information Engineering and Automation, Kunming University of Science and Technology, Kunming 650500, China 2. Yunnan Key Laboratory of Computer Technologies Application, Kunming University of Science and Technology, Kunming 650500, China 3. Beijing Chain-Power Information Technology Limited Company, Beijing 100192, China |
引用本文:
何苗,柏粉花,于卓,沈韬. 区块链中可公开验证密钥共享技术[J]. 浙江大学学报(工学版), 2022, 56(2): 306-312.
Miao HE,Fen-hua BAI,Zhuo YU,Tao SHEN. Publicly verifiable secret sharing technology in blockchain. Journal of ZheJiang University (Engineering Science), 2022, 56(2): 306-312.
链接本文:
https://www.zjujournals.com/eng/CN/10.3785/j.issn.1008-973X.2022.02.011
或
https://www.zjujournals.com/eng/CN/Y2022/V56/I2/306
|
1 |
FERRAG M A, SHU L, YANG X, et al. Security and privacy for green IoT-based agriculture: review, blockchain solutions, and challenges [J]. IEEE Access, 2020, 8: 32031-32053.
|
2 |
NING Z, ZHANG K, WANG X, et al. Intelligent edge computing in internet of vehicles: a joint computation offloading and caching solution[J]. IEEE Transactions on Intelligent Transportation Systems, 2020, 22(4): 2212-2225.
|
3 |
SINGH R P, JAVAID M, HALEEM A, et al. Internet of things (IoT) applications to fight against COVID-19 pandemic[J]. Diabetes and Metabolic Syndrome: Clinical Research and Reviews, 2020, 14(4): 521-524.
|
4 |
TRELEAVEN P, BROWN R G, YANG D J C Blockchain technology in finance[J]. Computer, 2017, 50 (9): 14- 17
doi: 10.1109/MC.2017.3571047
|
5 |
FANNING K, CENTERS D. Blockchain and its coming impact on financial services[J]. Journal of Corporate Accouting and Finance, 2016, 27(5): 53-57.
|
6 |
GUNDUZ M Z, DAS R. Cyber-security on smart grid: threats and potential solutions[J]. Computer Networks, 2020, 169: 107094.
|
7 |
MOLLENKOPF D A, OZANNE L K, STOLZE H. A transformative supply chain response to COVID-19[J]. Journal of Service Management, 2020, 32(2): 190-202.
|
8 |
CHAIN I S. Data, not digitalization, transforms the post-pandemic supply chain[EB/OL]. [2021-08-01]. https://sloanreview.mit.edu/article/data-not-digitalization-transforms-the-post-pandemic-supply-chain/.
|
9 |
ZHOU Q, HUANG H, ZHENG Z, et al. Solutions to scalability of blockchain: a survey[J]. IEEE Access, 2020, 8: 16440-16455.
|
10 |
WANG J, YANG Y, WANG T, et al. Big data service architecture: a survey[J]. Journal of Internet Technology, 2020, 21(2): 393-405.
|
11 |
VAISHYA R, JAVAID M, KHAN I H, et al. Artificial Intelligence (AI) applications for COVID-19 pandemic[J]. Diabetes and Metabolic Syndrome: Clinical Research and Reviews, 2020, 14(4): 337-339.
|
12 |
蒋勇. 白话区块链[M]. 北京: 机械工业出版社, 2017.
|
13 |
周健, 屈冉 一种抗合谋攻击的区块链私钥管理方案[J]. 计算机工程, 2020, 46 (11): 29- 34 ZHOU Jian, QU Ran A private key management scheme on blockchain against collusion attacks[J]. Computer Engineering, 2020, 46 (11): 29- 34
|
14 |
PANDA S S, JWNA D, MOHANTA B K, et al. Authentication and key management in distributed iot using blockchain technology[EB/OL]. [2021-08-01]. https://www.researchgate.net/publication/349824619_Authentication_and_Key_Management_in_Distributed_IoT_Using_Blockchain_Technology.
|
15 |
LUSETTI M, SALAI L, DALLATANA A A blockchain based solution for the custody of digital files in forensic medicine[J]. Forensic Science International: Digital Investigation, 2020, 35: 301017
doi: 10.1016/j.fsidi.2020.301017
|
16 |
GURI M. Beatcoin: leaking private keys from air-gapped cryptocurrency wallets [C]// 2018 IEEE International Conference on Internet of Things and IEEE Green Computing and Communications and IEEE Cyber, Physical and Social Computing and IEEE Smart Data. Halifax: IEEE, 2018: 1308-1316.
|
17 |
XIAO Y, ZHANG P, LIU Y, et al Secure and efficient multi-signature schemes for fabric: an enterprise blockchain platform[J]. IEEE Transactions on Information Forensics and Security, 2020, 16: 1782- 1794
|
18 |
PAL O, ALAM B, THAKUR V, et al. Key management for blockchain technology [J]. ICT Express, 2021, 7(1): 76-80.
|
19 |
GUTOSKI G, STEBILA D. Hierarchical deterministic bitcoin wallets that tolerate key leakage [C]// International Conference on Financial Cryptography and Data Security. [S.l.]: Springer, 2015: 497-504.
|
20 |
WANG Y, HOU Q, ZHANG X, et al Dynamic threshold signature scheme based on Chinese remainder theorem[J]. Journal of Computer Applications, 2018, 38 (4): 1041- 1045
|
21 |
YU M, ZHANG J, WANG J, et al. Internet of Things security and privacy-preserving method through nodes differentiation, concrete cluster centers, multi-signature, and blockchain[J]. International Journal of Distributed Sensor Networks, 2018, 14(12): 1550147718815842.
|
22 |
ZHU Y, XIA L, SENEVIRATNE O. A proposal for account recovery in decentralized applications [C]// 2019 IEEE International Conference on Blockchain. [S.l.]: IEEE, 2019: 148-155.
|
23 |
GENNARO R, GOLDFEDER S, NARAYANAN A. Threshold-optimal DSA/ECDSA signatures and an application to bitcoin wallet security [C]// International Conference on Applied Cryptography and Network Security. [S.l.]: Springer, 2016.
|
24 |
DIKSHIT P, SINGH K. Efficient weighted threshold ECDSA for securing bitcoin wallet[C]// 2017 ISEA Asia Security and Privacy. Surat: IEEE, 2016, 2: 43-51.
|
25 |
LI Q, ZHOU Y. Research and application based on A. Shamir’s (t, n) threshold secret sharing scheme [C]// 7th International Conference on Computer Science and Education. Melbourne: IEEE, 2012: 671-674.
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|