[1] 王涛. 信息数据服务平台虚拟资源调度算法设计与分析 [D]. 南京: 南京邮电大学, 2016. Wang Tao. Design and Analysis of Virtual Resource Scheduling Algorithm on Data Service PlatformNanjing[D]. Nanjing: University of Posts and Telecommunications, 2016. [2] Kaufman L M. Data Security in the World of Cloud Computing [J]. IEEE Security & Privacy (S1540-7993), 2009, 7(4): 61-64. [3] Takabi H, Joshi J B D, G J. Security and Privacy Challenges in Cloud Computing Environments [J]. IEEE Security & Privacy (S1540-7993), 2010, 8(6): 24-31. [4] 崔光耀. 2013 年国际十大信息安全热点事件 [J]. 中国信息安全, 2014, 1: 79-80. Cui Guangyao. Ten international information security hotspots in 2013[J]. China Information Security, 2014, 1: 79-80. [5] Cheng H, Min Z, Feng D G. Achieving efficient dynamic cryptographic access control in cloud storage [J]. Journal on Communications (S1000-436X), 2011, 32(7): 125-132. [6] Seo H J, Kim H. Attribute-based Proxy Re-encryption with a Constant Number of Pairing Operations [J]. Journal of Information & Communication Convergence Engineering (S2234-8883), 2012, 10(1): 53-60. [7] Shi Y, Liu J, Han Z, et al. Attribute-based proxy re-encryption with keyword search[J]. PLoS ONE (S1932-6203), 2014, 9(12): e116325. [8] Liang K, Susilo W. Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage [J]. IEEE Transactions on Information Forensics & Security (S1556-6013), 2017, 10(9): 1981-1992. [9] 唐长兵, 杨珍, 郑忠龙, 等. PoW 共识算法中的博弈困境分析与优化 [J]. 自动化学报, 2017, 43(9): 1520-1531. Tang Changbing, Yang Zhen, Zheng Zhonglong, et al. Game Dilemma Analysis and Optimization of PoW Consensus Algorithm [J]. Journal of Automation, 2017, 43(9): 1520-1531. [10] 韩裕光. 互联网金融演化:比特币研究[D]. 安徽大学博士学位论文, 2016. Yuguang Han. Internet Financial Evolution: The Study of Bitcoin[D]. Doctoral dissertation of Anhui University, 2016. [11] Li K, Li H, Hou H, et al. Proof of Vote: A High-Performance Consensus Protocol Based on Vote Mechanism & Consortium Blockchain[C]// IEEE, International Conference on High PERFORMANCE Computing and Communications; IEEE, International Conference on Smart City; IEEE, International Conference on Data Science and Systems. Bangkok, Thailand: IEEE, 2017: 466-473. [12] 平健, 陈思捷, 张宁, 等. 基于智能合约的配电网去中心化交易机制 [J]. 中国电机工程学报, 2017, 37(13): 3682-3690. Ping Jian, Chen Sijie, Zhang Ning, et al. Decentralized Transactive Mechanism in Distribution Network Based on Smart Contract [J]. Proceedings of the CSEE, 2017, 37(13): 3682-3690. [13] Nakagawa T, Hayashibara N. Energy Efficient Raft Consensus Algorithm[C]// International Conference on Network-Based Information Systems. Toronto, Canada: Springer, Cham, 2017: 719-727. [14] Blaze M, Bleumer G, Strauss M. Divertible protocols and atomic proxy cryptography [J]. Lecture Notes in Computer Science (S0302-9743), 1998, 1403: 127-144. [15] 刘梦君, 刘树波, 王颖, 等. 基于LSSS 共享矩阵无授权策略的属性密码解密效率提高方案 [J]. 电子学报, 2015, 43(6): 1065-1072. Liu Mengjun, Liu Shubo, Wang Ying, et al. Optimizaing the decrytion efficiency in LSSS matrix-based attribute-based encryption without given policy [J]. Chinese Journal of Electronics, 2015, 43(6): 1065-1072. [16] Waters B. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization [J]. Lecture Notes in Computer Science (S0302-9743), 2011, 2008: 321-334. [17] Tiwari D, Gangadharan G R. SecCloudSharing: Secure data sharing in public cloud using ciphertext-policy attribute-based proxy re-encryption with revocation [J]. International Journal of Communication Systems (S1099-1131), 2017, 31(4): e3494. [18] 罗恩韬, 王国军, 陈淑红, 等. 移动社交网络中跨域代理重加密朋友发现隐私保护方案研究 [J]. 通信学报, 2017, 38(10): 81-93. Luo Entao, Wang Guojun, Chen Shuhong, et al. Privacy preserving friend discovery cross domain scheme using re-encryption in mobile social networks [J]. Journal on Communications, 2017, 38(10): 81-93. |