SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.
Citation: | Bao-Kun Zheng, Lie-Huang Zhu, Meng Shen, Feng Gao, Chuan Zhang, Yan-Dong Li, Jing Yang. Scalable and Privacy-Preserving Data Sharing Based on Blockchain[J]. Journal of Computer Science and Technology, 2018, 33(3): 557-567. DOI: 10.1007/s11390-018-1840-5 |
[1] |
Sharma S. Expanded cloud plumes hiding big data ecosystem. Future Generation Computer Systems, 2016, 59:63-92.
|
[2] |
Yu Y, Ni J B, Man H A, Mu Y, Wang B Y, Li H. Comments on a public auditing mechanism for shared cloud data service. IEEE Trans. Services Computing, 2015, 8(6):998-999.
|
[3] |
Kandukuri B R, Ramakrishna P V, Rakshit A. Cloud security issues. In Proc. IEEE International Conference on Services Computing (SCC), September 2009, pp.517-520.
|
[4] |
Stinson D R. An explication of secret sharing schemes. Designs, Codes and Cryptography, 1992, 2(4):357-390.
|
[5] |
Beimel A. Secret-sharing schemes:A survey. In Coding and Cryptology, Chee Y M, Guo Z B, Ling S, Shao F J, Tang Y S, Wang H X, Xing C P (eds.), Springer, 2011, pp.11-46.
|
[6] |
Peng K. Critical survey of existing publicly verifiable secret sharing schemes. IET Information Security, 2012, 6(4):249-257.
|
[7] |
Maheshwari N, Kiyawat K. Structural framing of protocol for secure multiparty cloud computation. In Proc. the 5th Asia Modelling Symp. (AMS), July 2011, pp.187-192.
|
[8] |
Hamari J, Sjöklint M, Ukkonen A. The sharing economy:Why people participate in collaborative consumption. Journal of the Association for Information Science and Technology, 2016, 67(9):2047-2059.
|
[9] |
Shamir A. How to share a secret. Communications of the ACM, 1979, 22(11):612-613.
|
[10] |
Blakley G R. Safeguarding cryptographic keys. In Proc. AFIPS 1979 National Computer Conf., June 1979, pp.313-317.
|
[11] |
Antonopoulos A M. Mastering Bitcoin:Unlocking Digital Crypto-Currencies. O'Reilly Media, 2014.
|
[12] |
Rivest R, Shamir A, Adleman L M. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978, 26(2):96-99.
|
[13] |
Paillier P. Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology, Stern J (ed.), Springer, 1999, pp.223-238.
|
[14] |
Lindell Y, Pinkas B. Privacy preserving data mining. Journal of Cryptology, 2002, 15(3):177-206.
|
[15] |
Gaetani E, Aniello L, Baldoni R, Lombardi F, Margheri A, Sassone V. Blockchain-based database to ensure data integrity in cloud computing environments. In Proc. the 1st International Italian Conference on Cybersecurity, January 2017, pp.146-155.
|
[16] |
Ali M, Nelson J, Shea R, Freedman R J. Blockstack:A global naming and storage system secured by blockchains. In Proc. USENIX Annu. Technical Conf. (ACT), June 2016, pp.181-194.
|
[17] |
Liang X P, Shetty S, Tosh D, Kamhoua C, Kwiat K, Njilla L. ProvChain:A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In Proc. the 17th IEEE/ACM International Symposium on Cluster Cloud and Grid Computing (CCGRID), May 2017, pp.468-477.
|
[18] |
Cai C J, Yuan X L, Wang C. Towards trustworthy and private keyword search in encrypted decentralized storage. In Proc. IEEE International Conference on Communications (ICC), May 2017.
|
[19] |
Miller A, Juels A, Shi E, Parno B, Katz J. Permacoin:Repurposing bitcoin work for data preservation. In Proc. IEEE Symp. Security and Privacy (SP), May 2014, pp.475-490.
|
[20] |
Frikken K B. Secure multiparty computation. In Algorithms and Theory of Computation Handbook, Atallah M J (ed.), Chapman and Hall/CRC, 2010.
|
[21] |
Fouque P A, Poupard G, Stern J. Sharing decryption in the context of voting or lotteries. In Financial Cryptography, Frankel Y (ed.), Springer, 2000, pp.90-104.
|
[22] |
Baudron O, Fouque P A, Pointcheval D, Stern J, Poupard G. Practical multi-candidate election system. In Proc. the 20th Annu. ACM Symp. Principles of Distributed Computing (PODC), August 2001, pp.274-283.
|
[1] | Dong-Yu Cao, Hao Yin, Bi-Xin Li. A Random Mixing Scheme for Protecting Transaction Privacy on Ethereum[J]. Journal of Computer Science and Technology, 2025, 40(3): 731-747. DOI: 10.1007/s11390-024-3843-8 |
[2] | Feng Jiang, Huai-Min Wang, Pei-Chang Shi, Xiang Fu, Liao-Liao Feng, Rui Li, Mo-Heng Lin. An Understandable Cross-Chain Authentication Mechanism for JointCloud Computing[J]. Journal of Computer Science and Technology, 2025, 40(3): 621-636. DOI: 10.1007/s11390-025-4733-4 |
[3] | Qi-Feng Shao, Zhao Zhang, Che-Qing Jin, Ao-Ying Zhou. Query Authentication Using Intel SGX for Blockchain Light Clients[J]. Journal of Computer Science and Technology, 2023, 38(3): 714-734. DOI: 10.1007/s11390-022-1007-2 |
[4] | Yi Qin, Qin Hu, Dong-Xiao Yu, Xiu-Zhen Cheng. Generous or Selfish? Weighing Transaction Forwarding Against Malicious Attacks in Payment Channel Networks[J]. Journal of Computer Science and Technology, 2022, 37(4): 888-905. DOI: 10.1007/s11390-022-2032-x |
[5] | Ying Guo, Zhen-Fu Cao, Xiao-Lei Dong. Generalized Goldwasser and Micali's Type Cryptosystem[J]. Journal of Computer Science and Technology, 2022, 37(2): 459-467. DOI: 10.1007/s11390-021-0806-1 |
[6] | Li-De Xue, Ya-Jun Liu, Wei Yang, Wei-Lin Chen, Liu-Sheng Huang. A Blockchain-Based Protocol for Malicious Price Discrimination[J]. Journal of Computer Science and Technology, 2022, 37(1): 266-276. DOI: 10.1007/s11390-021-0583-x |
[7] | Mingming Wang, Qianhong Wu, Bo Qin, Qin Wang, Jianwei Liu, Zhenyu Guan. Lightweight and Manageable Digital Evidence Preservation System on Bitcoin[J]. Journal of Computer Science and Technology, 2018, 33(3): 568-586. DOI: 10.1007/s11390-018-1841-4 |
[8] | Rui Yuan, Yu-Bin Xia, Hai-Bo Chen, Bin-Yu Zang, Jan Xie. ShadowEth: Private Smart Contract on Public Blockchain[J]. Journal of Computer Science and Technology, 2018, 33(3): 542-556. DOI: 10.1007/s11390-018-1839-y |
[9] | Zhimin Gao, Lei Xu, Lin Chen, Xi Zhao, Yang Lu, Weidong Shi. CoC: A Unified Distributed Ledger Based Supply Chain Management System[J]. Journal of Computer Science and Technology, 2018, 33(2): 237-248. DOI: 10.1007/s11390-018-1816-5 |
[10] | Tao Renji, Chen Shihua, Chen Xuemei. FAPKC3: A New Finite Automaton PublicKey Cryptosystem[J]. Journal of Computer Science and Technology, 1997, 12(4): 289-305. |