共 26 条
[1]
Buterin V., 2015, White Paper, V3, P2
[3]
Chen J, 2017, IEEE INFOCOM SER
[4]
A secure cross-domain authentication scheme based on threshold signature for MEC
[J].
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS,
2024, 13 (01)
[5]
ZoKrates - Scalable Privacy-Preserving Off-Chain Computations
[J].
IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY,
2018,
:1084-1091
[6]
Fan L., 2023, P ALGORITHMS ARCHITE, P93
[8]
On the Size of Pairing-Based Non-interactive Arguments
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II,
2016, 9666
:305-326
[9]
A Blockchain-based Privacy-Preserving Scheme for Cross-domain Authentication
[J].
2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM,
2022,
:992-999
[10]
Jing Chen, 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications, P2060, DOI 10.1109/INFOCOM.2018.8486344