|
[1] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008. [2] L. Lamport, R. Shostak, and M. Pease, “The byzantine generals problem,” ACM Transactions on Programming Languages and Systems (TOPLAS), vol. 4, no. 3, pp. 382–401, 1982. [3] H. Li, F. Zhang, J. He, and H. Tian, “A searchable symmetric encryption scheme using blockchain,” arXiv preprintrXiv:1711.01030, 2017. [4] A. Back, M. Corallo, L. Dashjr, M. Friedenbach, G. Maxwell, A. Miller, A. Poelstra, J. Timón, and P. Wuille, “Enabling blockchain innovations with pegged sidechains,” [Online] Available: http://www. opensciencereview. com/papers/123/enablingblockchaininnovations-with-pegged-sidechains, 2014. [5] J. Camenisch, D. Derler, S. Krenn, H. C. Pöhls, K. Samelin, and D. Slamanig, “Chameleonhashes with ephemeral trapdoors,” in IACR International Workshop on Public Key Cryptography, pp. 152–182, Springer, 2017. [6] B. Wang, B. Li, H. Li, and F. Li, “Certificateless public auditing for data integrity in the cloud,” in Communications and Network Security (CNS), 2013 IEEE Conference on, pp. 136–144, IEEE, 2013. [7] G. block, “Datacoin: A distributed cryptocurrency with integrated data storage.” [Online] Available:https://datacoin.info/. Accessed August 14, 2017. [8] P. Labs, “Filecoin: A decentralized storage network.” [online]Available:https://news.ycombinator.com/. Accessed August 14, 2017. [9] H. Krawczyk and T. Rabin, “Chameleon signatures.,” in NDSS, 2000.
|