[1] Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System[EB/OL] (2021-01-10)[2022-02-10].https://bitco.in/pdf/bitcoin.pdf. [2] 梅文明,王栋.区块链技术在电力领域应用场景的探索分析[J].电力信息与通信技术,2020,18(2): 21-29. [3] 王心妍,蒋炜,秦龙.区块链技术下电力系统安全测评管理系统的应用[J].电力信息与通信技术,2020,18(6): 68-74. [4] 姜海涛,王祥,李志,等.基于区块链的电力系统安全测评管理系统研究及应用[J].电力信息与通信技术,2020,18(1): 67-73. [5] 熊威,杨彬佑,张睿,等.基于联盟链的分布式能源交易模型研究[J].智慧电力,2020,48(10): 24-29. [6] 吴斯阳,刘晓东,陈志安,等.基于区块链的输变电工程见证取样及检测管理系统研究[J].电子技术与软件工程, 2021(16): 214-217. [7] Y. Ye, L. Zhang, W. You,et al. Secure Decentralized Access Control Policy for Data Sharing in Smart Grid[C]//2021 IEEE Conference on Computer Communications Workshops.IEEE, 2021:1-6. [8] K. Sethi, A. Pradhan,P. Bera. Attribute-Based Data Security with Obfuscated Access Policy for Smart Grid Applications[C]. 2020 International Conference on Communication Systems & Networks, 2020:503-506. [9] 李宏伟,徐彧,吕梓童. 电力区块链的隐私保护机制研究[C]//电力通信技术研究及应用,中国电机工程学会电力通信专业委员会第十二届学术会议.大连, 2019:168-173. [10] Amit Sahai, Brent Waters. Fuzzy Identity-Based Encryption[C]//Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques.2004:457-473. [11] John Bethencourt, Amit Sahai, Brent Waters. Ciphertext-policy attribute-based encryption[C]//In Proceedings of the 2007 IEEE Sympo-sium on Security and Privacy. IEEE Computer Society,Washington, 2007:321-334. [12] Vipul Goyal, Omkant Pandey, Amit Sahai,et al. Attribute-based encryption for fine-grained access control of encrypted data[C]//In Proceedings of the 13th ACM Conference on Computer and Communications Security. New York, 2006:89-98. [13] Christidis K , Devetsikiotis M . Blockchains and Smart Contracts for the Internet of Things[J]. IEEE Access, 2016(4): 2292-2303. [14] Delmolino K , Arnett M , Kos ba A , et al. Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab[C]//International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2016:79-94. [15] Lamport L, Shostak R, Pease M. The Byzantine Generals Problem[J]. ACM Transactions on Programming Languages and Systems, 1982,4(3): 382-401. [16] 高健,曾康,金恒展,等.基于CP-ABE的云存储数据访问控制方案[J].东北大学学报(自然科学版), 2015,36(10): 1416-1421. [17] Guan-Peng L I, Tian Z C, Zhu G L. Database Encryption System Based on ECDH and Rijndael[J]. Computer Engineering, 2013,39(4): 173-172. [18] 王新国,张兵,胡天军,等.基于证书的改进ECDH双向认证及密钥协商协议[J].小型微型计算机系统, 2013,34(12): 2818-2821. |