参考文献/References:
[1]MIRABELLI G, SOLINA V. Blockchain and agricultural supply chains traceability:research trends and future challenges[J]. Procedia Manufacturing,2020,42:414-421.
[2]VANGALA A, DAS A K, KUMAR N, et al. Smart secure sensing for IoT-based agriculture:blockchain perspective[J]. IEEE Sensors Journal,2021,21(16):17591-17607.
[3]TENG Y, CHEN X L, YU Z G, et al. Research on the evolutionary Decision-Making behavior among the government, farmers, and consumers: based on the quality and safety of agricultural products [J]. IEEE Access,2021,9:73747-73756.
[4]于华竟,徐大明,罗娜,等. 杂粮供应链区块链多链追溯监管模型设计[J]. 农业工程学报,2021,37(20):323-332.
[5]钱文君,沈晴霓,吴鹏飞,等. 大数据计算环境下的隐私保护技术研究进展[J]. 计算机学报,2022,45(4):669-701.
[6]孙传恒,于华竟,罗娜,等. 基于智能合约的果蔬区块链溯源数据存储方法研究[J]. 农业机械学报,2022,53(8):361-370.
[7]巫光福,余攀,王柯柯. 双链式区块链交易监管研究[J]. 计算机工程与应用,2020,56(23):116-123.
[8]张新,彭祥贞,许继平,等. 基于区块链智能合约的稻米供应链动态监管模型[J]. 农业机械学报,2022,53(1):370-382.
[9]AZARIA A, EKBLAW A, VIEIRA T, et al. MedRec: using blockchain for medical data access and permission management [C]. Vienna,Austria:IEEE,2016:25-30.
[10]ZHANG M, WANG S, ZHANG P, et al. Protecting data privacy for permissioned blockchains using identity-based encryption [C]. Chengdu,China:IEEE,2019:602-605.
[11]刘彦松,夏琦,李柱,等. 基于区块链的链上数据安全共享体系研究[J]. 大数据,2020,6(5):92-105.
[12]李莉,曾庆贤,文义红,等. 基于区块链与代理重加密的数据共享方案[J]. 信息网络安全,2020(8):16-24.
[13]李雪莲,张夏川,高军涛,等. 支持属性和代理重加密的区块链数据共享方案[J]. 西安电子科技大学学报(自然科学版),2022,49(1):1-16.
[14]邵奇峰,金澈清,张召,等. 区块链技术:架构及进展[J]. 计算机学报,2018,41(5):969-988.
[15]KASSANUK T, PHASINAM K. Design of blockchain based smart agriculture framework to ensure safety and security[J]. Materials Today:Proceedings,2022,51:2313-2316.
[16]钱建平,吴文斌,杨鹏. 新一代信息技术对农产品追溯系统智能化影响的综述[J]. 农业工程学报,2020,36(5):182-191.
[17]祝烈煌,董慧,沈蒙. 区块链交易数据隐私保护机制[J]. 大数据,2018,4(1):46-56.
[18]祝烈煌,高峰,沈蒙,等. 区块链隐私保护研究综述[J]. 计算机研究与发展,2017,54(10):2170-2186.
[19]曾诗钦,霍如,黄韬,等. 区块链技术研究综述:原理、进展与应用[J]. 通信学报,2020,41(1):134-151.
[20]GOLDWASSER S, MICALI S. The knowledge complexity of interactive proof systems[J]. SIAM Journal on Computing,1989,18(1):186.
[21]BEN-SASSON E, CHIESA A, GENKIN D, et al. SNARKs for C:verifying program executions succinctly and in zero knowledge[C]. Berlin, Heidelberg:Springer,2013:90-108.
[22]SAHAI A, WATERS B. Fuzzy identity-based encryption[C]. Berlin,Heidelberg:Springer,2005:457-473.
[23]GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]. New York,USA:ACM,2006:89-98.
[24]BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attribute-based encryption[C]. Berkeley, CA, USA:IEEE,2007:321-334.
[25]邱云翔,张红霞,曹琪,等. 基于CP-ABE算法的区块链数据访问控制方案[J]. 网络与信息安全学报,2020,6(3):88-98.
[26]孙国梓,董宇,李云. 基于CP-ABE算法的云存储数据访问控制[J]. 通信学报,2011,32(7):146-152.
[27]芦效峰,付淞兵. 属性基加密和区块链结合的可信数据访问控制方案[J]. 信息网络安全,2021,21(3):7-14.
[28]张兴兰,崔遥. 基于群签名的属性加密方案[J]. 网络与信息安全学报,2019,5(1):19-25.
[29]WATERS B. Ciphertext-policy attribute-based encryption:an expressive, efficient, and provably secure realization[C]. Berlin, Heidelberg:Springer,2011:53-70.
[30]WANG Y, GOU G P, LIU C, et al. Survey of security supervision on blockchain from the perspective of technology[J]. Journal of Information Security and Applications,2021,60:102859.