Citation: | YANG Qiliang, ZHANG Mingrui, ZHOU Yanwei, et al., “Attribute-Based Worker Selection Scheme by Using Blockchain in Decentralized Crowdsourcing Scenario,” Chinese Journal of Electronics, vol. 30, no. 2, pp. 249-257, 2021, doi: 10.1049/cje.2021.01.007 |
[1] |
J. Howe, "The rise of crowdsourcing", Wired Magazine, Vol. 14, No. 6, pp. 1–4, 2006. http://ci.nii.ac.jp/naid/10029969381
|
[2] |
M. Li, J. Weng, A.J. Yang, et al., "CrowdBC: A blockchain-based decentralized framework for crowdsourcing", IEEE Transactions on Parallel and Distributed Systems, Vol. 30, No. 6, pp. 1251–1266, 2019. doi: 10.1109/TPDS.2018.2881735
|
[3] |
X.T. Ma, W.P. Ma and X.X. Liu, "A cross domain authentication scheme based on blockchain technology", Chinese Journal of Electronics, Vol. 46, No. 11, pp. 2571–2579, 2018. http://en.cnki.com.cn/Article_en/CJFDTOTAL-JSJY201802005.htm
|
[4] |
Y. Lu, Q. Tang and G.L. Wang, "ZebraLancer: Private and anonymous crowdsourcing system atop open blockchain", 38th IEEE International Conference on Distributed Computing Systems, Vienna, Austria, pp. 853–865, 2018.
|
[5] |
Q.K. Zhang, B.L. Wang, X.S. Zhang, et al., "Blockchain-based dynamic group key agreement protocol for Ad Hoc network", Chinese Journal of Electronics, Vol. 29, No. 3, pp. 447–454, 2020. doi: 10.1049/cje.2020.02.020
|
[6] |
Z.F. Ma, W.H. Huang and H.M. Gao, "Secure DRM scheme based on blockchain with high credibility", Chinese Journal of Electronics, Vol. 27, No. 5, pp. 1025–1036, 2018. doi: 10.1049/cje.2018.07.003
|
[7] |
N. Szabo, "The idea of smart contracts", https://nakamotoinstitute.org/the-idea-of-smart-contracts/, 1997-9-1.
|
[8] |
N. Satoshi, "Bitcoin: A peer-to-peer electronic cash system", https://www.bibsonomy.org/bibtex/23db66df0fc9fa2b5033f096a901f1c36/ngnn, 2009-10-31.
|
[9] |
J.Z. Wang, M.R. Li, Y.H. He, et al., "A blockchain based privacy-preserving incentive mechanism in crowdsensing applications", IEEE Access, Vol. 6, pp. 17545–17556, 2018. doi: 10.1109/ACCESS.2018.2805837
|
[10] |
T. Lappas, K. Liu and E. Terzi, "Finding a team of experts in social networks", Proc. of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, pp. 467–476, 2009.
|
[11] |
M. Sozio and A. Gionis, "The community-search problem and how to plan a successful cocktail party", Proc. of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, pp. 939–948, 2010.
|
[12] |
D.N. Yang, C.Y. Shen, W.C. Lee, et al., "On socio-spatial group query for location-based social networks", Proc. of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Beijing, China, pp. 949–957, 2012.
|
[13] |
D. Papadias, Q.M. Shen, Y.F. Tao, et al., "Group nearest neighbor queries", Proc. of the 20th International Conference on Data Engineering, Boston, MA, USA, pp. 301–312, 2004.
|
[14] |
S. Reddy, D. Estrin and M.B. Srivastava, "Recruitment framework for participatory sensing data collections", Proc. of the 8th International Conference on Pervasive Computing, Helsinki, Finland, pp. 138–155, 2010.
|
[15] |
L. Kazemi and C. Shahabi, "GeoCrowd: Enabling query answering with spatial crowdsourcing", Proc. of the SIGSPATIAL 2012 International Conference on Advances in Geographic Information Systems, Redondo Beach, CA, USA, pp. 189–198, 2012.
|
[16] |
C.Y. Miao, H. Yu, Z.Q. Shen, et al., "Balancing quality and budget considerations in mobile crowdsourcing", Decision Support Systems, Vol. 90, pp. 56–64, 2016. doi: 10.1016/j.dss.2016.06.019
|
[17] |
B. Pinkas, M. Rosulek, N. Trieu, et al., "PSI from PaXoS: Fast, malicious private set intersection", Proc. of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, pp. 739–767, 2020.
|
[18] |
O. Ruan, Z. Wang, J. Mi, et al., "New approach to set representation and practical private set-intersection protocols", IEEE Access, Vol. 7, pp. 64897–64906, 2019. doi: 10.1109/ACCESS.2019.2917057
|
[19] |
S.Y. Lv, J.H. Ye, S.J. Yin, et al., "Unbalanced private set intersection cardinality protocol with low communication cost", Future Generation Computer Systems, Vol. 102, pp. 1054–1061, 2020. doi: 10.1016/j.future.2019.09.022
|
[20] |
E.D. Cristofaro and G. Tsudik, "Practical private set intersection protocols with linear complexity", 14th Financial Cryptography 2010, Tenerife, Canary Islands, Spain, pp. 143–159, 2010.
|
[21] |
D. Chaum, "Blind signatures for untraceable payments", 2nd CRYPTO, Santa Barbara, California, USA, pp. 199–203, 1982.
|
[22] |
R. Attarian, L. Abdi and S. Hashemi, "AdaWFPA: Adaptive online website fingerprinting attack for tor anonymous network: A stream-wise paradigm", Computer Communications, Vol. 148, pp. 74–85, 2019. doi: 10.1016/j.comcom.2019.09.008
|
[23] |
M. Blum, P. Feldman and S. Micali, "Non-interactive zero-knowledge and its applications", 20th STOC, Chicago, Illinois, USA, pp. 103–112, 1988.
|