[
Agarwal, A. and Saraswat, R. (2013). A survey of group signature technique, its applications and attacks, International Journal of Engineering and Innovative Technology 2(10): 28–35.
]Search in Google Scholar
[
Al Jawaheri, H., Al Sabah, M., Boshmaf, Y. and Erbad, A. (2020). Deanonymizing tor hidden service users through bitcoin transactions analysis, Computers & Security 89: 101684.10.1016/j.cose.2019.101684
]Search in Google Scholar
[
Androulaki, E., Karame, G. O., Roeschlin, M., Scherer, T. and Capkun, S. (2013). Evaluating user privacy in bitcoin, International Conference on Financial Cryptography and Data Security, Okinawa, Japan, pp. 34–51.
]Search in Google Scholar
[
Ateniese, G., Song, D. and Tsudik, G. (2002). Quasi-efficient revocation of group signatures, International Conference on Financial Cryptography, Southampton, Bermuda, pp. 183–197.
]Search in Google Scholar
[
Bellare, M., Micciancio, D. and Warinschi, B. (2003). Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, pp. 614–629.
]Search in Google Scholar
[
Blass, E.-O. and Kerschbaum, F. (2018). Strain: A secure auction for blockchains, European Symposium on Research in Computer Security, Barcelona, Spain, pp. 87–110.
]Search in Google Scholar
[
Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A. and Felten, E.W. (2015). SOK: Research perspectives and challenges for bitcoin and cryptocurrencies, 2015 IEEE Symposium on Security and Privacy, San Jose, USA, pp. 104–121.
]Search in Google Scholar
[
Chaum, D. and Van Heyst, E. (1991). Group signatures, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, pp. 257–265.
]Search in Google Scholar
[
Chen, L. and Pedersen, T.P. (1994). New group signature schemes, Workshop on the Theory and Application of of Cryptographic Techniques, Perugia, Italy, pp. 171–181.
]Search in Google Scholar
[
Chen, Y.-H., Chen, S.-H. and Lin, I.-C. (2018). Blockchain based smart contract for bidding system, 2018 IEEE International Conference on Applied System Invention (ICASI), Chiba, Japan, pp. 208–211.
]Search in Google Scholar
[
Conti, M., Kumar, E.S., Lal, C. and Ruj, S. (2018). A survey on security and privacy issues of bitcoin, IEEE Communications Surveys & Tutorials 20(4): 3416–3452.10.1109/COMST.2018.2842460
]Search in Google Scholar
[
Feng, Q., He, D., Zeadally, S., Khan, M.K. and Kumar, N. (2019). A survey on privacy protection in blockchain system, Journal of Network and Computer Applications 126(8): 45–58.10.1016/j.jnca.2018.10.020
]Search in Google Scholar
[
Fernandez-Vazquez, S., Rosillo, R., De La Fuente, D. and Priore, P. (2019). Blockchain in fintech: A mapping study, Sustainability 11(22): 6366.10.3390/su11226366
]Search in Google Scholar
[
Galal, H.S. and Youssef, A.M. (2018). Verifiable sealed-bid auction on the Ethereum blockchain, International Conference on Financial Cryptography and Data Security, Nieuwpoort, Curac¸ao, pp. 265–278.
]Search in Google Scholar
[
Gao, W., Hatcher, W.G. and Yu, W. (2018). A survey of blockchain: Techniques, applications, and challenges, 2018 27th International Conference on Computer Communication and Networks (ICCCN), Hangzhou, China, pp. 1–11.
]Search in Google Scholar
[
Jouini, M., Rabai, L.B.A. and Aissa, A.B. (2014). Classification of security threats in information systems, Procedia Computer Science 32: 489–496.10.1016/j.procs.2014.05.452
]Search in Google Scholar
[
Karame, G. (2016). On the security and scalability of bitcoin’s blockchain, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, pp. 1861–1862.
]Search in Google Scholar
[
Kim, H.-J., Lim, J.I. and Lee, D.H. (2000). Efficient and secure member deletion in group signature schemes, International Conference on Information Security and Cryptology, Seoul, Korea, pp. 150–161.
]Search in Google Scholar
[
Kobusińska, A., Brzeziński, J., Boroń, M., Inatlewski, Ł., Jabczyński, M. and Maciejewski, M. (2016). A branch hash function as a method of message synchronization in anonymous P2P conversations, International Journal of Applied Mathematics and Computer Science 26(2): 479–493, DOI: 10.1515/amcs-2016-0034.10.1515/amcs-2016-0034
]Search in Google Scholar
[
Kong, W., Jiang, B., Fan, Q., Zhu, L. and Wei, X. (2018). Personal identification based on brain networks of EEG signals, International Journal of Applied Mathematics and Computer Science 28(4): 745–757, DOI: 10.2478/amcs-2018-0057.10.2478/amcs-2018-0057
]Search in Google Scholar
[
Kosba, A., Miller, A., Shi, E., Wen, Z. and Papamanthou, C. (2016). Hawk: The blockchain model of cryptography and privacy-preserving smart contracts, 2016 IEEE Symposium on Security and Privacy (SP), San Jose, USA, pp. 839–858.
]Search in Google Scholar
[
Krishna, V. (2009). Auction Theory, Academic Press, San Diego.
]Search in Google Scholar
[
Lafourcade, P., Nopere, M., Picot, J., Pizzuti, D. and Roudeix, E. (2019). Security analysis of auctionity: A blockchain based e-auction, International Symposium on Foundations & Practice of Security FPS 19, Toulouse, France, pp. 290–307.
]Search in Google Scholar
[
Lee, C.-C., Ho, P.-F. and Hwang, M.-S. (2009). A secure e-auction scheme based on group signatures, Information Systems Frontiers 11(3): 335–343.10.1007/s10796-008-9094-3
]Search in Google Scholar
[
Li, S., Zhang, Y., Wang, Y. and Sun, W. (2019). Utility optimization–based bandwidth allocation for elastic and inelastic services in peer-to-peer networks, International Journal of Applied Mathematics and Computer Science 29(1): 111–123, DOI: 10.2478/amcs-2019-0009.10.2478/amcs-2019-0009
]Search in Google Scholar
[
Li, X., Jiang, P., Chen, T., Luo, X. andWen, Q. (2017). A survey on the security of blockchain systems, Future Generation Computer Systems 107: 841–853.10.1016/j.future.2017.08.020
]Search in Google Scholar
[
Nakamoto, S. and Bitcoin, A. (2008). A peer-to-peer electronic cash system, https://bitcoin.org/bitcoin.pdf.
]Search in Google Scholar
[
Reid, F. and Harrigan, M. (2013). An analysis of anonymity in the bitcoin system, Security and Privacy in Social Networks, Boston, USA, pp. 197–223.
]Search in Google Scholar
[
Ron, D. and Shamir, A. (2013). Quantitative analysis of the full bitcoin transaction graph, International Conference on Financial Cryptography and Data Security, Okinawa, Japan, pp. 6–24.
]Search in Google Scholar
[
Sánchez, D.C. (2018). Raziel: Private and verifiable smart contracts on blockchains, arXiv: 1807.09484.
]Search in Google Scholar
[
Sun, Y., Sun, Y., Luo, M., Gu, L., Zheng, S. and Yang, Y. (2013). Comment on Lee et al.’s group signature and e-auction scheme, Information Systems Frontiers 15(1): 133–139.
]Search in Google Scholar
[
Tsai, C.-Y., Ho, P.-F. and Hwang, M.-S. (2018). A secure group signature scheme., IJ Network Security 20(2): 201–205.
]Search in Google Scholar
[
Wang, X., Zha, X., Ni, W., Liu, R.P., Guo, Y.J., Niu, X. and Zheng, K. (2019). Survey on blockchain for internet of things, Computer Communications 136: 10–29.10.1016/j.comcom.2019.01.006
]Search in Google Scholar
[
Zhang, R., Xue, R. and Liu, L. (2019). Security and privacy on blockchain, ACM Computing Surveys 52(3): 1–34.10.1145/3316481
]Search in Google Scholar
[
Zheng, H., Wu, Q., Xie, J., Guan, Z., Qin, B. and Gu, Z. (2020). An organization-friendly blockchain system, Computers & Security 88: 101598.10.1016/j.cose.2019.101598
]Search in Google Scholar