[1] 蔡维德, 郁莲, 王荣, 刘娜, 邓恩艳.基于区块链的应用系统开发方法研究.软件学报, 2017, 28(6):1474-1487 http://d.old.wanfangdata.com.cn/Periodical/rjxb201706010

Tsai Wei-Tek, Yu Lian, Wang Rong, Liu Na, Deng En-Yan. Blockchain application development techniques. Journal of Software, 2017, 28(6):1474-1487 http://d.old.wanfangdata.com.cn/Periodical/rjxb201706010
[2] Nakamoto S. Bitcoin: a peer-to-peer electronic cash system[Online], available: https://bitcoin.org/bitcoin.pdf, August 19, 2018
[3] 袁勇, 王飞跃.区块链技术发展现状与展望.自动化学报, 2016, 42(4):481-494 http://www.aas.net.cn/CN/Y2016/V42/I4/481

Yuan Yong, Wang Fei-Yue. Blockchain:the state of the art and future trends. Acta Automatica Sinica, 2016, 42(4):481 -494 http://www.aas.net.cn/CN/Y2016/V42/I4/481
[4] Lamport L, Shostak R, Pease M. The Byzantine generals problem. ACM Transactions on Programming Languages and Systems (TOPLAS), 1982, 4(3):382-401 doi: 10.1145/357172.357176
[5] 韩璇, 刘亚敏.区块链技术中的共识机制研究.信息网络安全, 2017, (9):147-152 doi: 10.3969/j.issn.1671-1122.2017.09.034

Han Xuan, Liu Ya-Min. Research on the consensus mechanisms of blockchain technology. Netinfo Security, 2017, (9):147-152 doi: 10.3969/j.issn.1671-1122.2017.09.034
[6] Bitshares.org. Delegated proof-of-stake consensus[Online], available: https://bitshares.org/technology/delegated-proof-of-stake-consensus/, July 10, 2018
[7] Castro M, Liskov B. Practical Byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems (TOCS), 2002, 20(4):398-461 doi: 10.1145/571637.571640
[8] 薛腾飞, 傅群超, 王枞, 王新宴.基于区块链的医疗数据共享模型研究.自动化学报, 2017, 43(9):1555-1562 http://www.aas.net.cn/CN/abstract/abstract19131.shtml

Xue Teng-Fei, Fu Qun-Chao, Wang Cong, Wang Xin-Yan. A medical data sharing model via blockchain. Acta Automatica Sinica, 2017, 43(9):1555-1562 http://www.aas.net.cn/CN/abstract/abstract19131.shtml
[9] Wood G. Ethereum: a secure decentralised generalised transaction ledger[Online], available: http://gavwood.com/paper.pdf, August 19, 2018
[10] Azaria A, Ekblaw A, Vieira T, Lippman A. MedRec: using blockchain for medical data access and permission management. In: Proceedings of the 2nd International Conference on Open and Big Data (OBD). Vienna, Austria: IEEE, 2016.25-30
[11] Ivan D. Moving toward a blockchain-based method for the secure storage of patient records[Online], available: https://www.healthit.gov/sites/default/files/9-16-drew_ivan_20160804_blockchain_for_healthcare_final.pdf, August 19, 2018
[12] Shrier A A, Chang A, Diakun-thibault N, et al. Blockchain and health IT: algorithms, privacy, and data[Online], available: http://www.truevaluemetrics.org/DBpdfs/Technology/Blockchain/1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper.pdf, August 19, 2018
[13] Kuo T T, Hsu C N, Ohno-Machado L. ModelChain: decentralized privacy-preserving healthcare predictive modeling framework on private blockchain networks[Online], available: https://www.healthit.gov/sites/default/files/10-30-ucsd-dbmi-onc-blockchain-challenge.pdf, August 19, 2018
[14] Witchey N. Healthcare Transaction Validation Via Block-chain Proof-of-Work, Systems and Methods, WIPO Patent Application WO/2015/175722, November 2015.
[15] Rivest R. The MD5 message-digest algorithm. RFC, 1992, 473(10):492 http://d.old.wanfangdata.com.cn/OAPaper/oai_doaj-articles_f659b1885fb8206e9d53960c7f2f1fec
[16] Eastlake D 3rd, Hansen T. US secure hash algorithms (SHA and HMAC-SHA)[Online], available: https://www.rfc-ed-itor.org/rfc/pdfrfc/rfc4634.txt.pdf, August 19, 2018
[17] Merkle R C. A digital signature based on a conventional encryption function. In: Proceedings of the 1987 Conference on the Theory and Applications of Cryptographic Techniques. Heidelberg, Berlin, Germany: Springer, 1987.369-378
[18] Rivest R L, Shamir A, Adleman L M. Cryptographic Communications System and Method, USA Patent 4405829, September 1983.
[19] Kravitz D W. Digital Signature Algorithm, USA Patent 5231668, July 1993.
[20] Johnson D, Menezes A, Vanstone S. The elliptic curve digital signature algorithm (ECDSA). International Journal of Information Security, 2001, 1(1):36-63 http://d.old.wanfangdata.com.cn/OAPaper/oai_pubmedcentral.nih.gov_3821297
[21] 张明德, 刘伟. PKI/CA与数字证书技术大全.北京:电子工业出版社, 2015.22-25

Zhang Ming-De, Liu Wei. PKI/CA and Digital Certificate Technology. Beijing:Publishing House of Electronics Industry, 2015.22-25
[22] Josefsson S. The base16, base32, and base64 data encodings[Online], available: https://www.rfc-editor.org/rfc/pdfrfc/rfc4648.txt.pdf, August 19, 2018
[23] 董建成.我国医院信息系统现状及原因分析.中华医院管理杂志, 2003, 19(4):228-230 doi: 10.3760/j.issn:1000-6672.2003.04.014

Dong Jian-Cheng. Analysis of status and causes of hospital information system in China. Chinese Journal of Hospital Administration, 2003, 19(4):228-230 doi: 10.3760/j.issn:1000-6672.2003.04.014
[24] National Health Commission of the People's Republic of China. Electronic medical record basic architecture and data standards (Trial)[Online], available: http://www.moh.gov.cn/mohbgt/s6718/200912/45414.shtml, August 19, 2018
[25] Goda K. Storage area network. Encyclopedia of Database Systems. Boston, MA, USA:Springer, 2009.335-336
[26] Castro M, Liskov B. A Correctness Proof for a Practical Byzantine-Fault-Tolerant Replication Algorithm. Massachusetts Institute of Technology, Cambridge, MA, USA, 1999.
[27] 结城浩[著], 周自恒[译].图解密码技术.第2版.北京: 人民邮电出版社, 2016.

Yuki H[Author], Zhou Zi-Heng[Translator]. Graphical Cryptography. Beijing: The People's Posts and Telecommunications Press, 2016.
[28] Galperin S, Malpani A, Adams C, Ankney R, Santesson S, Myers M. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol-OCSP, RFC 6960, 1999.
[29] 李凤华, 苏铓, 史国振, 马建峰.访问控制模型研究进展及发展趋势.电子学报, 2012, 40(4):805-813 doi: 10.3969/j.issn.0372-2112.2012.04.030

Li Feng-Hua, Su Mang, Shi Guo-Zhen, Ma Jian-Feng. Research status and development trends of access control model. Acta Electronica Sinica, 2012, 40(4):805-813 doi: 10.3969/j.issn.0372-2112.2012.04.030
[30] Szabo N. Formalizing and securing relationships on public networks. First Monday, 1997, 2(9):1-21
[31] Etherscan.io. Ethereum network HashRate growth chart[Online], available: https://etherscan.io/chart/hashrate, August 19, 2018
[32] Bitcoin cash charts[Online], available: https://charts.bitcoin.com/chart/hash-rate, August 19, 2018
[33] Etherscan.io. Ethereum block difficulty growth chart[Online], available: https://etherscan.io/chart/difficulty, August 19, 2018
[34] Wang S, Jiang X Q, Wu Y, Cui L J, Cheng S, Ohno-Machado L. EXpectation propagation LOgistic REgRession (EXPLORER):distributed privacy-preserving online model learning. Journal of Biomedical Informatics, 2013, 46(3):480-496 http://d.old.wanfangdata.com.cn/NSTLQK/NSTL_QKJJ0231223213/
[35] Yan F, Sundaram S, Vishwanathan S V N, Qi Y. Distributed autonomous online learning:regrets and intrinsic privacy-preserving properties. IEEE Transactions on Knowledge and Data Engineering, 2013, 25(11):2483-2493 doi: 10.1109/TKDE.2012.191