期刊文献+
共找到67,595篇文章
< 1 2 250 >
每页显示 20 50 100
A Verifiable Multi-Secret Sharing Scheme Based on Hermite Interpolation
1
作者 Tomoko Adachi Chie Okazaki 《Journal of Mathematics and System Science》 2014年第9期587-592,共6页
A threshold scheme, which is introduced by Shamir in 1979, is very famous as a secret sharing scheme. We can consider that this scheme is based on Lagrange's interpolation formula. A secret sharing scheme has one key... A threshold scheme, which is introduced by Shamir in 1979, is very famous as a secret sharing scheme. We can consider that this scheme is based on Lagrange's interpolation formula. A secret sharing scheme has one key. On the other hand, a multi-secret sharing scheme has more than one key, that is, a multi-secret sharing scheme has p (〉_ 2) keys. Dealer distribute shares of keys among n participants. Gathering t (〈 n) participants, keys can be reconstructed. Yang et al. (2004) gave a scheme of a (t, n) multi-secret sharing based on Lagrange's interpolation. Zhao et al. (2007) gave a scheme of a (t, n) verifiable multi-secret sharing based on Lagrange's interpolation. Recently, Adachi and Okazaki give a scheme of a (t, n) multi-secret sharing based on Hermite interpolation, in the case ofp 〈 t. In this paper, we give a scheme ofa (t, n) verifiable multi-secret sharing based on Hermite interpolation. 展开更多
关键词 Verifiable secret sharing scheme multi-secret sharing scheme Hermite interpolation
在线阅读 下载PDF
An Efficient and Secure Multi-Secret Sharing Scheme with General Access Structures 被引量:2
2
作者 PANG Liaojun LI Huixian WANG Yumin 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1649-1652,共4页
A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n... A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n) threshold schemes, so they are fit for only threshold applications and unfit for the applications of general access structures. Due to the fact that a (t, n) threshold scheme could only handle a small fraction of the secret sharing idea, a novel multi-secret sharing scheme is proposed, which is designed based on general access structures. The security of this scheme is the same as that of Shamir's threshold secret sharing scheme. Compared with the existing multiple secret sharing schemes, the proposed scheme can provide greater capabilities for many applications because it is able to deal with applications of general access structures. 展开更多
关键词 CRYPTOGRAPHY information security secret sharing access structure
在线阅读 下载PDF
Bipartite Threshold Multi-Secret Sharing Scheme Based on Hypersphere 被引量:1
3
作者 Bin Li 《American Journal of Computational Mathematics》 2019年第4期207-220,共14页
To address the problem that existing bipartite secret sharing scheme is short of dynamic characteristic, and to solve the problem that each participant can only use secret share once, this paper proposed a bipartite (... To address the problem that existing bipartite secret sharing scheme is short of dynamic characteristic, and to solve the problem that each participant can only use secret share once, this paper proposed a bipartite (n1+n2, m1+m2)-threshold multi-secret sharing scheme which combined cryptography and hypersphere geometry. In this scheme, we introduced a bivariate function and a coordinate function over finite field Zp to calculate the derived points of secret share, which can reconstruct the shared secrets by producing the intersection point of hypernormal plane and normal line on the hypertangent plane. At the initial stage the secret dealer distributes to each participant a secret share that can be kept secret based on the intractability of discrete logarithm problem and need not be changed with updating the shared secrets.Each cooperative participant only needs to submit a derived point calculated from the secret share without exposing this secret share during the process of reconstructing the shared secret. Analyses indicate that the proposed scheme is not only sound and secure because of hypersphere geometric properties and the difficulty of discrete logarithm problem, but also efficient because of its well dynamic behavior and the invariant secret share. Therefore, this bipartite threshold multi-secret sharing scheme is easy to implement and is applicable in practical settings. 展开更多
关键词 BIPARTITE THRESHOLD multi-secret sharing HYPERSPHERE Hypernormal PLANE Hypertangent PLANE
在线阅读 下载PDF
A Secure and Efficient (t, n) Multi-Secret Sharing Scheme 被引量:1
4
作者 PANGLiao-jun WANGYu-min 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期191-194,共4页
Based on Shamir's secret sharing, a (t, n) multi-secret sharing scheme isproposed in this paper p secrets can be shared among n participants, and t or more participants canco-operate to reconstruct these secrets a... Based on Shamir's secret sharing, a (t, n) multi-secret sharing scheme isproposed in this paper p secrets can be shared among n participants, and t or more participants canco-operate to reconstruct these secrets at the same time, but t— 1 or fewerparticipants can derivenothing about these secrets. Each participant's secret shadow is as short as each secret. Comparedwith the existing schemes, the proposed scheme is characterized by the lower complexity of thesecret reconstruction and less public information. The security of this scheme is the same as thatof Shamir' a threshold scheme. Analyses show that this scheme is an efficient, computationallysecure scheme. 展开更多
关键词 CRYPTOSYSTEM threshold scheme secret sharing
在线阅读 下载PDF
Visual Multi-Secret Sharing with Friendliness 被引量:1
5
作者 郑富国 林恺翔 +1 位作者 林志鸿 陈宗和 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期455-465,共11页
Visual secret sharing(VSS) was used in the literature to encode and decode secret images until visual multi-secret sharing(VMSS) was proposed. Distinctly, multiple secret images can be encoded or decoded at a time in ... Visual secret sharing(VSS) was used in the literature to encode and decode secret images until visual multi-secret sharing(VMSS) was proposed. Distinctly, multiple secret images can be encoded or decoded at a time in VMSS; however, only one secret image can be done in VSS. In VMSS, secrets are encoded into noise-like shares which have finally been stacked altogether so as to disclose each of the secrets by specific operations, such as rotating, flipping and sliding. Though the noise-like shares can be decoded by those operations, it is just like a fly in the ointment since they are hard to manage, to recognize and even to stack orderly. Based on some researches about user-friendly VSS for generating meaningful shares, a new friendly VMSS scheme is presented in this paper for achieving two main goals. One is trying to encode multiple secrets at a time and the other is making the decoding process easy to manage. The experimental results prove that our proposed scheme does work. 展开更多
关键词 visual cryptography random grids visual secret sharing(VSS) image encryption
原文传递
A Multi-Secret Sharing Scheme with Many Keys Based on Hermite Interpolation
6
作者 Tomoko Adachi Chie Okazaki 《Journal of Applied Mathematics and Physics》 2014年第13期1196-1201,共6页
A secret sharing scheme is one of cryptographies. A threshold scheme, which is introduced by Shamir in 1979, is very famous as a secret sharing scheme. We can consider that this scheme is based on Lagrange's inter... A secret sharing scheme is one of cryptographies. A threshold scheme, which is introduced by Shamir in 1979, is very famous as a secret sharing scheme. We can consider that this scheme is based on Lagrange's interpolation formula. A secret sharing scheme has one key. On the other hand, a multi-secret sharing scheme has more than one keys;that is, a multi-secret sharing scheme has p (≥2) keys. Dealers distribute shares of keys among n participants. Gathering t (≤n) participants, keys can be reconstructed. In this paper, we give a scheme of a (t,n) multi-secret sharing based on Hermite interpolation, in the case of p≤t. 展开更多
关键词 SECRET sharing SCHEME Multi SECRET sharing SCHEME HERMITE Interpolation
在线阅读 下载PDF
A New Double Layer Multi-Secret Sharing Scheme
7
作者 Elavarasi Gunasekaran Vanitha Muthuraman 《China Communications》 SCIE CSCD 2024年第1期297-309,共13页
Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message i... Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods. 展开更多
关键词 genetic algorithm oppositional whale optimization algorithm rectangle block cipher secret sharing scheme SHARES universal share
在线阅读 下载PDF
Server-Aided Multi-Secret Sharing Scheme for Weak Computational Devices
8
作者 En Zhang Xintao Duan +4 位作者 Siuming Yiu Junbin Fang Zoe L.Jiang Tsz HonYuen Jie Peng 《Computers, Materials & Continua》 SCIE EI 2018年第9期401-414,共14页
In the setting of(t,n)threshold secret sharing,at least t parties can reconstruct the secret,and fewer than t parties learn nothing about the secret.However,to achieve fairness,the existing secret sharing schemes eith... In the setting of(t,n)threshold secret sharing,at least t parties can reconstruct the secret,and fewer than t parties learn nothing about the secret.However,to achieve fairness,the existing secret sharing schemes either assume a trusted party exists or require running multi-round,which is not practical in a real application.In addition,the cost of verification grows dramatically with the number of participants and the communication complexity is O(t),if there is not a trusted combiner in the reconstruction phase.In this work,we propose a fair server-aided multi-secret sharing scheme for weak computational devices.The malicious behavior of clients or server providers in the scheme can be verified,and the server provider learns nothing about the secret shadows and the secrets.Unlike other secret sharing schemes,our scheme does not require interaction among users and can work in asynchronous mode,which is suitable for mobile networks or cloud computing environments since weak computational mobile devices are not always online.Moreover,in the scheme,the secret shadow is reusable,and expensive computation such as reconstruction computation and homomorphic verification computation can be outsourced to the server provider,and the users only require a small amount of computation. 展开更多
关键词 SECRET sharing server-aided NON-INTERACTIVE FAIRNESS
在线阅读 下载PDF
Linear multi-secret sharing schemes 被引量:8
9
作者 XlAOLiangliang LIUMulan 《Science in China(Series F)》 2005年第1期125-136,共12页
In this paper the linear multi-secret sharing schemes are studied by using monotone span programs. A relation between computing monotone Boolean functions by using monotone span programs and realizing multi-access str... In this paper the linear multi-secret sharing schemes are studied by using monotone span programs. A relation between computing monotone Boolean functions by using monotone span programs and realizing multi-access structures by using linear multi-secret sharing schemes is shown. Furthermore, the concept of optimal linear multi-secret sharing scheme is presented and the several schemes are proved to be optimal. 展开更多
关键词 multi-secret sharing scheme linear multi-secret sharing scheme monotone span program optimal linear multi-secret sharing scheme.
原文传递
Eco-Driven Leadership in Pharmaceutical Industry:The Impact of Knowledge Sharing,Innovation,and Shared Vision on Environmental Performance
10
作者 Mohammad Nurul Alam Mohamedelhassan.O.A.Babiker +3 位作者 Fariza Hashim Md.Abu Issa Gazi Hammad S.Alotaibi Zainun Mustafa 《Journal of Environmental & Earth Sciences》 2025年第5期49-71,共23页
Corporate environmental sustainability has become a critical concern,particularly in resource-intensive industries such as pharmaceuticals,where regulatory pressures and stakeholder expectations continue to rise.Despi... Corporate environmental sustainability has become a critical concern,particularly in resource-intensive industries such as pharmaceuticals,where regulatory pressures and stakeholder expectations continue to rise.Despite increasing attention to green leadership,limited research has explored how environmentally responsible leadership(ERL)influences corporate environmental performance(CEP)through employee-driven sustainability behaviors.This study addresses this gap by examining the mediating roles of green knowledge-sharing behavior(GKSB),green innovative behavior(GIB),and voluntary green behavior(VGB),as well as the moderating role of green shared vision(GSV)in the ERL-CEP relationship.The study is grounded in Resource-Based View(RBV),Knowledge-Based View(KBV),Environmental-Based View(EBV),and Triple Bottom Line(TBL)theories,which collectively explain how leadership-driven sustainability efforts create long-term competitive advantages,drive environmental responsibility,and balance economic,social,and environmental sustainability.A quantitative research design was employed,using survey data from 384 employees in Bangladesh’s pharmaceutical sector.Data were analyzed using Partial Least Squares Structural Equation Modeling(PLS-SEM)in Smart-PLS 4.0 to assess direct,indirect,and moderating effects.The results confirm that ERL has a significant positive impact on CEP,with GKSB,GIB,and VGB acting as mediators,while GSV strengthens the ERL-CEP relationship.This study provides novel empirical evidence on the mechanisms linking green leadership to corporate sustainability,extending the application of RBV,KBV,EBV,and TBL to leadership-driven environmental management.The findings emphasize the importance of leadership training programs,sustainability-focused organizational cultures,and shared environmental visions.Policymakers should consider incentives for companies adopting ERL practices,ensuring that sustainability becomes a strategic,rather than compliance-driven,priority.This study contributes to leadership and sustainability literature by offering a comprehensive framework for integrating ERL into corporate governance and environmental strategies. 展开更多
关键词 Environmentally Responsible Leadership Corporate Environmental Performance Green Knowledge sharing Green Innovation Behavior Green Voluntary Behaviour Green-Shared Vision
暂未订购
Sharing Development Opportunities--Scholars and officials call for promoting all-weather China-Africa community with a shared future for the new era
11
作者 ZHONG FEI 《ChinAfrica》 2025年第6期40-43,共4页
At the 2024 Beijing Forum on China-Africa Cooperation(FOCAC)held in September last year,Chinese President Xi Jinping proposed that the overall characterisation of China-Africa relations be elevated to an all-weather C... At the 2024 Beijing Forum on China-Africa Cooperation(FOCAC)held in September last year,Chinese President Xi Jinping proposed that the overall characterisation of China-Africa relations be elevated to an all-weather China-Africa community with a shared future for the new era.“This declaration affirms,whether faced with pandemic or geopolitical shifts,Africa and China will still remain each other’s most trustworthy true partners,”said Inkosi Mzamo Buthelezi,South Africa’s minister of public service and administration. 展开更多
关键词 shared future all weather China Africa community cooperation FOCAC pandemic geopolitical shifts new era China Africa relations
原文传递
癌痛针刺临床试验中假针刺设置及基于SHARE清单的报告情况
12
作者 吕笑颜 刘晓玉 +3 位作者 张贺 张浩然 陈波 闫世艳 《中国中医药信息杂志》 2026年第1期20-28,共9页
目的 明确癌痛随机对照试验(RCTs)中假针刺对照的设置和报告情况,使用《针刺临床试验中假针刺对照报告指南与清单》(SHARE)评价假针刺报告情况,为研究设计中的假针刺设置和报告提供参考。方法 通过主题词和自由词结合的方式,检索PubMed... 目的 明确癌痛随机对照试验(RCTs)中假针刺对照的设置和报告情况,使用《针刺临床试验中假针刺对照报告指南与清单》(SHARE)评价假针刺报告情况,为研究设计中的假针刺设置和报告提供参考。方法 通过主题词和自由词结合的方式,检索PubMed、Embase、Cochrane Library、Web of Science、中国期刊全文数据库、中国生物医学文献服务系统、维普中文期刊服务平台、万方数据知识服务平台建库至2024年12月31日相关文献,纳入假针刺对照的癌痛RCT研究,并使用SHARE清单评价纳入研究的假针刺报告情况。结果 共纳入30篇文献,其中英文17篇、中文13篇。刺入类假针刺设置包括同干预组穴位刺入(1篇,3.33%)、同干预组穴位不刺入(7篇,23.33%)、非穴浅刺(4篇,13.33%)、非穴不刺入(4篇,13.33%);非刺入类假针刺设置包括同干预组穴位弱刺激(3篇,10.00%)和同干预组穴位无刺激(11篇,36.67%)。中文文献报告率100%的条目3个,报告率高于50%的条目3个,报告率为0%的条目5个,其余8个条目报告率不足50%。英文文献报告率100%的条目2个,报告率高于50%的条目5个,报告率为0%的条目2个,其余10个条目报告率不足50%。结论 目前,癌痛针刺临床试验中假针刺设置形式多样,报告尚不够全面,需要对假针刺对照细节进行全面、清晰、规范的报告,以提高研究的可靠性和可重复性。 展开更多
关键词 癌症相关性疼痛 针刺 随机对照试验 假针刺 SHARE清单
暂未订购
The Green Ride:Bike-Sharing Platforms and Urban Carbon Reduction
13
作者 Dai Yunhao Wang Xiaoyun Tong Xinchu 《China Economist》 2026年第1期116-136,共21页
Can the sharing economy contribute to urban sustainability?This study explores this question using the staggered entry of bike-sharing platforms across Chinese cities as a quasi-natural experiment.Drawing on 2015-2017... Can the sharing economy contribute to urban sustainability?This study explores this question using the staggered entry of bike-sharing platforms across Chinese cities as a quasi-natural experiment.Drawing on 2015-2017 city characteristics panel data and monthly CO_(2) emission records,we employ a staggered difference-in-differences(DID)model to assess the impact of bike-sharing on per capita urban CO_(2) emissions.The results show that bike-sharing platforms significantly cut emissions by replacing high-carbon transport and boosting public adoption of shared bikes.This effect is more potent in cities with less stringent environmental enforcement,more advanced digital economies,greater technological innovation,and where two platforms jointly entered.By elucidating the mechanisms underlying bike-sharing’s carbon-reduction potential,this study highlights its role in urban sustainability.It offers policy insights for leveraging shared mobility to reduce city carbon emissions. 展开更多
关键词 sharing economy bike-sharing green transition CO_(2)emissions
在线阅读 下载PDF
The New Starting Point--China and the ROK reaffirm commitment to shared development and prosperity
14
作者 Li Wenhan 《Beijing Review》 2026年第3期32-33,共2页
"The image quality is certainly good,right?"President of the Republic of Korea(ROK)Lee Jae Myung wrote in a January 5 social media post accompanied by a beaming face emoji.The post features a selfie Lee had ... "The image quality is certainly good,right?"President of the Republic of Korea(ROK)Lee Jae Myung wrote in a January 5 social media post accompanied by a beaming face emoji.The post features a selfie Lee had just taken of himself and his wife alongside Chinese President Xi Jinping and his wife in Beijing,using the Chinese-made Xiaomi smartphone Xi had gifted him during the Asia-Pacific Economic Cooperation Economic Leaders?Meeting in Gyeongju,the ROK,late last year. 展开更多
关键词 image quality ROK PROSPERITY China President Lee Jae myung social media post social media shared development
原文传递
The Diplomatic Power of Proverbs--Xi Jinping’s African discourse harmonises Chinese and African wisdom and boosts the construction of a China-Africa community with a shared future
15
作者 ETIENNE BANKUWIHA 《ChinAfrica》 2026年第1期23-25,共3页
As a Burundian doctoral student at Nanjing University,my personal journey is closely intertwined with China’s development in the new era and the deepening China-Africa partnership.Recently,my experiences have given m... As a Burundian doctoral student at Nanjing University,my personal journey is closely intertwined with China’s development in the new era and the deepening China-Africa partnership.Recently,my experiences have given me a deeper appreciation of the importance of people-to-people exchanges between China and Africa. 展开更多
关键词 shared future china africa community diplomatic power african wisdom african discourse chinese wisdom proverbs xi jinping
原文传递
The Complexity and Randomness of Linear Multi-secret Sharing Schemes with Non-threshold Structures
16
作者 Chun-ming Tang Shu-guang DAI 《Acta Mathematicae Applicatae Sinica》 SCIE CSCD 2014年第4期1073-1084,共12页
In a linear multi-secret sharing scheme with non-threshold structures, several secret values are shared among n participants, and every secret value has a specified access structure. The efficiency of a multi- secret ... In a linear multi-secret sharing scheme with non-threshold structures, several secret values are shared among n participants, and every secret value has a specified access structure. The efficiency of a multi- secret sharing scheme is measured by means of the complexity a and the randomness . Informally, the com- plexity a is the ratio between the maximum of information received by each participant and the minimum of information corresponding to every key. The randomness is the ratio between the amount of information distributed to the set of users U = {1, …, n} and the minimum of information corresponding to every key. In this paper, we discuss a and of any linear multi-secret sharing schemes realized by linear codes with non-threshold structures, and provide two algorithms to make a and to be the minimum, respectively. That is, they are optimal. 展开更多
关键词 secret sharing multi-secret sharing scheme non-threshold multi-access structure linear code COMPLEXITY RANDOMNESS
原文传递
针刺临床试验中假针刺对照报告指南ACURATE与SHARE比较分析 被引量:1
17
作者 刘川杨 李斌艳 +4 位作者 段炎珊 周航 王宇 屠建锋 王丽琼 《中国循证医学杂志》 北大核心 2025年第4期485-490,共6页
为了给研究者未来选用和优化针刺临床试验中假针刺报告指南提供建议,本研究通过定性分析对中韩两国研究人员分别制订的针刺临床试验中假针刺对照报告指南与清单(SHARE)和临床试验与实验针刺对照报告指南(ACURATE)的基本信息及具体内容... 为了给研究者未来选用和优化针刺临床试验中假针刺报告指南提供建议,本研究通过定性分析对中韩两国研究人员分别制订的针刺临床试验中假针刺对照报告指南与清单(SHARE)和临床试验与实验针刺对照报告指南(ACURATE)的基本信息及具体内容进行比较,并结合具体案例阐明两者的异同点。本研究发现与既往针刺临床试验干预措施报告规范(STRICTA)和安慰剂和假干预对照的报告指南和清单(TIDieR-Placebo)相比,ACURATE指南与SHARE指南均强调假针刺对照细节与背景因素的报告,但在内容上各有特点与侧重。条目划分方面,ACURATE通过将主题内容拆分以强调单个条目的重要性;SHARE通过将多个条目合并以强调报告内容的全面性。具体内容方面,ACURATE强调合并治疗、向受试者提供的假针刺信息及真/假针刺在治疗设置等方面的任何差异,对于假针刺对照设置具有借鉴价值;SHARE侧重于对假针刺细节、操作者及方案调整等内容的报告。通过案例发现对两项指南均有条目存在未报告或部分报告的情况,建议未来研究者在进行假针刺对照的报告时可以结合使用两项指南,并对以上两项指南的可操作性与实用性进行验证,为两者的持续优化与更新提供建议。 展开更多
关键词 针刺 报告指南 针刺临床试验 ACURATE指南 SHARE指南
原文传递
Improved Multipartite Quantum Secret Sharing Protocol Using Preshared Greenberger-Horne-Zeilinger States 被引量:3
18
作者 谢灯 叶明勇 李兴华 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第12期1027-1030,共4页
Inspired by the protocol presented by Bagherinezhad and Karimipour[Phys.Rev.A 67(2003) 044302], which will be shown to be insecure,we present a multipartite quantum secret sharing protocol using reusable GreenbergerHo... Inspired by the protocol presented by Bagherinezhad and Karimipour[Phys.Rev.A 67(2003) 044302], which will be shown to be insecure,we present a multipartite quantum secret sharing protocol using reusable GreenbergerHorne -Zeilinger(GHZ) states.This protocol is robust against eavesdropping and could be used for the circumstance of many parties. 展开更多
关键词 secret sharing Greenberger-Horne-Zeilinger state quantum cryptography
在线阅读 下载PDF
基于CONSORT声明、STRICTA和SHARE清单的针刺治疗痛经随机对照试验报告质量评价 被引量:1
19
作者 焦梓桐 李仲贤 +2 位作者 彭敏 张潘 周鹏 《中国中医药信息杂志》 2025年第6期58-65,共8页
目的对针刺治疗痛经随机对照试验(RCT)的报告质量进行评价。方法系统检索PubMed、Embase、Cochrane Library、中国期刊全文数据库(CNKI)、中国生物医学文献服务系统(SinoMed)、中国学术期刊全文数据库(万方数据)和中文科技期刊数据库(V... 目的对针刺治疗痛经随机对照试验(RCT)的报告质量进行评价。方法系统检索PubMed、Embase、Cochrane Library、中国期刊全文数据库(CNKI)、中国生物医学文献服务系统(SinoMed)、中国学术期刊全文数据库(万方数据)和中文科技期刊数据库(VIP)中针刺治疗痛经RCT的中英文文献,检索时间范围为建库至2024年3月31日。参考试验报告标准(CONSORT)声明、针刺临床试验干预措施报告标准(STRICTA)及假针刺对照报告指南与清单(SHARE),对符合纳入标准的针刺治疗痛经的RCT进行评价统计。结果共纳入28篇RCT,经分析统计,尽管RCT基本实施要点报告率较为满意,但CONSORT声明、STRICTA及SHARE有关盲法的实施细节、结局指标的划定及统计学分析、样本量的确定方法、假针刺的合理性分析及实施细节等条目,报告率仍不足50%甚至为0%。其中报告率低于30%的条目以题目的识别性、试验设计的完整性、结局指标阐述的全面性、统计分析的全面性、针刺治疗的合理性分析、假针刺的操作细节、试验信息的充分汇报等方面为主。结论目前国内外以假针刺为对照治疗痛经的RCT报告质量整体偏低,尤其体现在假针刺合理性、实施方法及对结局指标的统计分析等方面,建议日后设计临床试验方案时应严格遵循CONSORT声明、STRICTA及SHARE,多阶段多次自我评价、及时调整完善方案设计,以期提高方案的安全性、真实性和科学性。 展开更多
关键词 原发性痛经 继发性痛经 针刺 报告质量评价 CONSORT声明 STRICTA SHARE
暂未订购
BC-PC-Share:Blockchain-Based Patient-Centric Data Sharing Scheme for PHRs in Cloud Computing
20
作者 Caihui Lan Haifeng Li 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第9期2985-3010,共26页
Sharing of personal health records(PHR)in cloud computing is an essential functionality in the healthcare system.However,how to securely,efficiently and flexibly share PHRs data of the patient in a multi-receiver sett... Sharing of personal health records(PHR)in cloud computing is an essential functionality in the healthcare system.However,how to securely,efficiently and flexibly share PHRs data of the patient in a multi-receiver setting has not been well addressed.For instance,since the trust domain of the cloud server is not identical to the data owner or data user,the semi-trust cloud service provider may intentionally destroy or tamper shared PHRs data of user or only transform partial ciphertext of the shared PHRs or even return wrong computation results to save its storage and computation resource,to pursue maximum economic interest or other malicious purposes.Thus,the PHRs data storing or sharing via the cloud server should be performed with consistency and integrity verification.Fortunately,the emergence of blockchain technology provides new ideas and prospects for ensuring the consistency and integrity of shared PHRs data.To this end,in this work,we leverage the consortiumblockchain technology to enhance the trustworthiness of each participant and propose a blockchain-based patient-centric data sharing scheme for PHRs in cloud computing(BC-PC-Share).Different from the state-of-art schemes,our proposal can achieve the following desired properties:(1)Realizing patient-centric PHRs sharing with a public verification function,i.e.,which can ensure that the returned shared data is consistent with the requested shared data and the integrity of the shared data is not compromised.(2)Supporting scalable and fine-grained access control and sharing of PHRs data with multiple domain users,such as hospitals,medical research institutes,and medical insurance companies.(3)Achieving efficient user decryption by leveraging the transformation key technique and efficient user revocation by introducing time-controlled access.The security analysis and simulation experiment demonstrate that the proposed BC-PC-Share scheme is a feasible and promising solution for PHRs data sharing via consortium blockchain. 展开更多
关键词 Blockchain patient-centric personal health records data sharing attribute-based encryption
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部