期刊文献+
共找到67,019篇文章
< 1 2 250 >
每页显示 20 50 100
A New Double Layer Multi-Secret Sharing Scheme
1
作者 Elavarasi Gunasekaran Vanitha Muthuraman 《China Communications》 SCIE CSCD 2024年第1期297-309,共13页
Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message i... Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods. 展开更多
关键词 genetic algorithm oppositional whale optimization algorithm rectangle block cipher secret sharing scheme SHARES universal share
在线阅读 下载PDF
A Verifiable Multi-Secret Sharing Scheme Based on Hermite Interpolation
2
作者 Tomoko Adachi Chie Okazaki 《Journal of Mathematics and System Science》 2014年第9期587-592,共6页
A threshold scheme, which is introduced by Shamir in 1979, is very famous as a secret sharing scheme. We can consider that this scheme is based on Lagrange's interpolation formula. A secret sharing scheme has one key... A threshold scheme, which is introduced by Shamir in 1979, is very famous as a secret sharing scheme. We can consider that this scheme is based on Lagrange's interpolation formula. A secret sharing scheme has one key. On the other hand, a multi-secret sharing scheme has more than one key, that is, a multi-secret sharing scheme has p (〉_ 2) keys. Dealer distribute shares of keys among n participants. Gathering t (〈 n) participants, keys can be reconstructed. Yang et al. (2004) gave a scheme of a (t, n) multi-secret sharing based on Lagrange's interpolation. Zhao et al. (2007) gave a scheme of a (t, n) verifiable multi-secret sharing based on Lagrange's interpolation. Recently, Adachi and Okazaki give a scheme of a (t, n) multi-secret sharing based on Hermite interpolation, in the case ofp 〈 t. In this paper, we give a scheme ofa (t, n) verifiable multi-secret sharing based on Hermite interpolation. 展开更多
关键词 Verifiable secret sharing scheme multi-secret sharing scheme Hermite interpolation
在线阅读 下载PDF
An Efficient and Secure Multi-Secret Sharing Scheme with General Access Structures 被引量:2
3
作者 PANG Liaojun LI Huixian WANG Yumin 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1649-1652,共4页
A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n... A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n) threshold schemes, so they are fit for only threshold applications and unfit for the applications of general access structures. Due to the fact that a (t, n) threshold scheme could only handle a small fraction of the secret sharing idea, a novel multi-secret sharing scheme is proposed, which is designed based on general access structures. The security of this scheme is the same as that of Shamir's threshold secret sharing scheme. Compared with the existing multiple secret sharing schemes, the proposed scheme can provide greater capabilities for many applications because it is able to deal with applications of general access structures. 展开更多
关键词 CRYPTOGRAPHY information security secret sharing access structure
在线阅读 下载PDF
Bipartite Threshold Multi-Secret Sharing Scheme Based on Hypersphere 被引量:1
4
作者 Bin Li 《American Journal of Computational Mathematics》 2019年第4期207-220,共14页
To address the problem that existing bipartite secret sharing scheme is short of dynamic characteristic, and to solve the problem that each participant can only use secret share once, this paper proposed a bipartite (... To address the problem that existing bipartite secret sharing scheme is short of dynamic characteristic, and to solve the problem that each participant can only use secret share once, this paper proposed a bipartite (n1+n2, m1+m2)-threshold multi-secret sharing scheme which combined cryptography and hypersphere geometry. In this scheme, we introduced a bivariate function and a coordinate function over finite field Zp to calculate the derived points of secret share, which can reconstruct the shared secrets by producing the intersection point of hypernormal plane and normal line on the hypertangent plane. At the initial stage the secret dealer distributes to each participant a secret share that can be kept secret based on the intractability of discrete logarithm problem and need not be changed with updating the shared secrets.Each cooperative participant only needs to submit a derived point calculated from the secret share without exposing this secret share during the process of reconstructing the shared secret. Analyses indicate that the proposed scheme is not only sound and secure because of hypersphere geometric properties and the difficulty of discrete logarithm problem, but also efficient because of its well dynamic behavior and the invariant secret share. Therefore, this bipartite threshold multi-secret sharing scheme is easy to implement and is applicable in practical settings. 展开更多
关键词 BIPARTITE THRESHOLD multi-secret sharing HYPERSPHERE Hypernormal PLANE Hypertangent PLANE
在线阅读 下载PDF
A Secure and Efficient (t, n) Multi-Secret Sharing Scheme 被引量:1
5
作者 PANGLiao-jun WANGYu-min 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期191-194,共4页
Based on Shamir's secret sharing, a (t, n) multi-secret sharing scheme isproposed in this paper p secrets can be shared among n participants, and t or more participants canco-operate to reconstruct these secrets a... Based on Shamir's secret sharing, a (t, n) multi-secret sharing scheme isproposed in this paper p secrets can be shared among n participants, and t or more participants canco-operate to reconstruct these secrets at the same time, but t— 1 or fewerparticipants can derivenothing about these secrets. Each participant's secret shadow is as short as each secret. Comparedwith the existing schemes, the proposed scheme is characterized by the lower complexity of thesecret reconstruction and less public information. The security of this scheme is the same as thatof Shamir' a threshold scheme. Analyses show that this scheme is an efficient, computationallysecure scheme. 展开更多
关键词 CRYPTOSYSTEM threshold scheme secret sharing
在线阅读 下载PDF
Visual Multi-Secret Sharing with Friendliness 被引量:1
6
作者 郑富国 林恺翔 +1 位作者 林志鸿 陈宗和 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期455-465,共11页
Visual secret sharing(VSS) was used in the literature to encode and decode secret images until visual multi-secret sharing(VMSS) was proposed. Distinctly, multiple secret images can be encoded or decoded at a time in ... Visual secret sharing(VSS) was used in the literature to encode and decode secret images until visual multi-secret sharing(VMSS) was proposed. Distinctly, multiple secret images can be encoded or decoded at a time in VMSS; however, only one secret image can be done in VSS. In VMSS, secrets are encoded into noise-like shares which have finally been stacked altogether so as to disclose each of the secrets by specific operations, such as rotating, flipping and sliding. Though the noise-like shares can be decoded by those operations, it is just like a fly in the ointment since they are hard to manage, to recognize and even to stack orderly. Based on some researches about user-friendly VSS for generating meaningful shares, a new friendly VMSS scheme is presented in this paper for achieving two main goals. One is trying to encode multiple secrets at a time and the other is making the decoding process easy to manage. The experimental results prove that our proposed scheme does work. 展开更多
关键词 visual cryptography random grids visual secret sharing(VSS) image encryption
原文传递
A Multi-Secret Sharing Scheme with Many Keys Based on Hermite Interpolation
7
作者 Tomoko Adachi Chie Okazaki 《Journal of Applied Mathematics and Physics》 2014年第13期1196-1201,共6页
A secret sharing scheme is one of cryptographies. A threshold scheme, which is introduced by Shamir in 1979, is very famous as a secret sharing scheme. We can consider that this scheme is based on Lagrange's inter... A secret sharing scheme is one of cryptographies. A threshold scheme, which is introduced by Shamir in 1979, is very famous as a secret sharing scheme. We can consider that this scheme is based on Lagrange's interpolation formula. A secret sharing scheme has one key. On the other hand, a multi-secret sharing scheme has more than one keys;that is, a multi-secret sharing scheme has p (≥2) keys. Dealers distribute shares of keys among n participants. Gathering t (≤n) participants, keys can be reconstructed. In this paper, we give a scheme of a (t,n) multi-secret sharing based on Hermite interpolation, in the case of p≤t. 展开更多
关键词 SECRET sharing SCHEME Multi SECRET sharing SCHEME HERMITE Interpolation
在线阅读 下载PDF
Server-Aided Multi-Secret Sharing Scheme for Weak Computational Devices
8
作者 En Zhang Xintao Duan +4 位作者 Siuming Yiu Junbin Fang Zoe L.Jiang Tsz HonYuen Jie Peng 《Computers, Materials & Continua》 SCIE EI 2018年第9期401-414,共14页
In the setting of(t,n)threshold secret sharing,at least t parties can reconstruct the secret,and fewer than t parties learn nothing about the secret.However,to achieve fairness,the existing secret sharing schemes eith... In the setting of(t,n)threshold secret sharing,at least t parties can reconstruct the secret,and fewer than t parties learn nothing about the secret.However,to achieve fairness,the existing secret sharing schemes either assume a trusted party exists or require running multi-round,which is not practical in a real application.In addition,the cost of verification grows dramatically with the number of participants and the communication complexity is O(t),if there is not a trusted combiner in the reconstruction phase.In this work,we propose a fair server-aided multi-secret sharing scheme for weak computational devices.The malicious behavior of clients or server providers in the scheme can be verified,and the server provider learns nothing about the secret shadows and the secrets.Unlike other secret sharing schemes,our scheme does not require interaction among users and can work in asynchronous mode,which is suitable for mobile networks or cloud computing environments since weak computational mobile devices are not always online.Moreover,in the scheme,the secret shadow is reusable,and expensive computation such as reconstruction computation and homomorphic verification computation can be outsourced to the server provider,and the users only require a small amount of computation. 展开更多
关键词 SECRET sharing server-aided NON-INTERACTIVE FAIRNESS
在线阅读 下载PDF
Eco-Driven Leadership in Pharmaceutical Industry:The Impact of Knowledge Sharing,Innovation,and Shared Vision on Environmental Performance
9
作者 Mohammad Nurul Alam Mohamedelhassan.O.A.Babiker +3 位作者 Fariza Hashim Md.Abu Issa Gazi Hammad S.Alotaibi Zainun Mustafa 《Journal of Environmental & Earth Sciences》 2025年第5期49-71,共23页
Corporate environmental sustainability has become a critical concern,particularly in resource-intensive industries such as pharmaceuticals,where regulatory pressures and stakeholder expectations continue to rise.Despi... Corporate environmental sustainability has become a critical concern,particularly in resource-intensive industries such as pharmaceuticals,where regulatory pressures and stakeholder expectations continue to rise.Despite increasing attention to green leadership,limited research has explored how environmentally responsible leadership(ERL)influences corporate environmental performance(CEP)through employee-driven sustainability behaviors.This study addresses this gap by examining the mediating roles of green knowledge-sharing behavior(GKSB),green innovative behavior(GIB),and voluntary green behavior(VGB),as well as the moderating role of green shared vision(GSV)in the ERL-CEP relationship.The study is grounded in Resource-Based View(RBV),Knowledge-Based View(KBV),Environmental-Based View(EBV),and Triple Bottom Line(TBL)theories,which collectively explain how leadership-driven sustainability efforts create long-term competitive advantages,drive environmental responsibility,and balance economic,social,and environmental sustainability.A quantitative research design was employed,using survey data from 384 employees in Bangladesh’s pharmaceutical sector.Data were analyzed using Partial Least Squares Structural Equation Modeling(PLS-SEM)in Smart-PLS 4.0 to assess direct,indirect,and moderating effects.The results confirm that ERL has a significant positive impact on CEP,with GKSB,GIB,and VGB acting as mediators,while GSV strengthens the ERL-CEP relationship.This study provides novel empirical evidence on the mechanisms linking green leadership to corporate sustainability,extending the application of RBV,KBV,EBV,and TBL to leadership-driven environmental management.The findings emphasize the importance of leadership training programs,sustainability-focused organizational cultures,and shared environmental visions.Policymakers should consider incentives for companies adopting ERL practices,ensuring that sustainability becomes a strategic,rather than compliance-driven,priority.This study contributes to leadership and sustainability literature by offering a comprehensive framework for integrating ERL into corporate governance and environmental strategies. 展开更多
关键词 Environmentally Responsible Leadership Corporate Environmental Performance Green Knowledge sharing Green Innovation Behavior Green Voluntary Behaviour Green-Shared Vision
暂未订购
Sharing Development Opportunities--Scholars and officials call for promoting all-weather China-Africa community with a shared future for the new era
10
作者 ZHONG FEI 《ChinAfrica》 2025年第6期40-43,共4页
At the 2024 Beijing Forum on China-Africa Cooperation(FOCAC)held in September last year,Chinese President Xi Jinping proposed that the overall characterisation of China-Africa relations be elevated to an all-weather C... At the 2024 Beijing Forum on China-Africa Cooperation(FOCAC)held in September last year,Chinese President Xi Jinping proposed that the overall characterisation of China-Africa relations be elevated to an all-weather China-Africa community with a shared future for the new era.“This declaration affirms,whether faced with pandemic or geopolitical shifts,Africa and China will still remain each other’s most trustworthy true partners,”said Inkosi Mzamo Buthelezi,South Africa’s minister of public service and administration. 展开更多
关键词 shared future all weather China Africa community cooperation FOCAC pandemic geopolitical shifts new era China Africa relations
原文传递
Linear multi-secret sharing schemes 被引量:8
11
作者 XlAOLiangliang LIUMulan 《Science in China(Series F)》 2005年第1期125-136,共12页
In this paper the linear multi-secret sharing schemes are studied by using monotone span programs. A relation between computing monotone Boolean functions by using monotone span programs and realizing multi-access str... In this paper the linear multi-secret sharing schemes are studied by using monotone span programs. A relation between computing monotone Boolean functions by using monotone span programs and realizing multi-access structures by using linear multi-secret sharing schemes is shown. Furthermore, the concept of optimal linear multi-secret sharing scheme is presented and the several schemes are proved to be optimal. 展开更多
关键词 multi-secret sharing scheme linear multi-secret sharing scheme monotone span program optimal linear multi-secret sharing scheme.
原文传递
针刺临床试验中假针刺对照报告指南ACURATE与SHARE比较分析
12
作者 刘川杨 李斌艳 +4 位作者 段炎珊 周航 王宇 屠建锋 王丽琼 《中国循证医学杂志》 北大核心 2025年第4期485-490,共6页
为了给研究者未来选用和优化针刺临床试验中假针刺报告指南提供建议,本研究通过定性分析对中韩两国研究人员分别制订的针刺临床试验中假针刺对照报告指南与清单(SHARE)和临床试验与实验针刺对照报告指南(ACURATE)的基本信息及具体内容... 为了给研究者未来选用和优化针刺临床试验中假针刺报告指南提供建议,本研究通过定性分析对中韩两国研究人员分别制订的针刺临床试验中假针刺对照报告指南与清单(SHARE)和临床试验与实验针刺对照报告指南(ACURATE)的基本信息及具体内容进行比较,并结合具体案例阐明两者的异同点。本研究发现与既往针刺临床试验干预措施报告规范(STRICTA)和安慰剂和假干预对照的报告指南和清单(TIDieR-Placebo)相比,ACURATE指南与SHARE指南均强调假针刺对照细节与背景因素的报告,但在内容上各有特点与侧重。条目划分方面,ACURATE通过将主题内容拆分以强调单个条目的重要性;SHARE通过将多个条目合并以强调报告内容的全面性。具体内容方面,ACURATE强调合并治疗、向受试者提供的假针刺信息及真/假针刺在治疗设置等方面的任何差异,对于假针刺对照设置具有借鉴价值;SHARE侧重于对假针刺细节、操作者及方案调整等内容的报告。通过案例发现对两项指南均有条目存在未报告或部分报告的情况,建议未来研究者在进行假针刺对照的报告时可以结合使用两项指南,并对以上两项指南的可操作性与实用性进行验证,为两者的持续优化与更新提供建议。 展开更多
关键词 针刺 报告指南 针刺临床试验 ACURATE指南 SHARE指南
原文传递
基于CONSORT声明、STRICTA和SHARE清单的针刺治疗痛经随机对照试验报告质量评价
13
作者 焦梓桐 李仲贤 +2 位作者 彭敏 张潘 周鹏 《中国中医药信息杂志》 2025年第6期58-65,共8页
目的对针刺治疗痛经随机对照试验(RCT)的报告质量进行评价。方法系统检索PubMed、Embase、Cochrane Library、中国期刊全文数据库(CNKI)、中国生物医学文献服务系统(SinoMed)、中国学术期刊全文数据库(万方数据)和中文科技期刊数据库(V... 目的对针刺治疗痛经随机对照试验(RCT)的报告质量进行评价。方法系统检索PubMed、Embase、Cochrane Library、中国期刊全文数据库(CNKI)、中国生物医学文献服务系统(SinoMed)、中国学术期刊全文数据库(万方数据)和中文科技期刊数据库(VIP)中针刺治疗痛经RCT的中英文文献,检索时间范围为建库至2024年3月31日。参考试验报告标准(CONSORT)声明、针刺临床试验干预措施报告标准(STRICTA)及假针刺对照报告指南与清单(SHARE),对符合纳入标准的针刺治疗痛经的RCT进行评价统计。结果共纳入28篇RCT,经分析统计,尽管RCT基本实施要点报告率较为满意,但CONSORT声明、STRICTA及SHARE有关盲法的实施细节、结局指标的划定及统计学分析、样本量的确定方法、假针刺的合理性分析及实施细节等条目,报告率仍不足50%甚至为0%。其中报告率低于30%的条目以题目的识别性、试验设计的完整性、结局指标阐述的全面性、统计分析的全面性、针刺治疗的合理性分析、假针刺的操作细节、试验信息的充分汇报等方面为主。结论目前国内外以假针刺为对照治疗痛经的RCT报告质量整体偏低,尤其体现在假针刺合理性、实施方法及对结局指标的统计分析等方面,建议日后设计临床试验方案时应严格遵循CONSORT声明、STRICTA及SHARE,多阶段多次自我评价、及时调整完善方案设计,以期提高方案的安全性、真实性和科学性。 展开更多
关键词 原发性痛经 继发性痛经 针刺 报告质量评价 CONSORT声明 STRICTA SHARE
暂未订购
A Lightweight IoT Data Security Sharing Scheme Based on Attribute-Based Encryption and Blockchain 被引量:1
14
作者 Hongliang Tian Meiruo Li 《Computers, Materials & Continua》 2025年第6期5539-5559,共21页
The accelerated advancement of the Internet of Things(IoT)has generated substantial data,including sensitive and private information.Consequently,it is imperative to guarantee the security of data sharing.While facili... The accelerated advancement of the Internet of Things(IoT)has generated substantial data,including sensitive and private information.Consequently,it is imperative to guarantee the security of data sharing.While facilitating fine-grained access control,Ciphertext Policy Attribute-Based Encryption(CP-ABE)can effectively ensure the confidentiality of shared data.Nevertheless,the conventional centralized CP-ABE scheme is plagued by the issues of keymisuse,key escrow,and large computation,which will result in security risks.This paper suggests a lightweight IoT data security sharing scheme that integrates blockchain technology and CP-ABE to address the abovementioned issues.The integrity and traceability of shared data are guaranteed by the use of blockchain technology to store and verify access transactions.The encryption and decryption operations of the CP-ABE algorithm have been implemented using elliptic curve scalarmultiplication to accommodate lightweight IoT devices,as opposed to themore arithmetic bilinear pairing found in the traditional CP-ABE algorithm.Additionally,a portion of the computation is delegated to the edge nodes to alleviate the computational burden on users.A distributed key management method is proposed to address the issues of key escrow andmisuse.Thismethod employs the edge blockchain to facilitate the storage and distribution of attribute private keys.Meanwhile,data security sharing is enhanced by combining off-chain and on-chain ciphertext storage.The security and performance analysis indicates that the proposed scheme is more efficient and secure. 展开更多
关键词 Edge blockchain CP-ABE data security sharing IOT
在线阅读 下载PDF
A Trusted Distributed Oracle Scheme Based on Share Recovery Threshold Signature 被引量:1
15
作者 Shihao Wang Xuehui Du +4 位作者 Xiangyu Wu Qiantao Yang Wenjuan Wang Yu Cao Aodi Liu 《Computers, Materials & Continua》 2025年第2期3355-3379,共25页
With the increasing popularity of blockchain applications, the security of data sources on the blockchain is gradually receiving attention. Providing reliable data for the blockchain safely and efficiently has become ... With the increasing popularity of blockchain applications, the security of data sources on the blockchain is gradually receiving attention. Providing reliable data for the blockchain safely and efficiently has become a research hotspot, and the security of the oracle responsible for providing reliable data has attracted much attention. The most widely used centralized oracles in blockchain, such as Provable and Town Crier, all rely on a single oracle to obtain data, which suffers from a single point of failure and limits the large-scale development of blockchain. To this end, the distributed oracle scheme is put forward, but the existing distributed oracle schemes such as Chainlink and Augur generally have low execution efficiency and high communication overhead, which leads to their poor applicability. To solve the above problems, this paper proposes a trusted distributed oracle scheme based on a share recovery threshold signature. First, a data verification method of distributed oracles is designed based on threshold signature. By aggregating the signatures of oracles, data from different data sources can be mutually verified, leading to a more efficient data verification and aggregation process. Then, a credibility-based cluster head election algorithm is designed, which reduces the communication overhead by clarifying the function distribution and building a hierarchical structure. Considering the good performance of the BLS threshold signature in large-scale applications, this paper combines it with distributed oracle technology and proposes a BLS threshold signature algorithm that supports share recovery in distributed oracles. The share recovery mechanism enables the proposed scheme to solve the key loss issue, and the setting of the threshold value enables the proposed scheme to complete signature aggregation with only a threshold number of oracles, making the scheme more robust. Finally, experimental results indicate that, by using the threshold signature technology and the cluster head election algorithm, our scheme effectively improves the execution efficiency of oracles and solves the problem of a single point of failure, leading to higher scalability and robustness. 展开更多
关键词 Blockchain threshold signature distributed oracle data submission share recovery
在线阅读 下载PDF
From“Cost Sharing”to“Responsibility Sharing”:Uncertain Prospect of US-Europe Relations
16
作者 Song Fang 《Contemporary International Relations》 2025年第2期37-59,共23页
Burden sharing has been a perennial issue in the transatlantic alliance,primarily entailing cost sharing and responsibility sharing.During the first Trump administration,the dispute over cost sharing had been prominen... Burden sharing has been a perennial issue in the transatlantic alliance,primarily entailing cost sharing and responsibility sharing.During the first Trump administration,the dispute over cost sharing had been prominent,while the Biden administration placed more emphasis on responsibility sharing to facilitate its strategic goal of“outcompeting”China.The Ukraine crisis had prompted a US-Europe consensus on cost sharing,but the urgency of responsibility sharing subsequently increased.The shift from jointly providing the economic resources to extensively sharing the security responsibilities ref lects the recalibration of the US strategic focus and its higher expectations for the role of European allies.Nevertheless,Europe's response to the US call for responsibility sharing has been relatively limited.The responsibility sharing within the US-Europe alliance and their future relationship will be subject to the strategic coordination between the two sides and multiple complex factors. 展开更多
关键词 China-US competition cost sharing responsibility sharing US-Europe alliance
在线阅读 下载PDF
A Journey of Shared Aspirations
17
作者 EPHETA SANGALA WALLSTONE 《ChinAfrica》 2025年第8期58-59,共2页
A Malawian perspective on China’s influence,innovation and shared growth In today’s interconnected world,diplomacy,trade,and culture are drawing nations once thought distant closer.A case in point is the growing rel... A Malawian perspective on China’s influence,innovation and shared growth In today’s interconnected world,diplomacy,trade,and culture are drawing nations once thought distant closer.A case in point is the growing relationship between Malawi and China-two geographically and historically distinct countries that are finding powerful common ground and shared aspirations. 展开更多
关键词 chinas influence DIPLOMACY JOURNEY shared growth common ground interconnected world shared aspirations INNOVATION
原文传递
Advancing the Vision of a Community with a Shared Future in the South China Sea:Current Foundation and Future Pathways
18
作者 Zhang Jie 《China International Studies》 2025年第3期61-90,共30页
The concept of a community with a shared future for humanity is the core idea of Xi Jinping thought on diplomacy.Since its introduction,this concept has been steadily advanced across various levels and sectors,yieldin... The concept of a community with a shared future for humanity is the core idea of Xi Jinping thought on diplomacy.Since its introduction,this concept has been steadily advanced across various levels and sectors,yielding tangible and meaningful results.Within Chinese academia,the idea of a community with a shared future for humanity,along with the important idea of a maritime community with a shared future,has been integrated into research on South China Sea issues.Scholars have explored China’s approach to establishing regional order in the South China Sea from multiple perspectives,including territorial dispute resolution,maritime rights and interests’protection,environmental conservation,and port cooperation. 展开更多
关键词 territorial dispute resolution maritime community shared future environmental conservation port cooperation community shared future maritime rights interests community shared future humanity South China Sea
在线阅读 下载PDF
Steadily Advancing the Building of China-South Asia Community with a Shared Future
19
作者 Lou Chunhao 《Contemporary International Relations》 2025年第4期11-17,共7页
From April 8 to 9,2025,the Cent ral Conference on Work Related to Neighboring Countries was held in Beijing.The conference systematically summarized the achievements and experience of China's neighborhood work in ... From April 8 to 9,2025,the Cent ral Conference on Work Related to Neighboring Countries was held in Beijing.The conference systematically summarized the achievements and experience of China's neighborhood work in the new era,scientifically analyzed the situation,clarified the goals,tasks,ideas,and measures for neighborhood work in the coming period,and emphasized the need to focus on building a community with a shared future with neighboring countries,striving to break new ground in neighborhood work. 展开更多
关键词 neighborhood work shared future building community shared future central conference China South Asia community
在线阅读 下载PDF
Giving Full Play to Southeast Asia's Exemplar Role in Building a Community with a Shared Future with Neighboring Countries
20
作者 Li Kai 《Contemporary International Relations》 2025年第4期4-10,共7页
As an important part of China's neighborhood,Southeast Asia has always been a high priority in China's neighborhood diplomacy,playing a benchmark and example-setting role in China's drive to build a commun... As an important part of China's neighborhood,Southeast Asia has always been a high priority in China's neighborhood diplomacy,playing a benchmark and example-setting role in China's drive to build a community with a shared future with neighboring countries.Shortly after the 2025 Central Conference on Work Related to Neighboring Countries,Chinese President Xi Jinping paid state visits to Vietnam,Malaysia,and Cambodia. 展开更多
关键词 Southeast Asia Neighboring Countries Diplomacy build community shared future China State Visits Community Shared Future
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部