期刊文献+
共找到68,044篇文章
< 1 2 250 >
每页显示 20 50 100
A Verifiable Multi-Secret Sharing Scheme Based on Hermite Interpolation
1
作者 Tomoko Adachi Chie Okazaki 《Journal of Mathematics and System Science》 2014年第9期587-592,共6页
A threshold scheme, which is introduced by Shamir in 1979, is very famous as a secret sharing scheme. We can consider that this scheme is based on Lagrange's interpolation formula. A secret sharing scheme has one key... A threshold scheme, which is introduced by Shamir in 1979, is very famous as a secret sharing scheme. We can consider that this scheme is based on Lagrange's interpolation formula. A secret sharing scheme has one key. On the other hand, a multi-secret sharing scheme has more than one key, that is, a multi-secret sharing scheme has p (〉_ 2) keys. Dealer distribute shares of keys among n participants. Gathering t (〈 n) participants, keys can be reconstructed. Yang et al. (2004) gave a scheme of a (t, n) multi-secret sharing based on Lagrange's interpolation. Zhao et al. (2007) gave a scheme of a (t, n) verifiable multi-secret sharing based on Lagrange's interpolation. Recently, Adachi and Okazaki give a scheme of a (t, n) multi-secret sharing based on Hermite interpolation, in the case ofp 〈 t. In this paper, we give a scheme ofa (t, n) verifiable multi-secret sharing based on Hermite interpolation. 展开更多
关键词 Verifiable secret sharing scheme multi-secret sharing scheme Hermite interpolation
在线阅读 下载PDF
An Efficient and Secure Multi-Secret Sharing Scheme with General Access Structures 被引量:2
2
作者 PANG Liaojun LI Huixian WANG Yumin 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1649-1652,共4页
A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n... A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n) threshold schemes, so they are fit for only threshold applications and unfit for the applications of general access structures. Due to the fact that a (t, n) threshold scheme could only handle a small fraction of the secret sharing idea, a novel multi-secret sharing scheme is proposed, which is designed based on general access structures. The security of this scheme is the same as that of Shamir's threshold secret sharing scheme. Compared with the existing multiple secret sharing schemes, the proposed scheme can provide greater capabilities for many applications because it is able to deal with applications of general access structures. 展开更多
关键词 CRYPTOGRAPHY information security secret sharing access structure
在线阅读 下载PDF
Bipartite Threshold Multi-Secret Sharing Scheme Based on Hypersphere 被引量:1
3
作者 Bin Li 《American Journal of Computational Mathematics》 2019年第4期207-220,共14页
To address the problem that existing bipartite secret sharing scheme is short of dynamic characteristic, and to solve the problem that each participant can only use secret share once, this paper proposed a bipartite (... To address the problem that existing bipartite secret sharing scheme is short of dynamic characteristic, and to solve the problem that each participant can only use secret share once, this paper proposed a bipartite (n1+n2, m1+m2)-threshold multi-secret sharing scheme which combined cryptography and hypersphere geometry. In this scheme, we introduced a bivariate function and a coordinate function over finite field Zp to calculate the derived points of secret share, which can reconstruct the shared secrets by producing the intersection point of hypernormal plane and normal line on the hypertangent plane. At the initial stage the secret dealer distributes to each participant a secret share that can be kept secret based on the intractability of discrete logarithm problem and need not be changed with updating the shared secrets.Each cooperative participant only needs to submit a derived point calculated from the secret share without exposing this secret share during the process of reconstructing the shared secret. Analyses indicate that the proposed scheme is not only sound and secure because of hypersphere geometric properties and the difficulty of discrete logarithm problem, but also efficient because of its well dynamic behavior and the invariant secret share. Therefore, this bipartite threshold multi-secret sharing scheme is easy to implement and is applicable in practical settings. 展开更多
关键词 BIPARTITE THRESHOLD multi-secret sharing HYPERSPHERE Hypernormal PLANE Hypertangent PLANE
在线阅读 下载PDF
A Secure and Efficient (t, n) Multi-Secret Sharing Scheme 被引量:1
4
作者 PANGLiao-jun WANGYu-min 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期191-194,共4页
Based on Shamir's secret sharing, a (t, n) multi-secret sharing scheme isproposed in this paper p secrets can be shared among n participants, and t or more participants canco-operate to reconstruct these secrets a... Based on Shamir's secret sharing, a (t, n) multi-secret sharing scheme isproposed in this paper p secrets can be shared among n participants, and t or more participants canco-operate to reconstruct these secrets at the same time, but t— 1 or fewerparticipants can derivenothing about these secrets. Each participant's secret shadow is as short as each secret. Comparedwith the existing schemes, the proposed scheme is characterized by the lower complexity of thesecret reconstruction and less public information. The security of this scheme is the same as thatof Shamir' a threshold scheme. Analyses show that this scheme is an efficient, computationallysecure scheme. 展开更多
关键词 CRYPTOSYSTEM threshold scheme secret sharing
在线阅读 下载PDF
Visual Multi-Secret Sharing with Friendliness 被引量:1
5
作者 郑富国 林恺翔 +1 位作者 林志鸿 陈宗和 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期455-465,共11页
Visual secret sharing(VSS) was used in the literature to encode and decode secret images until visual multi-secret sharing(VMSS) was proposed. Distinctly, multiple secret images can be encoded or decoded at a time in ... Visual secret sharing(VSS) was used in the literature to encode and decode secret images until visual multi-secret sharing(VMSS) was proposed. Distinctly, multiple secret images can be encoded or decoded at a time in VMSS; however, only one secret image can be done in VSS. In VMSS, secrets are encoded into noise-like shares which have finally been stacked altogether so as to disclose each of the secrets by specific operations, such as rotating, flipping and sliding. Though the noise-like shares can be decoded by those operations, it is just like a fly in the ointment since they are hard to manage, to recognize and even to stack orderly. Based on some researches about user-friendly VSS for generating meaningful shares, a new friendly VMSS scheme is presented in this paper for achieving two main goals. One is trying to encode multiple secrets at a time and the other is making the decoding process easy to manage. The experimental results prove that our proposed scheme does work. 展开更多
关键词 visual cryptography random grids visual secret sharing(VSS) image encryption
原文传递
A Multi-Secret Sharing Scheme with Many Keys Based on Hermite Interpolation
6
作者 Tomoko Adachi Chie Okazaki 《Journal of Applied Mathematics and Physics》 2014年第13期1196-1201,共6页
A secret sharing scheme is one of cryptographies. A threshold scheme, which is introduced by Shamir in 1979, is very famous as a secret sharing scheme. We can consider that this scheme is based on Lagrange's inter... A secret sharing scheme is one of cryptographies. A threshold scheme, which is introduced by Shamir in 1979, is very famous as a secret sharing scheme. We can consider that this scheme is based on Lagrange's interpolation formula. A secret sharing scheme has one key. On the other hand, a multi-secret sharing scheme has more than one keys;that is, a multi-secret sharing scheme has p (≥2) keys. Dealers distribute shares of keys among n participants. Gathering t (≤n) participants, keys can be reconstructed. In this paper, we give a scheme of a (t,n) multi-secret sharing based on Hermite interpolation, in the case of p≤t. 展开更多
关键词 SECRET sharing SCHEME Multi SECRET sharing SCHEME HERMITE Interpolation
在线阅读 下载PDF
A New Double Layer Multi-Secret Sharing Scheme
7
作者 Elavarasi Gunasekaran Vanitha Muthuraman 《China Communications》 SCIE CSCD 2024年第1期297-309,共13页
Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message i... Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods. 展开更多
关键词 genetic algorithm oppositional whale optimization algorithm rectangle block cipher secret sharing scheme SHARES universal share
在线阅读 下载PDF
Server-Aided Multi-Secret Sharing Scheme for Weak Computational Devices
8
作者 En Zhang Xintao Duan +4 位作者 Siuming Yiu Junbin Fang Zoe L.Jiang Tsz HonYuen Jie Peng 《Computers, Materials & Continua》 SCIE EI 2018年第9期401-414,共14页
In the setting of(t,n)threshold secret sharing,at least t parties can reconstruct the secret,and fewer than t parties learn nothing about the secret.However,to achieve fairness,the existing secret sharing schemes eith... In the setting of(t,n)threshold secret sharing,at least t parties can reconstruct the secret,and fewer than t parties learn nothing about the secret.However,to achieve fairness,the existing secret sharing schemes either assume a trusted party exists or require running multi-round,which is not practical in a real application.In addition,the cost of verification grows dramatically with the number of participants and the communication complexity is O(t),if there is not a trusted combiner in the reconstruction phase.In this work,we propose a fair server-aided multi-secret sharing scheme for weak computational devices.The malicious behavior of clients or server providers in the scheme can be verified,and the server provider learns nothing about the secret shadows and the secrets.Unlike other secret sharing schemes,our scheme does not require interaction among users and can work in asynchronous mode,which is suitable for mobile networks or cloud computing environments since weak computational mobile devices are not always online.Moreover,in the scheme,the secret shadow is reusable,and expensive computation such as reconstruction computation and homomorphic verification computation can be outsourced to the server provider,and the users only require a small amount of computation. 展开更多
关键词 SECRET sharing server-aided NON-INTERACTIVE FAIRNESS
在线阅读 下载PDF
Linear multi-secret sharing schemes 被引量:8
9
作者 XlAOLiangliang LIUMulan 《Science in China(Series F)》 2005年第1期125-136,共12页
In this paper the linear multi-secret sharing schemes are studied by using monotone span programs. A relation between computing monotone Boolean functions by using monotone span programs and realizing multi-access str... In this paper the linear multi-secret sharing schemes are studied by using monotone span programs. A relation between computing monotone Boolean functions by using monotone span programs and realizing multi-access structures by using linear multi-secret sharing schemes is shown. Furthermore, the concept of optimal linear multi-secret sharing scheme is presented and the several schemes are proved to be optimal. 展开更多
关键词 multi-secret sharing scheme linear multi-secret sharing scheme monotone span program optimal linear multi-secret sharing scheme.
原文传递
Eco-Driven Leadership in Pharmaceutical Industry:The Impact of Knowledge Sharing,Innovation,and Shared Vision on Environmental Performance
10
作者 Mohammad Nurul Alam Mohamedelhassan.O.A.Babiker +3 位作者 Fariza Hashim Md.Abu Issa Gazi Hammad S.Alotaibi Zainun Mustafa 《Journal of Environmental & Earth Sciences》 2025年第5期49-71,共23页
Corporate environmental sustainability has become a critical concern,particularly in resource-intensive industries such as pharmaceuticals,where regulatory pressures and stakeholder expectations continue to rise.Despi... Corporate environmental sustainability has become a critical concern,particularly in resource-intensive industries such as pharmaceuticals,where regulatory pressures and stakeholder expectations continue to rise.Despite increasing attention to green leadership,limited research has explored how environmentally responsible leadership(ERL)influences corporate environmental performance(CEP)through employee-driven sustainability behaviors.This study addresses this gap by examining the mediating roles of green knowledge-sharing behavior(GKSB),green innovative behavior(GIB),and voluntary green behavior(VGB),as well as the moderating role of green shared vision(GSV)in the ERL-CEP relationship.The study is grounded in Resource-Based View(RBV),Knowledge-Based View(KBV),Environmental-Based View(EBV),and Triple Bottom Line(TBL)theories,which collectively explain how leadership-driven sustainability efforts create long-term competitive advantages,drive environmental responsibility,and balance economic,social,and environmental sustainability.A quantitative research design was employed,using survey data from 384 employees in Bangladesh’s pharmaceutical sector.Data were analyzed using Partial Least Squares Structural Equation Modeling(PLS-SEM)in Smart-PLS 4.0 to assess direct,indirect,and moderating effects.The results confirm that ERL has a significant positive impact on CEP,with GKSB,GIB,and VGB acting as mediators,while GSV strengthens the ERL-CEP relationship.This study provides novel empirical evidence on the mechanisms linking green leadership to corporate sustainability,extending the application of RBV,KBV,EBV,and TBL to leadership-driven environmental management.The findings emphasize the importance of leadership training programs,sustainability-focused organizational cultures,and shared environmental visions.Policymakers should consider incentives for companies adopting ERL practices,ensuring that sustainability becomes a strategic,rather than compliance-driven,priority.This study contributes to leadership and sustainability literature by offering a comprehensive framework for integrating ERL into corporate governance and environmental strategies. 展开更多
关键词 Environmentally Responsible Leadership Corporate Environmental Performance Green Knowledge sharing Green Innovation Behavior Green Voluntary Behaviour Green-Shared Vision
暂未订购
Sharing Development Opportunities--Scholars and officials call for promoting all-weather China-Africa community with a shared future for the new era
11
作者 ZHONG FEI 《ChinAfrica》 2025年第6期40-43,共4页
At the 2024 Beijing Forum on China-Africa Cooperation(FOCAC)held in September last year,Chinese President Xi Jinping proposed that the overall characterisation of China-Africa relations be elevated to an all-weather C... At the 2024 Beijing Forum on China-Africa Cooperation(FOCAC)held in September last year,Chinese President Xi Jinping proposed that the overall characterisation of China-Africa relations be elevated to an all-weather China-Africa community with a shared future for the new era.“This declaration affirms,whether faced with pandemic or geopolitical shifts,Africa and China will still remain each other’s most trustworthy true partners,”said Inkosi Mzamo Buthelezi,South Africa’s minister of public service and administration. 展开更多
关键词 shared future all weather China Africa community cooperation FOCAC pandemic geopolitical shifts new era China Africa relations
原文传递
癌痛针刺临床试验中假针刺设置及基于SHARE清单的报告情况
12
作者 吕笑颜 刘晓玉 +3 位作者 张贺 张浩然 陈波 闫世艳 《中国中医药信息杂志》 2026年第1期20-28,共9页
目的 明确癌痛随机对照试验(RCTs)中假针刺对照的设置和报告情况,使用《针刺临床试验中假针刺对照报告指南与清单》(SHARE)评价假针刺报告情况,为研究设计中的假针刺设置和报告提供参考。方法 通过主题词和自由词结合的方式,检索PubMed... 目的 明确癌痛随机对照试验(RCTs)中假针刺对照的设置和报告情况,使用《针刺临床试验中假针刺对照报告指南与清单》(SHARE)评价假针刺报告情况,为研究设计中的假针刺设置和报告提供参考。方法 通过主题词和自由词结合的方式,检索PubMed、Embase、Cochrane Library、Web of Science、中国期刊全文数据库、中国生物医学文献服务系统、维普中文期刊服务平台、万方数据知识服务平台建库至2024年12月31日相关文献,纳入假针刺对照的癌痛RCT研究,并使用SHARE清单评价纳入研究的假针刺报告情况。结果 共纳入30篇文献,其中英文17篇、中文13篇。刺入类假针刺设置包括同干预组穴位刺入(1篇,3.33%)、同干预组穴位不刺入(7篇,23.33%)、非穴浅刺(4篇,13.33%)、非穴不刺入(4篇,13.33%);非刺入类假针刺设置包括同干预组穴位弱刺激(3篇,10.00%)和同干预组穴位无刺激(11篇,36.67%)。中文文献报告率100%的条目3个,报告率高于50%的条目3个,报告率为0%的条目5个,其余8个条目报告率不足50%。英文文献报告率100%的条目2个,报告率高于50%的条目5个,报告率为0%的条目2个,其余10个条目报告率不足50%。结论 目前,癌痛针刺临床试验中假针刺设置形式多样,报告尚不够全面,需要对假针刺对照细节进行全面、清晰、规范的报告,以提高研究的可靠性和可重复性。 展开更多
关键词 癌症相关性疼痛 针刺 随机对照试验 假针刺 SHARE清单
暂未订购
Toward Secure and Auditable Data Sharing:A Cross-Chain CP-ABE Framework
13
作者 Ye Tian Zhuokun Fan Yifeng Zhang 《Computers, Materials & Continua》 2026年第4期1509-1529,共21页
Amid the increasing demand for data sharing,the need for flexible,secure,and auditable access control mechanisms has garnered significant attention in the academic community.However,blockchain-based ciphertextpolicy a... Amid the increasing demand for data sharing,the need for flexible,secure,and auditable access control mechanisms has garnered significant attention in the academic community.However,blockchain-based ciphertextpolicy attribute-based encryption(CP-ABE)schemes still face cumbersome ciphertext re-encryption and insufficient oversight when handling dynamic attribute changes and cross-chain collaboration.To address these issues,we propose a dynamic permission attribute-encryption scheme for multi-chain collaboration.This scheme incorporates a multiauthority architecture for distributed attribute management and integrates an attribute revocation and granting mechanism that eliminates the need for ciphertext re-encryption,effectively reducing both computational and communication overhead.It leverages the InterPlanetary File System(IPFS)for off-chain data storage and constructs a cross-chain regulatory framework—comprising a Hyperledger Fabric business chain and a FISCO BCOS regulatory chain—to record changes in decryption privileges and access behaviors in an auditable manner.Security analysis shows selective indistinguishability under chosen-plaintext attack(sIND-CPA)security under the decisional q-Parallel Bilinear Diffie-Hellman Exponent Assumption(q-PBDHE).In the performance and experimental evaluations,we compared the proposed scheme with several advanced schemes.The results show that,while preserving security,the proposed scheme achieves higher encryption/decryption efficiency and lower storage overhead for ciphertexts and keys. 展开更多
关键词 Data sharing blockchain attribute-based encryption dynamic permissions
在线阅读 下载PDF
Seeking Shared Prosperity——East China’s Zhejiang strives to improve the lives of all people through diversified development strategies
14
作者 TAO XING 《ChinAfrica》 2026年第2期18-21,共4页
Fifty-five-year-old Shi Yizhong never imagined fireflies could become the foundation of a serious business.In 2022,Longshan Village in Huzhou’s Wuxing District collaborated with a young entrepreneurial team to create... Fifty-five-year-old Shi Yizhong never imagined fireflies could become the foundation of a serious business.In 2022,Longshan Village in Huzhou’s Wuxing District collaborated with a young entrepreneurial team to create a firefly campsite-a natural attraction where visitors can observe these glowing insects in a preserved habitat.The site quickly drew waves of tourists,who shared their experience online,recouping its initial investment in just two years. 展开更多
关键词 diversified development strategies natural attraction shared prosperity tourism firefly campsite
原文传递
The Green Ride:Bike-Sharing Platforms and Urban Carbon Reduction
15
作者 Dai Yunhao Wang Xiaoyun Tong Xinchu 《China Economist》 2026年第1期116-136,共21页
Can the sharing economy contribute to urban sustainability?This study explores this question using the staggered entry of bike-sharing platforms across Chinese cities as a quasi-natural experiment.Drawing on 2015-2017... Can the sharing economy contribute to urban sustainability?This study explores this question using the staggered entry of bike-sharing platforms across Chinese cities as a quasi-natural experiment.Drawing on 2015-2017 city characteristics panel data and monthly CO_(2) emission records,we employ a staggered difference-in-differences(DID)model to assess the impact of bike-sharing on per capita urban CO_(2) emissions.The results show that bike-sharing platforms significantly cut emissions by replacing high-carbon transport and boosting public adoption of shared bikes.This effect is more potent in cities with less stringent environmental enforcement,more advanced digital economies,greater technological innovation,and where two platforms jointly entered.By elucidating the mechanisms underlying bike-sharing’s carbon-reduction potential,this study highlights its role in urban sustainability.It offers policy insights for leveraging shared mobility to reduce city carbon emissions. 展开更多
关键词 sharing economy bike-sharing green transition CO_(2)emissions
在线阅读 下载PDF
The Diplomatic Power of Proverbs--Xi Jinping’s African discourse harmonises Chinese and African wisdom and boosts the construction of a China-Africa community with a shared future
16
作者 ETIENNE BANKUWIHA 《ChinAfrica》 2026年第1期23-25,共3页
As a Burundian doctoral student at Nanjing University,my personal journey is closely intertwined with China’s development in the new era and the deepening China-Africa partnership.Recently,my experiences have given m... As a Burundian doctoral student at Nanjing University,my personal journey is closely intertwined with China’s development in the new era and the deepening China-Africa partnership.Recently,my experiences have given me a deeper appreciation of the importance of people-to-people exchanges between China and Africa. 展开更多
关键词 shared future china africa community diplomatic power african wisdom african discourse chinese wisdom proverbs xi jinping
原文传递
Sum V2V Secrecy Rate Maximization for RIS-Assisted Vehicular Communication Systems with Spectrum Sharing
17
作者 LI Zhiwei LI Demin CHEN Xuemin 《Journal of Donghua University(English Edition)》 2026年第1期68-79,共12页
Vehicular communication systems rely on secure vehicle-to-vehicle(V2V)communications for safety-critical information exchange.However,the presence of eavesdropping vehicles poses a significant challenge.This paper inv... Vehicular communication systems rely on secure vehicle-to-vehicle(V2V)communications for safety-critical information exchange.However,the presence of eavesdropping vehicles poses a significant challenge.This paper investigates the security of V2V communications in reconfigurable intelligent surface(RIS)-assisted vehicular communication systems with spectrum sharing.It proposes a three-stage alternating optimization(TSAO)algorithm to address the complex problem of multiple eavesdropped V2V links that reuse the spectrum already occupied by vehicle-toinfrastructure(V2I)links.To solve the mixed-integer and non-convex optimization problem due to coupled variables and complex constraints,the algorithm decomposes the original problem into three easily solvable sub-problems:RIS reflection coefficient optimization,vehicle transmission power optimization,and spectrum sharing optimization.First,the RIS reflection coefficients are optimized by using the penalty convex-concave procedure(CCP)method.Second,the optimal power points are determined in the power optimization sub-problem.Finally,the spectrum sharing optimization sub-problem is constructed as a weighted bipartite graph matching problem and solved by using the optimal matching algorithm.The TSAO algorithm not only maximizes the sum V2V secrecy rate but also ensures the quality-of-service(QoS)requirements of the V2I links.Simulation results validate the superiority of the proposed algorithm and highlight the improvement in the sum V2V secrecy rate achieved by utilizing RIS technology in vehicular communication systems with spectrum sharing. 展开更多
关键词 vehicle-to-vehicle(V2V)communication eavesdropping vehicle reconfigurable intelligent surface(RIS) secrecy rate spectrum sharing
在线阅读 下载PDF
The Complexity and Randomness of Linear Multi-secret Sharing Schemes with Non-threshold Structures
18
作者 Chun-ming Tang Shu-guang DAI 《Acta Mathematicae Applicatae Sinica》 SCIE CSCD 2014年第4期1073-1084,共12页
In a linear multi-secret sharing scheme with non-threshold structures, several secret values are shared among n participants, and every secret value has a specified access structure. The efficiency of a multi- secret ... In a linear multi-secret sharing scheme with non-threshold structures, several secret values are shared among n participants, and every secret value has a specified access structure. The efficiency of a multi- secret sharing scheme is measured by means of the complexity a and the randomness . Informally, the com- plexity a is the ratio between the maximum of information received by each participant and the minimum of information corresponding to every key. The randomness is the ratio between the amount of information distributed to the set of users U = {1, …, n} and the minimum of information corresponding to every key. In this paper, we discuss a and of any linear multi-secret sharing schemes realized by linear codes with non-threshold structures, and provide two algorithms to make a and to be the minimum, respectively. That is, they are optimal. 展开更多
关键词 secret sharing multi-secret sharing scheme non-threshold multi-access structure linear code COMPLEXITY RANDOMNESS
原文传递
针刺临床试验中假针刺对照报告指南ACURATE与SHARE比较分析 被引量:1
19
作者 刘川杨 李斌艳 +4 位作者 段炎珊 周航 王宇 屠建锋 王丽琼 《中国循证医学杂志》 北大核心 2025年第4期485-490,共6页
为了给研究者未来选用和优化针刺临床试验中假针刺报告指南提供建议,本研究通过定性分析对中韩两国研究人员分别制订的针刺临床试验中假针刺对照报告指南与清单(SHARE)和临床试验与实验针刺对照报告指南(ACURATE)的基本信息及具体内容... 为了给研究者未来选用和优化针刺临床试验中假针刺报告指南提供建议,本研究通过定性分析对中韩两国研究人员分别制订的针刺临床试验中假针刺对照报告指南与清单(SHARE)和临床试验与实验针刺对照报告指南(ACURATE)的基本信息及具体内容进行比较,并结合具体案例阐明两者的异同点。本研究发现与既往针刺临床试验干预措施报告规范(STRICTA)和安慰剂和假干预对照的报告指南和清单(TIDieR-Placebo)相比,ACURATE指南与SHARE指南均强调假针刺对照细节与背景因素的报告,但在内容上各有特点与侧重。条目划分方面,ACURATE通过将主题内容拆分以强调单个条目的重要性;SHARE通过将多个条目合并以强调报告内容的全面性。具体内容方面,ACURATE强调合并治疗、向受试者提供的假针刺信息及真/假针刺在治疗设置等方面的任何差异,对于假针刺对照设置具有借鉴价值;SHARE侧重于对假针刺细节、操作者及方案调整等内容的报告。通过案例发现对两项指南均有条目存在未报告或部分报告的情况,建议未来研究者在进行假针刺对照的报告时可以结合使用两项指南,并对以上两项指南的可操作性与实用性进行验证,为两者的持续优化与更新提供建议。 展开更多
关键词 针刺 报告指南 针刺临床试验 ACURATE指南 SHARE指南
原文传递
Improved Multipartite Quantum Secret Sharing Protocol Using Preshared Greenberger-Horne-Zeilinger States 被引量:3
20
作者 谢灯 叶明勇 李兴华 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第12期1027-1030,共4页
Inspired by the protocol presented by Bagherinezhad and Karimipour[Phys.Rev.A 67(2003) 044302], which will be shown to be insecure,we present a multipartite quantum secret sharing protocol using reusable GreenbergerHo... Inspired by the protocol presented by Bagherinezhad and Karimipour[Phys.Rev.A 67(2003) 044302], which will be shown to be insecure,we present a multipartite quantum secret sharing protocol using reusable GreenbergerHorne -Zeilinger(GHZ) states.This protocol is robust against eavesdropping and could be used for the circumstance of many parties. 展开更多
关键词 secret sharing Greenberger-Horne-Zeilinger state quantum cryptography
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部