Corporate environmental sustainability has become a critical concern,particularly in resource-intensive industries such as pharmaceuticals,where regulatory pressures and stakeholder expectations continue to rise.Despi...Corporate environmental sustainability has become a critical concern,particularly in resource-intensive industries such as pharmaceuticals,where regulatory pressures and stakeholder expectations continue to rise.Despite increasing attention to green leadership,limited research has explored how environmentally responsible leadership(ERL)influences corporate environmental performance(CEP)through employee-driven sustainability behaviors.This study addresses this gap by examining the mediating roles of green knowledge-sharing behavior(GKSB),green innovative behavior(GIB),and voluntary green behavior(VGB),as well as the moderating role of green shared vision(GSV)in the ERL-CEP relationship.The study is grounded in Resource-Based View(RBV),Knowledge-Based View(KBV),Environmental-Based View(EBV),and Triple Bottom Line(TBL)theories,which collectively explain how leadership-driven sustainability efforts create long-term competitive advantages,drive environmental responsibility,and balance economic,social,and environmental sustainability.A quantitative research design was employed,using survey data from 384 employees in Bangladesh’s pharmaceutical sector.Data were analyzed using Partial Least Squares Structural Equation Modeling(PLS-SEM)in Smart-PLS 4.0 to assess direct,indirect,and moderating effects.The results confirm that ERL has a significant positive impact on CEP,with GKSB,GIB,and VGB acting as mediators,while GSV strengthens the ERL-CEP relationship.This study provides novel empirical evidence on the mechanisms linking green leadership to corporate sustainability,extending the application of RBV,KBV,EBV,and TBL to leadership-driven environmental management.The findings emphasize the importance of leadership training programs,sustainability-focused organizational cultures,and shared environmental visions.Policymakers should consider incentives for companies adopting ERL practices,ensuring that sustainability becomes a strategic,rather than compliance-driven,priority.This study contributes to leadership and sustainability literature by offering a comprehensive framework for integrating ERL into corporate governance and environmental strategies.展开更多
At the 2024 Beijing Forum on China-Africa Cooperation(FOCAC)held in September last year,Chinese President Xi Jinping proposed that the overall characterisation of China-Africa relations be elevated to an all-weather C...At the 2024 Beijing Forum on China-Africa Cooperation(FOCAC)held in September last year,Chinese President Xi Jinping proposed that the overall characterisation of China-Africa relations be elevated to an all-weather China-Africa community with a shared future for the new era.“This declaration affirms,whether faced with pandemic or geopolitical shifts,Africa and China will still remain each other’s most trustworthy true partners,”said Inkosi Mzamo Buthelezi,South Africa’s minister of public service and administration.展开更多
Fifty-five-year-old Shi Yizhong never imagined fireflies could become the foundation of a serious business.In 2022,Longshan Village in Huzhou’s Wuxing District collaborated with a young entrepreneurial team to create...Fifty-five-year-old Shi Yizhong never imagined fireflies could become the foundation of a serious business.In 2022,Longshan Village in Huzhou’s Wuxing District collaborated with a young entrepreneurial team to create a firefly campsite-a natural attraction where visitors can observe these glowing insects in a preserved habitat.The site quickly drew waves of tourists,who shared their experience online,recouping its initial investment in just two years.展开更多
Can the sharing economy contribute to urban sustainability?This study explores this question using the staggered entry of bike-sharing platforms across Chinese cities as a quasi-natural experiment.Drawing on 2015-2017...Can the sharing economy contribute to urban sustainability?This study explores this question using the staggered entry of bike-sharing platforms across Chinese cities as a quasi-natural experiment.Drawing on 2015-2017 city characteristics panel data and monthly CO_(2) emission records,we employ a staggered difference-in-differences(DID)model to assess the impact of bike-sharing on per capita urban CO_(2) emissions.The results show that bike-sharing platforms significantly cut emissions by replacing high-carbon transport and boosting public adoption of shared bikes.This effect is more potent in cities with less stringent environmental enforcement,more advanced digital economies,greater technological innovation,and where two platforms jointly entered.By elucidating the mechanisms underlying bike-sharing’s carbon-reduction potential,this study highlights its role in urban sustainability.It offers policy insights for leveraging shared mobility to reduce city carbon emissions.展开更多
As a Burundian doctoral student at Nanjing University,my personal journey is closely intertwined with China’s development in the new era and the deepening China-Africa partnership.Recently,my experiences have given m...As a Burundian doctoral student at Nanjing University,my personal journey is closely intertwined with China’s development in the new era and the deepening China-Africa partnership.Recently,my experiences have given me a deeper appreciation of the importance of people-to-people exchanges between China and Africa.展开更多
BACKGROUND: Genotypes of hepatitis C virus (HCV) are distributed differently across the world. There is a paucity of such data in a multi-ethnic Asian population like Malaysia. The objectives of this study were to ...BACKGROUND: Genotypes of hepatitis C virus (HCV) are distributed differently across the world. There is a paucity of such data in a multi-ethnic Asian population like Malaysia. The objectives of this study were to determine the distribution of HCV genotypes between major ethnic groups and to ascer- tain their association with basic demographic variables like age and gender.展开更多
Inspired by the protocol presented by Bagherinezhad and Karimipour[Phys.Rev.A 67(2003) 044302], which will be shown to be insecure,we present a multipartite quantum secret sharing protocol using reusable GreenbergerHo...Inspired by the protocol presented by Bagherinezhad and Karimipour[Phys.Rev.A 67(2003) 044302], which will be shown to be insecure,we present a multipartite quantum secret sharing protocol using reusable GreenbergerHorne -Zeilinger(GHZ) states.This protocol is robust against eavesdropping and could be used for the circumstance of many parties.展开更多
Human genetic variants have long been known to play an important role in both Mendelian disorders and common diseases. Notably, pathogenic variants are not limited to single-nucleotide variants. It has become apparent...Human genetic variants have long been known to play an important role in both Mendelian disorders and common diseases. Notably, pathogenic variants are not limited to single-nucleotide variants. It has become apparent that human diseases can also be caused by copy number variations (CNVs), especially patient- specific novel CNVs (lafrate et al., 2004; Sebat et al., 2004; Redon et al., 2006; LuDski, 2007; Zhan~ et al.. 2009: Wu et al.. 2015).展开更多
<strong>Background: </strong>Given the increase in the numbers of expatriates in Saudi Arabia and the shortage of information about expatriates’ oral health and periodontal disease severity and progressio...<strong>Background: </strong>Given the increase in the numbers of expatriates in Saudi Arabia and the shortage of information about expatriates’ oral health and periodontal disease severity and progression. <strong>Objectives: </strong>This study aimed to evaluate the effects of the racial differences on oral health and periodontal disease extent, staging, and grading among the multi-ethnic expatriates in the Aseer region, Saudi Arabia. <strong>Materials and Methods:</strong> This cross-sectional study was carried out on 300 expatriates in Aseer region, Saudi Arabia. They were divided into three equal racial different groups (n = 100), Arabs (AR), Asians (AS), and Africans (AF). The interviews of all participants were completed then the clinical examinations of periodontal diseases extent, staging, and grading parameters were performed. Statistical analysis was done by ANOVA test, Tukey’s test, and Chi-square test. The statistical significance level was determined at p < 0.05. <strong>Results: </strong>There were statistically significant differences in the comparison between the three ethnic/racial groups in clinical parameters except in GBI, PCR, FI, TFO, and BC, where there were no statistically significant differences in the comparison between the three ethnic/racial groups. There were differences associated with age, gender, smoking, and diabetes, without statistically significant differences among the three racial groups.<strong> Conclusion:</strong> We concluded that most participants in this study had a generalized severe grade 4 plaque-induced gingivitis and localized periodontitis stage III grade B.展开更多
Sharing of personal health records(PHR)in cloud computing is an essential functionality in the healthcare system.However,how to securely,efficiently and flexibly share PHRs data of the patient in a multi-receiver sett...Sharing of personal health records(PHR)in cloud computing is an essential functionality in the healthcare system.However,how to securely,efficiently and flexibly share PHRs data of the patient in a multi-receiver setting has not been well addressed.For instance,since the trust domain of the cloud server is not identical to the data owner or data user,the semi-trust cloud service provider may intentionally destroy or tamper shared PHRs data of user or only transform partial ciphertext of the shared PHRs or even return wrong computation results to save its storage and computation resource,to pursue maximum economic interest or other malicious purposes.Thus,the PHRs data storing or sharing via the cloud server should be performed with consistency and integrity verification.Fortunately,the emergence of blockchain technology provides new ideas and prospects for ensuring the consistency and integrity of shared PHRs data.To this end,in this work,we leverage the consortiumblockchain technology to enhance the trustworthiness of each participant and propose a blockchain-based patient-centric data sharing scheme for PHRs in cloud computing(BC-PC-Share).Different from the state-of-art schemes,our proposal can achieve the following desired properties:(1)Realizing patient-centric PHRs sharing with a public verification function,i.e.,which can ensure that the returned shared data is consistent with the requested shared data and the integrity of the shared data is not compromised.(2)Supporting scalable and fine-grained access control and sharing of PHRs data with multiple domain users,such as hospitals,medical research institutes,and medical insurance companies.(3)Achieving efficient user decryption by leveraging the transformation key technique and efficient user revocation by introducing time-controlled access.The security analysis and simulation experiment demonstrate that the proposed BC-PC-Share scheme is a feasible and promising solution for PHRs data sharing via consortium blockchain.展开更多
Web of Things(WoT)resources are not only numerous,but also have a wide range of applications and deployments.The centralized WoT resource sharing mechanism lacks flexibility and scalability,and hence cannot satisfy re...Web of Things(WoT)resources are not only numerous,but also have a wide range of applications and deployments.The centralized WoT resource sharing mechanism lacks flexibility and scalability,and hence cannot satisfy requirement of distributed resource sharing in large-scale environment.In response to this problem,a trusted and secure mechanism for WoT resources sharing based on context and blockchain(CWoT-Share)was proposed.Firstly,the mechanism can respond quickly to the changes of the application environment by dynamically determining resource access control rules according to the context.Then,the flexible resource charging strategies,which reduced the fees paid by the users who shared more resources and increased the fees paid by users who frequently used resources maliciously,were used to fulfill efficient sharing of WoT resources.Meanwhile,the charging strategies also achieve load balancing by dynamic selection of WoT resources.Finally,the open source blockchain platform Ethereum was used for the simulation and the simulation results show that CWoT-Share can flexibly adapt to the application environment and dynamically adjust strategies of resource access control and resource charging.展开更多
The accelerated advancement of the Internet of Things(IoT)has generated substantial data,including sensitive and private information.Consequently,it is imperative to guarantee the security of data sharing.While facili...The accelerated advancement of the Internet of Things(IoT)has generated substantial data,including sensitive and private information.Consequently,it is imperative to guarantee the security of data sharing.While facilitating fine-grained access control,Ciphertext Policy Attribute-Based Encryption(CP-ABE)can effectively ensure the confidentiality of shared data.Nevertheless,the conventional centralized CP-ABE scheme is plagued by the issues of keymisuse,key escrow,and large computation,which will result in security risks.This paper suggests a lightweight IoT data security sharing scheme that integrates blockchain technology and CP-ABE to address the abovementioned issues.The integrity and traceability of shared data are guaranteed by the use of blockchain technology to store and verify access transactions.The encryption and decryption operations of the CP-ABE algorithm have been implemented using elliptic curve scalarmultiplication to accommodate lightweight IoT devices,as opposed to themore arithmetic bilinear pairing found in the traditional CP-ABE algorithm.Additionally,a portion of the computation is delegated to the edge nodes to alleviate the computational burden on users.A distributed key management method is proposed to address the issues of key escrow andmisuse.Thismethod employs the edge blockchain to facilitate the storage and distribution of attribute private keys.Meanwhile,data security sharing is enhanced by combining off-chain and on-chain ciphertext storage.The security and performance analysis indicates that the proposed scheme is more efficient and secure.展开更多
It is a scorching summer in Huocheng County, Yining City, northwest China's Xinjiang Uygur Autonomous Region. Sarim Airsha and his wife Zhang Jinhua are preparing lunch in their kitchen close to the green vineyard. T...It is a scorching summer in Huocheng County, Yining City, northwest China's Xinjiang Uygur Autonomous Region. Sarim Airsha and his wife Zhang Jinhua are preparing lunch in their kitchen close to the green vineyard. They share the cook- ing: Sarim slices carrots into small pieces on the chopping board, while Zhang cleans展开更多
With the increasing popularity of blockchain applications, the security of data sources on the blockchain is gradually receiving attention. Providing reliable data for the blockchain safely and efficiently has become ...With the increasing popularity of blockchain applications, the security of data sources on the blockchain is gradually receiving attention. Providing reliable data for the blockchain safely and efficiently has become a research hotspot, and the security of the oracle responsible for providing reliable data has attracted much attention. The most widely used centralized oracles in blockchain, such as Provable and Town Crier, all rely on a single oracle to obtain data, which suffers from a single point of failure and limits the large-scale development of blockchain. To this end, the distributed oracle scheme is put forward, but the existing distributed oracle schemes such as Chainlink and Augur generally have low execution efficiency and high communication overhead, which leads to their poor applicability. To solve the above problems, this paper proposes a trusted distributed oracle scheme based on a share recovery threshold signature. First, a data verification method of distributed oracles is designed based on threshold signature. By aggregating the signatures of oracles, data from different data sources can be mutually verified, leading to a more efficient data verification and aggregation process. Then, a credibility-based cluster head election algorithm is designed, which reduces the communication overhead by clarifying the function distribution and building a hierarchical structure. Considering the good performance of the BLS threshold signature in large-scale applications, this paper combines it with distributed oracle technology and proposes a BLS threshold signature algorithm that supports share recovery in distributed oracles. The share recovery mechanism enables the proposed scheme to solve the key loss issue, and the setting of the threshold value enables the proposed scheme to complete signature aggregation with only a threshold number of oracles, making the scheme more robust. Finally, experimental results indicate that, by using the threshold signature technology and the cluster head election algorithm, our scheme effectively improves the execution efficiency of oracles and solves the problem of a single point of failure, leading to higher scalability and robustness.展开更多
With the rapid development of web3.0 applications,the volume of data sharing is increasing,the inefficiency of big data file sharing and the problem of data privacy leakage are becoming more and more prominent,and the...With the rapid development of web3.0 applications,the volume of data sharing is increasing,the inefficiency of big data file sharing and the problem of data privacy leakage are becoming more and more prominent,and the existing data sharing schemes have been difficult to meet the growing demand for data sharing,this paper aims at exploring a secure,efficient and privacy-protecting data sharing scheme under web3.0 applications.Specifically,this paper adopts interplanetary file system(IPFS)technology to realize the storage of large data files to solve the problem of blockchain storage capacity limitation,and utilizes ciphertext policy attribute-based encryption(CP-ABE)and proxy re-encryption(PRE)technology to realize secure multi-party sharing and finegrained access control of data.This paper provides the detailed algorithm design and implementation of data sharing phases and processes,and analyzes the algorithms from the perspectives of security,privacy protection,and performance.展开更多
The Xinjiang Uygur Autonomous Region (also called Xinjiang for short), situated in the border area of northwest China and the hinterland of the Eurasian Continent, occupies an area of 1.6649 million sq km, accountin...The Xinjiang Uygur Autonomous Region (also called Xinjiang for short), situated in the border area of northwest China and the hinterland of the Eurasian Continent, occupies an area of 1.6649 million sq km, accounting for one sixth of Chinese territory. It has a land border of 5,600 km bounded by eight countries. It was an important section of the ancient Silk Road. According to statistics,展开更多
The year 2025 marks the 80th anniversary of the victory of the Chinese People's War of Resistance Against Japanese Aggression and the World Anti-Fascist War.They were a decisive battle between justice and evil,bet...The year 2025 marks the 80th anniversary of the victory of the Chinese People's War of Resistance Against Japanese Aggression and the World Anti-Fascist War.They were a decisive battle between justice and evil,between light and darkness,and between progress and reaction.展开更多
文摘Corporate environmental sustainability has become a critical concern,particularly in resource-intensive industries such as pharmaceuticals,where regulatory pressures and stakeholder expectations continue to rise.Despite increasing attention to green leadership,limited research has explored how environmentally responsible leadership(ERL)influences corporate environmental performance(CEP)through employee-driven sustainability behaviors.This study addresses this gap by examining the mediating roles of green knowledge-sharing behavior(GKSB),green innovative behavior(GIB),and voluntary green behavior(VGB),as well as the moderating role of green shared vision(GSV)in the ERL-CEP relationship.The study is grounded in Resource-Based View(RBV),Knowledge-Based View(KBV),Environmental-Based View(EBV),and Triple Bottom Line(TBL)theories,which collectively explain how leadership-driven sustainability efforts create long-term competitive advantages,drive environmental responsibility,and balance economic,social,and environmental sustainability.A quantitative research design was employed,using survey data from 384 employees in Bangladesh’s pharmaceutical sector.Data were analyzed using Partial Least Squares Structural Equation Modeling(PLS-SEM)in Smart-PLS 4.0 to assess direct,indirect,and moderating effects.The results confirm that ERL has a significant positive impact on CEP,with GKSB,GIB,and VGB acting as mediators,while GSV strengthens the ERL-CEP relationship.This study provides novel empirical evidence on the mechanisms linking green leadership to corporate sustainability,extending the application of RBV,KBV,EBV,and TBL to leadership-driven environmental management.The findings emphasize the importance of leadership training programs,sustainability-focused organizational cultures,and shared environmental visions.Policymakers should consider incentives for companies adopting ERL practices,ensuring that sustainability becomes a strategic,rather than compliance-driven,priority.This study contributes to leadership and sustainability literature by offering a comprehensive framework for integrating ERL into corporate governance and environmental strategies.
文摘At the 2024 Beijing Forum on China-Africa Cooperation(FOCAC)held in September last year,Chinese President Xi Jinping proposed that the overall characterisation of China-Africa relations be elevated to an all-weather China-Africa community with a shared future for the new era.“This declaration affirms,whether faced with pandemic or geopolitical shifts,Africa and China will still remain each other’s most trustworthy true partners,”said Inkosi Mzamo Buthelezi,South Africa’s minister of public service and administration.
文摘Fifty-five-year-old Shi Yizhong never imagined fireflies could become the foundation of a serious business.In 2022,Longshan Village in Huzhou’s Wuxing District collaborated with a young entrepreneurial team to create a firefly campsite-a natural attraction where visitors can observe these glowing insects in a preserved habitat.The site quickly drew waves of tourists,who shared their experience online,recouping its initial investment in just two years.
基金supported by the National Natural Science Foundation of China(NSFC)(Grant No.72372048)the“Young Top-Notch Talent”Cultivation Program of Hubei Province.
文摘Can the sharing economy contribute to urban sustainability?This study explores this question using the staggered entry of bike-sharing platforms across Chinese cities as a quasi-natural experiment.Drawing on 2015-2017 city characteristics panel data and monthly CO_(2) emission records,we employ a staggered difference-in-differences(DID)model to assess the impact of bike-sharing on per capita urban CO_(2) emissions.The results show that bike-sharing platforms significantly cut emissions by replacing high-carbon transport and boosting public adoption of shared bikes.This effect is more potent in cities with less stringent environmental enforcement,more advanced digital economies,greater technological innovation,and where two platforms jointly entered.By elucidating the mechanisms underlying bike-sharing’s carbon-reduction potential,this study highlights its role in urban sustainability.It offers policy insights for leveraging shared mobility to reduce city carbon emissions.
文摘As a Burundian doctoral student at Nanjing University,my personal journey is closely intertwined with China’s development in the new era and the deepening China-Africa partnership.Recently,my experiences have given me a deeper appreciation of the importance of people-to-people exchanges between China and Africa.
基金supported by University of Malaya High Impact Research grant(UM.C/625/1/HIR/MOHE/MED/31)
文摘BACKGROUND: Genotypes of hepatitis C virus (HCV) are distributed differently across the world. There is a paucity of such data in a multi-ethnic Asian population like Malaysia. The objectives of this study were to determine the distribution of HCV genotypes between major ethnic groups and to ascer- tain their association with basic demographic variables like age and gender.
基金Supported by National Natural Science Foundation of China under Grant Nos.60878059,11004033Natural Science Foundation of Fujian Province under Grant No.2010J01002
文摘Inspired by the protocol presented by Bagherinezhad and Karimipour[Phys.Rev.A 67(2003) 044302], which will be shown to be insecure,we present a multipartite quantum secret sharing protocol using reusable GreenbergerHorne -Zeilinger(GHZ) states.This protocol is robust against eavesdropping and could be used for the circumstance of many parties.
基金supported by the National Basic Research Program of China(No.2012CB944600)the National Key Research and Development Program of China(No.2016YFC0905100)+1 种基金the National Natural Science Foundation of China(Nos.31521003,31625015,31571297,31601046,31525014 and 91331204)the Science and Technology Commission of Shanghai Municipality(No.16YF1413900)
文摘Human genetic variants have long been known to play an important role in both Mendelian disorders and common diseases. Notably, pathogenic variants are not limited to single-nucleotide variants. It has become apparent that human diseases can also be caused by copy number variations (CNVs), especially patient- specific novel CNVs (lafrate et al., 2004; Sebat et al., 2004; Redon et al., 2006; LuDski, 2007; Zhan~ et al.. 2009: Wu et al.. 2015).
文摘<strong>Background: </strong>Given the increase in the numbers of expatriates in Saudi Arabia and the shortage of information about expatriates’ oral health and periodontal disease severity and progression. <strong>Objectives: </strong>This study aimed to evaluate the effects of the racial differences on oral health and periodontal disease extent, staging, and grading among the multi-ethnic expatriates in the Aseer region, Saudi Arabia. <strong>Materials and Methods:</strong> This cross-sectional study was carried out on 300 expatriates in Aseer region, Saudi Arabia. They were divided into three equal racial different groups (n = 100), Arabs (AR), Asians (AS), and Africans (AF). The interviews of all participants were completed then the clinical examinations of periodontal diseases extent, staging, and grading parameters were performed. Statistical analysis was done by ANOVA test, Tukey’s test, and Chi-square test. The statistical significance level was determined at p < 0.05. <strong>Results: </strong>There were statistically significant differences in the comparison between the three ethnic/racial groups in clinical parameters except in GBI, PCR, FI, TFO, and BC, where there were no statistically significant differences in the comparison between the three ethnic/racial groups. There were differences associated with age, gender, smoking, and diabetes, without statistically significant differences among the three racial groups.<strong> Conclusion:</strong> We concluded that most participants in this study had a generalized severe grade 4 plaque-induced gingivitis and localized periodontitis stage III grade B.
基金supported by the Youth Doctoral Foundation of Gansu Education Committee under Grant No.2022QB-176.
文摘Sharing of personal health records(PHR)in cloud computing is an essential functionality in the healthcare system.However,how to securely,efficiently and flexibly share PHRs data of the patient in a multi-receiver setting has not been well addressed.For instance,since the trust domain of the cloud server is not identical to the data owner or data user,the semi-trust cloud service provider may intentionally destroy or tamper shared PHRs data of user or only transform partial ciphertext of the shared PHRs or even return wrong computation results to save its storage and computation resource,to pursue maximum economic interest or other malicious purposes.Thus,the PHRs data storing or sharing via the cloud server should be performed with consistency and integrity verification.Fortunately,the emergence of blockchain technology provides new ideas and prospects for ensuring the consistency and integrity of shared PHRs data.To this end,in this work,we leverage the consortiumblockchain technology to enhance the trustworthiness of each participant and propose a blockchain-based patient-centric data sharing scheme for PHRs in cloud computing(BC-PC-Share).Different from the state-of-art schemes,our proposal can achieve the following desired properties:(1)Realizing patient-centric PHRs sharing with a public verification function,i.e.,which can ensure that the returned shared data is consistent with the requested shared data and the integrity of the shared data is not compromised.(2)Supporting scalable and fine-grained access control and sharing of PHRs data with multiple domain users,such as hospitals,medical research institutes,and medical insurance companies.(3)Achieving efficient user decryption by leveraging the transformation key technique and efficient user revocation by introducing time-controlled access.The security analysis and simulation experiment demonstrate that the proposed BC-PC-Share scheme is a feasible and promising solution for PHRs data sharing via consortium blockchain.
基金This study is funded by“The National Natural Science Foundation of China(No.61972211,No.61771258)”.
文摘Web of Things(WoT)resources are not only numerous,but also have a wide range of applications and deployments.The centralized WoT resource sharing mechanism lacks flexibility and scalability,and hence cannot satisfy requirement of distributed resource sharing in large-scale environment.In response to this problem,a trusted and secure mechanism for WoT resources sharing based on context and blockchain(CWoT-Share)was proposed.Firstly,the mechanism can respond quickly to the changes of the application environment by dynamically determining resource access control rules according to the context.Then,the flexible resource charging strategies,which reduced the fees paid by the users who shared more resources and increased the fees paid by users who frequently used resources maliciously,were used to fulfill efficient sharing of WoT resources.Meanwhile,the charging strategies also achieve load balancing by dynamic selection of WoT resources.Finally,the open source blockchain platform Ethereum was used for the simulation and the simulation results show that CWoT-Share can flexibly adapt to the application environment and dynamically adjust strategies of resource access control and resource charging.
文摘The accelerated advancement of the Internet of Things(IoT)has generated substantial data,including sensitive and private information.Consequently,it is imperative to guarantee the security of data sharing.While facilitating fine-grained access control,Ciphertext Policy Attribute-Based Encryption(CP-ABE)can effectively ensure the confidentiality of shared data.Nevertheless,the conventional centralized CP-ABE scheme is plagued by the issues of keymisuse,key escrow,and large computation,which will result in security risks.This paper suggests a lightweight IoT data security sharing scheme that integrates blockchain technology and CP-ABE to address the abovementioned issues.The integrity and traceability of shared data are guaranteed by the use of blockchain technology to store and verify access transactions.The encryption and decryption operations of the CP-ABE algorithm have been implemented using elliptic curve scalarmultiplication to accommodate lightweight IoT devices,as opposed to themore arithmetic bilinear pairing found in the traditional CP-ABE algorithm.Additionally,a portion of the computation is delegated to the edge nodes to alleviate the computational burden on users.A distributed key management method is proposed to address the issues of key escrow andmisuse.Thismethod employs the edge blockchain to facilitate the storage and distribution of attribute private keys.Meanwhile,data security sharing is enhanced by combining off-chain and on-chain ciphertext storage.The security and performance analysis indicates that the proposed scheme is more efficient and secure.
文摘It is a scorching summer in Huocheng County, Yining City, northwest China's Xinjiang Uygur Autonomous Region. Sarim Airsha and his wife Zhang Jinhua are preparing lunch in their kitchen close to the green vineyard. They share the cook- ing: Sarim slices carrots into small pieces on the chopping board, while Zhang cleans
基金supported by the National Natural Science Foundation of China(Grant No.62102449)the Central Plains Talent Program under Grant No.224200510003.
文摘With the increasing popularity of blockchain applications, the security of data sources on the blockchain is gradually receiving attention. Providing reliable data for the blockchain safely and efficiently has become a research hotspot, and the security of the oracle responsible for providing reliable data has attracted much attention. The most widely used centralized oracles in blockchain, such as Provable and Town Crier, all rely on a single oracle to obtain data, which suffers from a single point of failure and limits the large-scale development of blockchain. To this end, the distributed oracle scheme is put forward, but the existing distributed oracle schemes such as Chainlink and Augur generally have low execution efficiency and high communication overhead, which leads to their poor applicability. To solve the above problems, this paper proposes a trusted distributed oracle scheme based on a share recovery threshold signature. First, a data verification method of distributed oracles is designed based on threshold signature. By aggregating the signatures of oracles, data from different data sources can be mutually verified, leading to a more efficient data verification and aggregation process. Then, a credibility-based cluster head election algorithm is designed, which reduces the communication overhead by clarifying the function distribution and building a hierarchical structure. Considering the good performance of the BLS threshold signature in large-scale applications, this paper combines it with distributed oracle technology and proposes a BLS threshold signature algorithm that supports share recovery in distributed oracles. The share recovery mechanism enables the proposed scheme to solve the key loss issue, and the setting of the threshold value enables the proposed scheme to complete signature aggregation with only a threshold number of oracles, making the scheme more robust. Finally, experimental results indicate that, by using the threshold signature technology and the cluster head election algorithm, our scheme effectively improves the execution efficiency of oracles and solves the problem of a single point of failure, leading to higher scalability and robustness.
基金supported by the National Natural Science Foundation of China(Grant No.U24B20146)the National Key Research and Development Plan in China(Grant No.2020YFB1005500)Beijing Natural Science Foundation Project(No.M21034).
文摘With the rapid development of web3.0 applications,the volume of data sharing is increasing,the inefficiency of big data file sharing and the problem of data privacy leakage are becoming more and more prominent,and the existing data sharing schemes have been difficult to meet the growing demand for data sharing,this paper aims at exploring a secure,efficient and privacy-protecting data sharing scheme under web3.0 applications.Specifically,this paper adopts interplanetary file system(IPFS)technology to realize the storage of large data files to solve the problem of blockchain storage capacity limitation,and utilizes ciphertext policy attribute-based encryption(CP-ABE)and proxy re-encryption(PRE)technology to realize secure multi-party sharing and finegrained access control of data.This paper provides the detailed algorithm design and implementation of data sharing phases and processes,and analyzes the algorithms from the perspectives of security,privacy protection,and performance.
文摘The Xinjiang Uygur Autonomous Region (also called Xinjiang for short), situated in the border area of northwest China and the hinterland of the Eurasian Continent, occupies an area of 1.6649 million sq km, accounting for one sixth of Chinese territory. It has a land border of 5,600 km bounded by eight countries. It was an important section of the ancient Silk Road. According to statistics,
文摘The year 2025 marks the 80th anniversary of the victory of the Chinese People's War of Resistance Against Japanese Aggression and the World Anti-Fascist War.They were a decisive battle between justice and evil,between light and darkness,and between progress and reaction.