期刊文献+
共找到58,521篇文章
< 1 2 250 >
每页显示 20 50 100
Blockchain-Enabled Data Secure Sharing with Privacy Protection Based on Proxy Re-Encryption in Web3.0 Applications 被引量:1
1
作者 Ma Jiawei Zhou Haojie +2 位作者 Wang Sidie Song Jiyuan Tian Tian 《China Communications》 2025年第5期256-272,共17页
With the rapid development of web3.0 applications,the volume of data sharing is increasing,the inefficiency of big data file sharing and the problem of data privacy leakage are becoming more and more prominent,and the... With the rapid development of web3.0 applications,the volume of data sharing is increasing,the inefficiency of big data file sharing and the problem of data privacy leakage are becoming more and more prominent,and the existing data sharing schemes have been difficult to meet the growing demand for data sharing,this paper aims at exploring a secure,efficient and privacy-protecting data sharing scheme under web3.0 applications.Specifically,this paper adopts interplanetary file system(IPFS)technology to realize the storage of large data files to solve the problem of blockchain storage capacity limitation,and utilizes ciphertext policy attribute-based encryption(CP-ABE)and proxy re-encryption(PRE)technology to realize secure multi-party sharing and finegrained access control of data.This paper provides the detailed algorithm design and implementation of data sharing phases and processes,and analyzes the algorithms from the perspectives of security,privacy protection,and performance. 展开更多
关键词 blockchain data sharing privacy protection proxy re-encryption WEB3.0
在线阅读 下载PDF
Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud
2
作者 Xixi Yan Jing Zhang Pengyu Cheng 《Computers, Materials & Continua》 2025年第4期1399-1414,共16页
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu... Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribute-based conditional proxy re-encryption(AB-CPRE)schemes proposed so far do not take into account the importance of user attributes.A weighted attribute-based conditional proxy re-encryption(WAB-CPRE)scheme is thus designed to provide more precise decryption rights delegation.By introducing the concept of weight attributes,the quantity of system attributes managed by the server is reduced greatly.At the same time,a weighted tree structure is constructed to simplify the expression of access structure effectively.With conditional proxy re-encryption,large amounts of data and complex computations are outsourced to cloud servers,so the data owner(DO)can revoke the user’s decryption rights directly with minimal costs.The scheme proposed achieves security against chosen plaintext attacks(CPA).Experimental simulation results demonstrated that the decryption time is within 6–9 ms,and it has a significant reduction in communication and computation cost on the user side with better functionality compared to other related schemes,which enables users to access cloud data on devices with limited resources. 展开更多
关键词 Cloud service conditional proxy re-encryption user revocation weighted attribute
在线阅读 下载PDF
Efficient and Provably-Secure Certificateless Proxy Re-encryption Scheme for Secure Cloud Data Sharing 被引量:2
3
作者 王亮亮 陈克非 +1 位作者 毛贤平 王永涛 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期398-405,共8页
In current cloud computing system, large amounts of sensitive data are shared to other cloud users. To keep these data confidentiality, data owners should encrypt their data before outsourcing. We choose proxy reencry... In current cloud computing system, large amounts of sensitive data are shared to other cloud users. To keep these data confidentiality, data owners should encrypt their data before outsourcing. We choose proxy reencryption (PRE) as the cloud data encryption technique. In a PRE system, a semi-trusted proxy can transform a ciphertext under one public key into a ciphertext of the same message under another public key, but the proxy cannot gain any information about the message. In this paper, we propose a certificateless PRE (CL-PRE) scheme without pairings. The security of the proposed scheme can be proved to be equivalent to the computational Dire- Hellman (CDH) problem in the random oracle model. Compared with other existing CL-PRE schemes, our scheme requires less computation cost and is significantly more efficient. The new scheme does not need the public key certificates to guarantee validity of public keys and solves the key escrow problem in identity-based public key cryptography. 展开更多
关键词 cloud computing secure data sharing proxy re-encryption(pre) certificateless encryption key escrow computational Diffie-Hellman(CDH) problem random oracle
原文传递
NC-MACPABE: Non-centered multi-authority proxy re-encryption based on CP-ABE for cloud storage systems 被引量:10
4
作者 XU Xiao-long ZHANG Qi-tong ZHOU Jing-lan 《Journal of Central South University》 SCIE EI CAS CSCD 2017年第4期807-818,共12页
The cloud storage service cannot be completely trusted because of the separation of data management and ownership, leading to the difficulty of data privacy protection. In order to protect the privacy of data on untru... The cloud storage service cannot be completely trusted because of the separation of data management and ownership, leading to the difficulty of data privacy protection. In order to protect the privacy of data on untrusted servers of cloud storage, a novel multi-authority access control scheme without a trustworthy central authority has been proposed based on CP-ABE for cloud storage systems, called non-centered multi-authority proxy re-encryption based on the cipher-text policy attribute-based encryption(NC-MACPABE). NC-MACPABE optimizes the weighted access structure(WAS) allowing different levels of operation on the same file in cloud storage system. The concept of identity dyeing is introduced to improve the users' information privacy further. The re-encryption algorithm is improved in the scheme so that the data owner can revoke user's access right in a more flexible way. The scheme is proved to be secure. And the experimental results also show that removing the central authority can resolve the existing performance bottleneck in the multi-authority architecture with a central authority, which significantly improves user experience when a large number of users apply for accesses to the cloud storage system at the same time. 展开更多
关键词 cloud storage data PRIVACY PROXY re-encryption multi-authority
在线阅读 下载PDF
Attribute-Based Re-Encryption Scheme in the Standard Model 被引量:4
5
作者 GUO Shanqing ZENG Yingpei +1 位作者 WEI Juan XU Qiuliang 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期621-625,共5页
In this paper, we propose a new attribute-based proxy re-encryption scheme, where a semi-trusted proxy, with some additional information, can transform a ciphertext under a set of attributes into a new ciphertext unde... In this paper, we propose a new attribute-based proxy re-encryption scheme, where a semi-trusted proxy, with some additional information, can transform a ciphertext under a set of attributes into a new ciphertext under another set of attributes on the same message, but not vice versa, furthermore, its security was proved in the standard model based on decisional bilinear Diffie-Hellman assumption. This scheme can be used to realize fine-grained selectively sharing of encrypted data, but the general proxy rencryption scheme severely can not do it, so the proposed schemecan be thought as an improvement of general traditional proxy re-encryption scheme. 展开更多
关键词 ATTRIBUTE-BASED re-encryption scheme standard model network storage
在线阅读 下载PDF
Key-Private Identity-Based Proxy Re-Encryption 被引量:1
6
作者 Chunpeng Ge Jinyue Xia Liming Fang 《Computers, Materials & Continua》 SCIE EI 2020年第5期633-647,共15页
An identity-based proxy re-encryption scheme(IB-PRE)allows a semi-trusted proxy to convert an encryption under one identity to another without revealing the underlying message.Due to the fact that the proxy was semi-t... An identity-based proxy re-encryption scheme(IB-PRE)allows a semi-trusted proxy to convert an encryption under one identity to another without revealing the underlying message.Due to the fact that the proxy was semi-trusted,it should place as little trust as necessary to allow it to perform the translations.In some applications such as distributed file system,it demands the adversary cannot identify the sender and recipient’s identities.However,none of the exiting IB-PRE schemes satisfy this requirement.In this work,we first define the security model of key-private IB-PRE.Finally,we propose the first key-private IB-PRE scheme.Our scheme is chosen plaintext secure(CPA)and collusion resistant in the standard model. 展开更多
关键词 Proxy re-encryption identity-based proxy re-encryption key-private collusion resistant
在线阅读 下载PDF
A Multi-Conditional Proxy Broadcast Re-Encryption Scheme for Sensor Networks 被引量:1
7
作者 Pang Li Lifeng Zhu +1 位作者 Brij B.Gupta Sunil Kumar Jha 《Computers, Materials & Continua》 SCIE EI 2020年第12期2079-2090,共12页
In sensor networks,it is a challenge to ensure the security of data exchange between packet switching nodes holding different private keys.In order to solve this problem,the present study proposes a scheme called mult... In sensor networks,it is a challenge to ensure the security of data exchange between packet switching nodes holding different private keys.In order to solve this problem,the present study proposes a scheme called multi-conditional proxy broadcast re-encryption(MC-PBRE).The scheme consists of the following roles:the source node,proxy server,and the target node.If the condition is met,the proxy can convert the encrypted data of the source node into data that the target node can directly decrypt.It allows the proxy server to convert the ciphertext of the source node to a new ciphertext of the target node in a different group,while the proxy server does not need to store the key or reveal the plaintext.At the same time,the proxy server cannot obtain any valuable information in the ciphertext.This paper formalizes the concept of MC-PBRE and its security model,and proposes a MC-PBRE scheme of ciphertext security.Finally,the scheme security has been proved in the random oracle. 展开更多
关键词 Proxy re-encryption sensor network security broadcast re-encryption
在线阅读 下载PDF
Multi-authority proxy re-encryption based on CPABE for cloud storage systems 被引量:7
8
作者 Xiaolong Xu Jinglan Zhou +1 位作者 Xinheng Wang Yun Zhang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第1期211-223,共13页
The dissociation between data management and data ownership makes it difficult to protect data security and privacy in cloud storage systems.Traditional encryption technologies are not suitable for data protection in ... The dissociation between data management and data ownership makes it difficult to protect data security and privacy in cloud storage systems.Traditional encryption technologies are not suitable for data protection in cloud storage systems.A novel multi-authority proxy re-encryption mechanism based on ciphertext-policy attribute-based encryption(MPRE-CPABE) is proposed for cloud storage systems.MPRE-CPABE requires data owner to split each file into two blocks,one big block and one small block.The small block is used to encrypt the big one as the private key,and then the encrypted big block will be uploaded to the cloud storage system.Even if the uploaded big block of file is stolen,illegal users cannot get the complete information of the file easily.Ciphertext-policy attribute-based encryption(CPABE)is always criticized for its heavy overload and insecure issues when distributing keys or revoking user's access right.MPRE-CPABE applies CPABE to the multi-authority cloud storage system,and solves the above issues.The weighted access structure(WAS) is proposed to support a variety of fine-grained threshold access control policy in multi-authority environments,and reduce the computational cost of key distribution.Meanwhile,MPRE-CPABE uses proxy re-encryption to reduce the computational cost of access revocation.Experiments are implemented on platforms of Ubuntu and CloudSim.Experimental results show that MPRE-CPABE can greatly reduce the computational cost of the generation of key components and the revocation of user's access right.MPRE-CPABE is also proved secure under the security model of decisional bilinear Diffie-Hellman(DBDH). 展开更多
关键词 cloud storage data partition multi-authority security proxy re-encryption attribute-based encryption(ABE).
在线阅读 下载PDF
The Development of Proxy Re-Encryption 被引量:2
9
作者 Yepeng Liu Yongjun Ren +1 位作者 Qirun Wang Jinyue Xia 《Journal of Cyber Security》 2020年第1期1-8,共8页
With the diversification of electronic devices,cloud-based services have become the link between different devices.As a cryptosystem with secure conversion function,proxy re-encryption enables secure sharing of data i... With the diversification of electronic devices,cloud-based services have become the link between different devices.As a cryptosystem with secure conversion function,proxy re-encryption enables secure sharing of data in a cloud environment.Proxy re-encryption is a public key encryption system with ciphertext security conversion function.A semi-trusted agent plays the role of ciphertext conversion,which can convert the user ciphertext into the same plaintext encrypted by the principal’s public key.Proxy re-encryption has been a hotspot in the field of information security since it was proposed by Blaze et al.[Blaze,Bleumer and Strauss(1998)].After 20 years of development,proxy re-encryption has evolved into many forms been widely used.This paper elaborates on the definition,characteristics and development status of proxy re-encryption,and classifies proxy re-encryption from the perspectives of user identity,conversion condition,conversion hop count and conversion direction.The aspects of the existing program were compared and briefly reviewed from the aspects of features,performance,and security.Finally,this paper looks forward to the possible development direction of proxy re-encryption in the future. 展开更多
关键词 Proxy re-encryption bilinear pairing information security
在线阅读 下载PDF
Proxy Re-Encryption Based Multi-Factor Access Control for Ciphertext in Cloud
10
作者 SUMang WANG Liangchen +1 位作者 FUAnmin YU Yan 《Journal of Shanghai Jiaotong university(Science)》 EI 2018年第5期666-670,共5页
Cloud computing provides a wide platform for information sharing. Users can access data and retrieve service easily and quickly. Generally, the data in cloud are transferred with encrypted form to protect the informat... Cloud computing provides a wide platform for information sharing. Users can access data and retrieve service easily and quickly. Generally, the data in cloud are transferred with encrypted form to protect the information. As an important technology of cloud security, access control should take account of multi-factor and ciphertext to satisfy the complex requirement for cloud data protection. We propose a proxy re-encryption (PRE) based multi-factor access control (PMAC) for cipher text in the above background. The PMAC adapts to the privacy and the protection of data confidently. We explain the motivation and some assumptions of PMAC at first. Then we define system model and algorithm. The system model and algorithm show how to create the data with corresponding accessing Policy and how to grant and revoke the nermission. 展开更多
关键词 proxy re-encryption pre access control multi-factor cipher text cloud computing
原文传递
A Data Transmission Approach Based on Ant Colony Optimization and Threshold Proxy Re-encryption in WSNs 被引量:2
11
作者 Jing Liu Zenghui Liu +1 位作者 Chenyu Sun Junxi Zhuang 《Journal of Artificial Intelligence and Technology》 2022年第1期23-31,共9页
Wireless sensor networks(WSNs)have become increasingly popular due to the rapid growth of the Internet of Things.As open wireless transmission media are easy to attack,security is one of the primary design concerns fo... Wireless sensor networks(WSNs)have become increasingly popular due to the rapid growth of the Internet of Things.As open wireless transmission media are easy to attack,security is one of the primary design concerns for WSNs.Current solutions consider routing and data encryption as two isolated issues,providing incomplete security.Therefore,in this paper,we divide the WSN communication process into a data path selection phase and a data encryption phase.We propose an improved transmission method based on ant colony optimization(ACO)and threshold proxy re-encryption for WSNs,and we named it as ACOTPRE.The method resists internal and external attacks and ensures safe and efficient data transmission.In the data path selection stage,the ACO algorithm is used for network routing.The improvement of the pheromone concentration is proposed.In order to resist attacks from external attackers,proxy re-encryption is extended to WSN in the data encryption stage.The threshold secret sharing algorithm is introduced to generate a set of re-encryption key fragments composed of random numbers at the source node.We confirm the performance of our model via simulation studies. 展开更多
关键词 wireless sensors network ant colony optimization PHEROMONE proxy re-encryption THRESHOLD
在线阅读 下载PDF
A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing
12
作者 Yongli Tang Huanhuan Lian +1 位作者 Zemao Zhao Xixi Yan 《Computers, Materials & Continua》 SCIE EI 2018年第8期339-352,共14页
With the widespread use of cloud computing technology,more and more users and enterprises decide to store their data in a cloud server by outsourcing.However,these huge amounts of data may contain personal privacy,bus... With the widespread use of cloud computing technology,more and more users and enterprises decide to store their data in a cloud server by outsourcing.However,these huge amounts of data may contain personal privacy,business secrets and other sensitive information of the users and enterprises.Thus,at present,how to protect,retrieve,and legally use the sensitive information while preventing illegal accesses are security challenges of data storage in the cloud environment.A new proxy re-encryption with keyword search scheme is proposed in this paper in order to solve the problem of the low retrieval efficiency of the encrypted data in the cloud server.In this scheme,the user data are divided into files,file indexes and the keyword corresponding to the files,which are respectively encrypted to store.The improved scheme does not need to re-encrypt partial file cipher-text as in traditional schemes,but re-encrypt the cipher-text of keywords corresponding to the files.Therefore the scheme can improve the computational efficiency as well as resist chosen keyword attack.And the scheme is proven to be indistinguishable under Hash Diffie-Hellman assumption.Furthermore,the scheme does not need to use any secure channels,making it more effective in the cloud environment. 展开更多
关键词 Cloud computing keyword search proxy re-encryption provable security
在线阅读 下载PDF
A Blockchain-Based Proxy Re-Encryption Scheme with Conditional Privacy Protection and Auditability
13
作者 Chen Guo PengWeijun +3 位作者 Wu Jing Fang Youxuan Ye Keke Xin Yanshuang 《China Communications》 SCIE CSCD 2024年第7期267-277,共11页
With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house leasing.In the traditional housing leasing scenario,problems of door lock information disclosur... With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house leasing.In the traditional housing leasing scenario,problems of door lock information disclosure,tenant privacy disclosure and rental contract disputes frequently occur,and the security,fairness and auditability of the housing leasing transaction cannot be guaranteed.To solve the above problems,a blockchain-based proxy re-encryption scheme with conditional privacy protection and auditability is proposed.The scheme implements fine-grained access control of door lock data based on attribute encryption technology with policy hiding,and uses proxy re-encryption technology to achieve auditable supervision of door lock information transactions.Homomorphic encryption technology and zero-knowledge proof technology are introduced to ensure the confidentiality of housing rent information and the fairness of rent payment.To construct a decentralized housing lease transaction architecture,the scheme realizes the efficient collaboration between the door lock data ciphertext stored under the chain and the key information ciphertext on the chain based on the blockchain and InterPlanetary File System.Finally,the security proof and computing performance analysis of the proposed scheme are carried out.The results show that the scheme can resist the chosen plaintext attack and has low computational cost. 展开更多
关键词 attribute encryption blockchain homomorphic encryption house leasing proxy re-encryption zero-knowledge proof
在线阅读 下载PDF
Quantum-Resistant Multi-Feature Attribute-Based Proxy Re-Encryption Scheme for Cloud Services
14
作者 Jinqiu Hou Changgen Peng +1 位作者 Weijie Tan Hongfa Ding 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期917-938,共22页
Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been ... Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure. 展开更多
关键词 LATTICE learning with errors attribute-based proxy re-encryption linear secret sharing schemes
在线阅读 下载PDF
New Identity Based Proxy Re-Encryption Scheme from Lattices 被引量:2
15
作者 Liqiang Wu Xiaoyuan Yang +1 位作者 Minqing Zhang Longfei Liu 《China Communications》 SCIE CSCD 2019年第10期174-190,共17页
Identity-Based Proxy Re-Encryption (IB-PRE) allows a semi-trusted proxy to convert the ciphertext encrypted under Alice’s identity into Bob’s ciphertext of the same message without leaking plaintext. Lattice-based c... Identity-Based Proxy Re-Encryption (IB-PRE) allows a semi-trusted proxy to convert the ciphertext encrypted under Alice’s identity into Bob’s ciphertext of the same message without leaking plaintext. Lattice-based cryptography enjoys potential resistance to quantum analysis and low computational complexity. A multi-hop and unidirectional IB-PRE from lattices is presented. We split the functions of decryption and ciphertext transformation separately, and design the double private keys mechanism, where two keys are generated for each user, one key is used to decrypt the ciphertext by Pre-Image Sampling technique, and the other is used to generate the re-encryption key by Bonsai Trees technique. The generation of the re-encryption key is non-interactive and collusion resistant. Moreover, its IND-sID-CPA security over the decisional Learning With Errors (LWE) assumption under the standard model is proved. Compared with some previous IBPRE schemes from Bilinear Pairings, the format of transformed ciphertext in our scheme remains unchanged, furthermore, it can also resist quantum analysis. Compared with some existing IB-PRE schemes from lattices with similar properties, the space of the message in our scheme is a vector of length l and the encryption process remains a lower encryption blowup factor. At last, a proof-of-concept implementation is provided. 展开更多
关键词 IB-pre LATTICES BONSAI trees COLLUSION RESISTANCE
在线阅读 下载PDF
大连市MSM对HIV PrEP用药知晓和使用意愿相关因素分析 被引量:1
16
作者 张敏 孙明玉 +9 位作者 曹雪 赵志杰 熊帮洁 张群 王雅琪 洪晟杰 马兆煜 张宇 崔佳 李程 《中国艾滋病性病》 北大核心 2025年第9期997-1002,共6页
目的分析大连市MSM对HIV PrEP用药的知晓、使用意愿及相关因素,为制定该人群HIV PrEP服务策略提供科学依据。方法采用“滚雪球”的方法,通过MSM社会组织和疾控中心自愿咨询检测门诊招募MSM,进行面对面问卷调查,收集其一般人口学特征、... 目的分析大连市MSM对HIV PrEP用药的知晓、使用意愿及相关因素,为制定该人群HIV PrEP服务策略提供科学依据。方法采用“滚雪球”的方法,通过MSM社会组织和疾控中心自愿咨询检测门诊招募MSM,进行面对面问卷调查,收集其一般人口学特征、行为学信息、对PrEP的知晓和使用意愿情况,并以PrEP知晓和PrEP使用意愿为因变量,进行χ^(2)检验和多因素Logistic回归分析。结果共调查500名MSM,年龄18~77岁,PrEP知晓率46.0%,63.0%的调查对象知晓并愿意使用PrEP。多因素Logistic回归分析结果显示,最近3个月从未使用安全套(OR=3.839,95%CI:1.549~9.516),使用过rush popper(OR=2.546,95%CI:1.454~4.458),接受过HIV检测(OR=1.951,95%CI:1.039~3.662),知晓PEP(OR=23.678,95%CI:13.284~42.205)是PrEP知晓的促进因素,性行为方式为同性/异性均可(OR=0.568,95%CI:0.343~0.941)是PrEP知晓的阻碍因素。月收入≥5000元(OR=2.816,95%CI:1.190~6.664),性伴数量>10个(OR=2.338,95%CI:1.129~4.842),近3个月有时使用安全套(OR=2.667,95%CI:1.257~5.661),透露过性向(OR=2.728,95%CI:1.425~5.224),知晓PEP(OR=7.057,95%CI:1.661~29.977)是PrEP使用意愿的促进因素。结论大连市MSM的PrEP知晓和使用意愿比例较低,应进一步开展针对性PrEP宣传教育,尤其是提高不使用安全套、使用过rush、多性伴MSM对PrEP正确认识和引导有需求的MSM正确使用PrEP,从而提升PrEP知晓和使用。 展开更多
关键词 艾滋病病毒 男男性行为者 暴露前预防 影响因素
原文传递
Secure Proxy Re-Encryption from CBE to IBE
17
作者 CHEN Yan ZHANG Futai 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期657-661,共5页
In this paper, an efficient hybrid proxy re-encryption scheme that allows the transformation of the ciphertexts in a traditional public key cryptosystem into the ciphertexts in an identity-based system is proposed. Th... In this paper, an efficient hybrid proxy re-encryption scheme that allows the transformation of the ciphertexts in a traditional public key cryptosystem into the ciphertexts in an identity-based system is proposed. The scheme is non-interactive, unidirectional and collude "safe". Furthermore, it is compatible with current IBE (identity-based encryption) deployments. The scheme has chosen ciphertext security in the random oracle model assuming the hardness of the Decisional Bilinear Diffie-Hellman problem. 展开更多
关键词 proxy re-encryption traditional public key encryption identity-based public key encryption Decisional Bilinear Diffie-Hellman problem random oracle model
原文传递
一类4维3-李代数上的O-算子及导出的3-Pre-李代数
18
作者 程紫莹 吕家凤 亢闯闯 《浙江师范大学学报(自然科学版)》 CAS 2025年第1期21-29,共9页
李代数的Operad理论应用于3-李代数,可自然地构造出3-Pre-李代数,其与Pre-李代数有很多相似的性质.利用4维复3-李代数的分类以及3-李代数和O-算子的结构常数的关系,使用Maple软件求解三次非线性方程组,对一类4维复3-李代数上与伴随表示... 李代数的Operad理论应用于3-李代数,可自然地构造出3-Pre-李代数,其与Pre-李代数有很多相似的性质.利用4维复3-李代数的分类以及3-李代数和O-算子的结构常数的关系,使用Maple软件求解三次非线性方程组,对一类4维复3-李代数上与伴随表示相结合的O-算子进行了刻画.此外,利用所得结果,给出了这些O-算子导出的26个3-Pre-李代数的例子. 展开更多
关键词 3-pre-李代数 O-算子 3-李代数 pre-李代数
在线阅读 下载PDF
天津市部分新诊断HIV阳性男男性行为者PrEP和nPEP知晓及使用情况分析 被引量:1
19
作者 费丽萍 赵鹤鹤 +6 位作者 王实 郭燕 龚卉 于茂河 杨杰 汤后林 吕繁 《中国艾滋病性病》 北大核心 2025年第3期283-287,共5页
目的了解新诊断HIV阳性MSM对PrEP和nPEP的知晓和使用情况。方法以2023年12月至2024年8月天津市部分新诊断HIV阳性MSM为研究对象,通过问卷调查收集研究对象的基本人口学信息、性行为特征及PrEP、nPEP的知晓和使用情况。使用Logistic回归... 目的了解新诊断HIV阳性MSM对PrEP和nPEP的知晓和使用情况。方法以2023年12月至2024年8月天津市部分新诊断HIV阳性MSM为研究对象,通过问卷调查收集研究对象的基本人口学信息、性行为特征及PrEP、nPEP的知晓和使用情况。使用Logistic回归分析新诊断HIV阳性MSM中PrEP和nPEP知晓的影响因素。结果共计纳入研究对象251人,其中83人(33.1%)知晓PrEP,111人(55.8%)知晓nPEP。12人(4.8%)曾使用过PrEP,9人(3.6%)曾使用过nPEP。多因素Logistic回归分析显示,大专及以上文化程度者(PrEP:aOR=3.31,95%CI:1.66~6.83;nPEP:aOR=2.33,95%CI:1.28~4.28)、性伴数≥2(PrEP:aOR=2.29,95%CI:1.14~4.69;nPEP:aOR=2.02,95%CI:1.12~3.68)、既往有HIV检测史(PrEP:aOR=12.26,95%CI:5.62~30.00;nPEP:aOR=3.99,95%CI:2.21~7.36)是PrEP和nPEP知晓的促进因素。此外,同性性向(aOR=2.52,95%CI:1.08~6.31)也是nPEP知晓的促进因素。结论天津市部分新诊断HIV阳性MSM的PrEP和nPEP的知晓和使用情况均较低。可以通过网络平台、社会组织及同伴教育者在动员MSM进行HIV检测的同时普及PrEP和nPEP知识。 展开更多
关键词 艾滋病病毒感染者 暴露前预防 非职业暴露后预防 知晓 男男性行为者
原文传递
男男性行为者PrEP污名化体验的Meta整合 被引量:1
20
作者 彭雨馨 钟涛 +1 位作者 徐璇 付光蕾 《中国艾滋病性病》 北大核心 2025年第1期106-111,共6页
目的系统评价和整合MSM暴露前预防污名化体验的质性研究,为MSM实施针对性干预提供循证依据。方法检索Cochrane Library、PubMed、Embase、Web of Science、CINAHL、SinoMed、万方数据库、中国知网和维普数据库中关于MSM暴露前预防污名... 目的系统评价和整合MSM暴露前预防污名化体验的质性研究,为MSM实施针对性干预提供循证依据。方法检索Cochrane Library、PubMed、Embase、Web of Science、CINAHL、SinoMed、万方数据库、中国知网和维普数据库中关于MSM暴露前预防污名化体验的质性研究,检索时限为建库至2024年9月。结果共纳入16篇基于国外研究的文献,提炼出57个研究结果,形成14个新类别,进一步归纳得到4个整合结果:污名化影响因素复杂、污名化存在多重表现、污名化影响日常生活、污名化应对策略多样。结论MSM暴露前预防污名化体验复杂,未来可借鉴国外研究,结合我国国情及文化背景,加强医护人员专业化培训,运用数字化工具积极实施综合性干预措施,联合家庭、社区构建整体化社会支持模式,帮助MSM减轻污名化体验。 展开更多
关键词 HIV 男男性行为者 暴露前预防 污名化 质性研究 Meta整合
原文传递
上一页 1 2 250 下一页 到第
使用帮助 返回顶部