期刊文献+
共找到14,820篇文章
< 1 2 250 >
每页显示 20 50 100
Group Signature Based on Non-interactive Zero-Knowledge Proofs 被引量:2
1
作者 周福才 徐剑 +1 位作者 李慧 王兰兰 《China Communications》 SCIE CSCD 2011年第2期34-41,共8页
Non-Interactive Zero-Knowledge(NIZK for short) proofs are fascinating and extremely useful in many security protocols. In this paper,a new group signature scheme,decisional linear assumption group signature(DLAGS for ... Non-Interactive Zero-Knowledge(NIZK for short) proofs are fascinating and extremely useful in many security protocols. In this paper,a new group signature scheme,decisional linear assumption group signature(DLAGS for short) with NIZK proofs is proposed which can prove and sign the multiple values rather than individual bits based on DLIN assumption. DLAGS does not need to interact between the verifier and issuer,which can decrease the communication times and storage cost compared with the existing interactive group signature schemes. We prove and sign the blocks of messages instead of limiting the proved message to only one bit(0 or 1) in the conventional non-interactive zero-knowledge proof system,and we also prove that our scheme satisfy the property of anonymity,unlinkability and traceability. Finally,our scheme is compared with the other scheme(Benoitt's scheme) which is also based on the NIZK proofs system and the DLIN assumption,and the results show that our scheme requires fewer members of groups and computational times. 展开更多
关键词 group signature non-interactive zero-knowledge proofs commitment scheme groth-sahai proofs system
在线阅读 下载PDF
Block Verification Mechanism Based on Zero-Knowledge Proof in Blockchain
2
作者 Jin Wang Wei Ou +3 位作者 Osama Alfarraj Amr Tolba Gwang-Jun Kim Yongjun Ren 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1805-1819,共15页
Since transactions in blockchain are based on public ledger verification,this raises security concerns about privacy protection.And it will cause the accumulation of data on the chain and resulting in the low efficien... Since transactions in blockchain are based on public ledger verification,this raises security concerns about privacy protection.And it will cause the accumulation of data on the chain and resulting in the low efficiency of block verification,when the whole transaction on the chain is verified.In order to improve the efficiency and privacy protection of block data verification,this paper proposes an efficient block verification mechanism with privacy protection based on zeroknowledge proof(ZKP),which not only protects the privacy of users but also improves the speed of data block verification.There is no need to put the whole transaction on the chain when verifying block data.It just needs to generate the ZKP and root hash with the transaction information,then save them to the smart contract for verification.Moreover,the ZKP verification in smart contract is carried out to realize the privacy protection of the transaction and efficient verification of the block.When the data is validated,the buffer accepts the complete transaction,updates the transaction status in the cloud database,and packages up the chain.So,the ZKP strengthens the privacy protection ability of blockchain,and the smart contracts save the time cost of block verification. 展开更多
关键词 Blockchain privacy protection zero-knowledge proof smart contract
在线阅读 下载PDF
Memorizable Interactive Proof and Zero-Knowledge Proof Systems
3
作者 NingChen Jia-WeiRong 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第6期936-941,共6页
Interactive proof and zero-knowledge proof systems are two important concepts in cryptography and complexity theory. In the past two decades, a great number of interactive proof and zero-knowledge proof protocols have... Interactive proof and zero-knowledge proof systems are two important concepts in cryptography and complexity theory. In the past two decades, a great number of interactive proof and zero-knowledge proof protocols have been designed and applied in practice. In this paper, a simple memorizable zero-knowledge protocol is proposed for graph non-isomorphism problem, based on the memorizable interactive proof system, which is extended from the original definition of interactive proof and is more applicable in reality. Keywords interactive proof - zero-knowledge proof - memorizable interactive proof - memorizable zero-knowledge proof This work was supported by the ministry of Science and Technology of China (Grant No.2001CCA03000), and the National Natural Science Foundation of China (Grant No.60273045).Ning Chen received his B.S. degree from Fudan University in 2001. Now he is a master candidate of Department of Computer Science, Fudan University. His research interests include computational complexity, computational cryptography, algorithm design and analysis.Jia-Wei Rong received her B.S. degree from Fudan University in 2002. Now she is a master candidate of Department of Computer Science, Fudan University. Her research interests include computational cryptography, machine learning, artificial intelligence. 展开更多
关键词 interactive proof zero-knowledge proof memorizable interactive proof memorizable zero-knowledge proof
原文传递
Existence of 3-round zero-knowledge proof systems for NP 被引量:2
4
作者 LI HongDat LI Bao 《Science in China(Series F)》 2008年第3期273-282,共10页
This paper considers the existence of 3-round zero-knowledge proof systems for NP. Whether there exist 3-round non-black-box zero-knowledge proof systems for NP language is an open problem. By introducing a new intera... This paper considers the existence of 3-round zero-knowledge proof systems for NP. Whether there exist 3-round non-black-box zero-knowledge proof systems for NP language is an open problem. By introducing a new interactive proof model, we construct a 3-round zero-knowledge proof system for graph 3-coloring under standard assumptions. Our protocol is a non-black-box zero-knowledge proof because we adopt a special strategy to prove the zero-knowledge property. Consequently, our construction shows the existence of 3-round non-black-box zero-knowledge proof for all languages in NP under the DDH assumption. 展开更多
关键词 interactive proof zero-knowledge proof non-black-box simulation DDH assumption
原文传递
BMSC:A Novel Anonymous Trading Scheme Based on Zero-Knowledge Proof in Ethereum
5
作者 Yang Li Yinyun Zhang +2 位作者 Mengmeng Wang Jianming Zhu Xiuli Wang 《国际计算机前沿大会会议论文集》 2022年第2期59-77,共19页
Blockchains are widely used because of their openness,transparency,nontampering and decentralization.However,there is a high risk of information leakage when trading on blockchain,and the existing anonymous trading sc... Blockchains are widely used because of their openness,transparency,nontampering and decentralization.However,there is a high risk of information leakage when trading on blockchain,and the existing anonymous trading schemes still have some problems.To meet the high requirement of anonymity,the cost of proof submitted by the user is too large,which does not apply to blockchain storage.Meanwhile,transaction verification takes too long to ensure the legitimacy of the transaction.To solve these problems,this paper presents a novel anonymous trading scheme named Block Maze Smart Contract(BMSC)based on the zeroknowledge proof system zk-SNARKs to propose efficiency.This scheme can hide account balances,transaction amounts,and the transfer relationships between transaction parties while preventing overspending attacks and double-spending attacks.Compared with other anonymous schemes,this scheme has less cost of proof and takes less time for transaction verification while meeting the high requirements of anonymity and security. 展开更多
关键词 zero-knowledge proof Ethereum Account-model Anonymous trading
原文传递
Differentiated Instruction for Geometric Proofs in Middle School:A Design and Implementation Based on the SOLO Taxonomy
6
作者 Si Yang Guorong Wu 《Research on Educational Theory》 2026年第1期16-22,共7页
Moving beyond the conventional“level diagnosis-case analysis”framework,this study,grounded in the SOLO Taxonomy,constructs a four-dimensional instructional model of“stratified objectives,tasks,guidance,and assessme... Moving beyond the conventional“level diagnosis-case analysis”framework,this study,grounded in the SOLO Taxonomy,constructs a four-dimensional instructional model of“stratified objectives,tasks,guidance,and assessment.”Focusing on geometric proofs in middle school,the model is practically applied through case studies of the properties of parallelograms and triangle congruence.By transforming the SOLO levels into actionable instructional steps,the model addresses key student challenges-such as fragmented thinking processes,disorganized logical expression,and weak knowledge transfer-thereby facilitating cognitive progression among students at different levels.The implementation demonstrates that this model significantly enhances the precision and effectiveness of teaching geometric proofs.Its core strengths lie in using visualized diagnostic tools for precise instructional positioning and constructing scaffolded task sequences to build clear pathways for cognitive development. 展开更多
关键词 SOLO Taxonomy Geometric proofs Differentiated Instruction Instructional Design Cognitive Progression
在线阅读 下载PDF
Privacy-preserving analytics for the securitization market: a zero-knowledge distributed ledger technology application 被引量:1
7
作者 Sophie Meralli 《Financial Innovation》 2020年第1期129-148,共20页
A zero-knowledge proof or protocol is a cryptographic technique for verifying private data without revealing it in its clear form.In this paper,we evaluate the potential for zero-knowledge distributed ledger technolog... A zero-knowledge proof or protocol is a cryptographic technique for verifying private data without revealing it in its clear form.In this paper,we evaluate the potential for zero-knowledge distributed ledger technology to alleviate asymmetry of information in the asset-backed securitization market.To frame this inquiry,we conducted market data analyses,a review of prior literature,stakeholder interviews with investors,originators and security issuers and collaboration with blockchain engineers and researchers.We introduce a new system which could enable all market participants in the securitization lifecycle(e.g.investors,rating agencies,regulators and security issuers)to interact on a unique decentralized platform while maintaining the privacy of loan-level data,therefore providing the industry with timely analytics and performance data.Our platform is powered by zkLedger(Narula et al.2018),a zero-knowledge protocol developed by the MIT Media Lab and the first system that enables participants of a distributed ledger to run publicly verifiable analytics on masked data. 展开更多
关键词 Structured finance SECURITIZATION Blockchain zero-knowledge proofs Distributed ledger technology PRIVACY Data analytics
在线阅读 下载PDF
Blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection 被引量:3
8
作者 Yiting Huang Yong Yua +2 位作者 Huilin Li Yannan Li Aikui Tian 《Digital Communications and Networks》 SCIE CSCD 2022年第5期604-613,共10页
The cloud computing technology has emerged,developed,and matured in recent years,consequently commercializing remote outsourcing storage services.An increasing number of companies and individuals have chosen the cloud... The cloud computing technology has emerged,developed,and matured in recent years,consequently commercializing remote outsourcing storage services.An increasing number of companies and individuals have chosen the cloud to store their data.However,accidents,such as cloud server downtime,cloud data loss,and accidental deletion,are serious issues for some applications that need to run around the clock.For some mission and business-critical applications,the continuous availability of outsourcing storage services is also necessary to protect users'outsourced data during downtime.Nevertheless,ensuring the continuous availability of data in public cloud data integrity auditing protocols leads to data privacy issues because auditors can obtain the data content of users by a sufficient number of storage proofs.Therefore,protecting data privacy is a burning issue.In addition,existing data integrity auditing schemes that rely on semi-trusted third-party auditors have several security problems,including single points of failure and performance bottlenecks.To deal with these issues,we propose herein a blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection.We realize a concrete construction by using a verifiable delay function with high efficiency and proof of retrievability,and prove the security of the proposal in a random oracle model.The proposed construction supports dynamic updates for the outsourced data.We also design smart contracts to ensure fairness among the parties involved.Finally,we implement the protocols,and the experimental results demonstrate the efficiency of the proposed protocol. 展开更多
关键词 Continuous availability Verifiable delay function zero-knowledge privacy Blockchain
在线阅读 下载PDF
Precise Zero-Knowledge Arguments with Poly-logarithmic Efficiency
9
作者 丁宁 谷大武 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第5期584-589,共6页
Precise zero-knowledge was introduced by Micali and Pass in STOC06. This notion captures the idea that the view of a verifier can be reconstructed in almost same time. Following the notion, they constructed some preci... Precise zero-knowledge was introduced by Micali and Pass in STOC06. This notion captures the idea that the view of a verifier can be reconstructed in almost same time. Following the notion, they constructed some precise zero-knowledge proofs and arguments, in which the communicated messages are polynomial bits. In this paper, we employ the new simulation technique introduced by them to provide a precise simulator for a modified Kilian's zero-knowledge arguments with poly-logarithmic efficiency (this modification addressed by Rosen), and as a result we show this protocol is a precise zero-knowledge argument with poly-logaxithmic efficiency. We also present an alternative construction of the desired protocols. 展开更多
关键词 CRYPTOGRAPHY zero-knowledge precise zero-knowledge
原文传递
On Sequential Composition of Precise Zero-Knowledge
10
作者 丁宁 谷大武 《Journal of Shanghai Jiaotong university(Science)》 EI 2010年第1期43-48,共6页
Precise zero-knowledge was introduced by Micali and Pass in STOC'06.This notion captures the idea that the view of any verifier in interaction can be reconstructed in almost time.Pass also obtained a sequential co... Precise zero-knowledge was introduced by Micali and Pass in STOC'06.This notion captures the idea that the view of any verifier in interaction can be reconstructed in almost time.Pass also obtained a sequential composition lemma for precise zero-knowledge protocols.However,this lemma doesn't provide tight precisions for composed protocols.In this paper we further obtain a sequential composition lemma for a subclass of precise zero-knowledge protocols,which all satisfy a property:their simulators use the code of verifier in almost the black-box way.We call such subclass emulated black-box zero-knowledge protocols.Our lemma provides better precisions for sequential composition of such protocols. 展开更多
关键词 CRYPTOGRAPHY zero-knowledge precise zero-knowledge
原文传递
A Novel Approach to Estimating Proof Test Coverage for Emergency Shutdown Valves using a Fuzzy Inference System
11
作者 Steve Kriescher Roderick Thomas +2 位作者 Chris Phillips Neil Mac Parthaláin David J.Smith 《Journal of Dynamics, Monitoring and Diagnostics》 2025年第1期44-52,共9页
Published proof test coverage(PTC)estimates for emergency shutdown valves(ESDVs)show only moderate agreement and are predominantly opinion-based.A Failure Modes,Effects,and Diagnostics Analysis(FMEDA)was undertaken us... Published proof test coverage(PTC)estimates for emergency shutdown valves(ESDVs)show only moderate agreement and are predominantly opinion-based.A Failure Modes,Effects,and Diagnostics Analysis(FMEDA)was undertaken using component failure rate data to predict PTC for a full stroke test and a partial stroke test.Given the subjective and uncertain aspects of the FMEDA approach,specifically the selection of component failure rates and the determination of the probability of detecting failure modes,a Fuzzy Inference System(FIS)was proposed to manage the data,addressing the inherent uncertainties.Fuzzy inference systems have been used previously for various FMEA type assessments,but this is the first time an FIS has been employed for use with FMEDA.ESDV PTC values were generated from both the standard FMEDA and the fuzzy-FMEDA approaches using data provided by FMEDA experts.This work demonstrates that fuzzy inference systems can address the subjectivity inherent in FMEDA data,enabling reliable estimates of ESDV proof test coverage for both full and partial stroke tests.This facilitates optimized maintenance planning while ensuring safety is not compromised. 展开更多
关键词 emergency shutdown valves failure modes effects diagnostics analysis fuzzy inference systems proof test coverage
在线阅读 下载PDF
A Blockchain-Based Efficient Verification Scheme for Context Semantic-Aware Ciphertext Retrieval
12
作者 Haochen Bao Lingyun Yuan +2 位作者 Tianyu Xie Han Chen Hui Dai 《Computers, Materials & Continua》 2026年第1期550-579,共30页
In the age of big data,ensuring data privacy while enabling efficient encrypted data retrieval has become a critical challenge.Traditional searchable encryption schemes face difficulties in handling complex semantic q... In the age of big data,ensuring data privacy while enabling efficient encrypted data retrieval has become a critical challenge.Traditional searchable encryption schemes face difficulties in handling complex semantic queries.Additionally,they typically rely on honest but curious cloud servers,which introduces the risk of repudiation.Furthermore,the combined operations of search and verification increase system load,thereby reducing performance.Traditional verification mechanisms,which rely on complex hash constructions,suffer from low verification efficiency.To address these challenges,this paper proposes a blockchain-based contextual semantic-aware ciphertext retrieval scheme with efficient verification.Building on existing single and multi-keyword search methods,the scheme uses vector models to semantically train the dataset,enabling it to retain semantic information and achieve context-aware encrypted retrieval,significantly improving search accuracy.Additionally,a blockchain-based updatable master-slave chain storage model is designed,where the master chain stores encrypted keyword indexes and the slave chain stores verification information generated by zero-knowledge proofs,thus balancing system load while improving search and verification efficiency.Finally,an improved non-interactive zero-knowledge proof mechanism is introduced,reducing the computational complexity of verification and ensuring efficient validation of search results.Experimental results demonstrate that the proposed scheme offers stronger security,balanced overhead,and higher search verification efficiency. 展开更多
关键词 Searchable encryption blockchain context semantic awareness zero-knowledge proof
在线阅读 下载PDF
含压力释放阀升高座应对内部电弧故障的数值模拟研究
13
作者 邓军 谢志成 +7 位作者 关庆罡 陈星 周海滨 付瑶 王宁 郝蕊 徐强 陈健云 《高压电器》 北大核心 2026年第4期82-88,97,共8页
变压器发生内部电弧放电故障时,如不能有效泄压将导致破坏爆炸,为减少爆炸的隐患和经济损失进行了变压器加装泄压装置数值模拟研究。在变压器升高座模型上,加装了压力释放阀的泄压装置,同时设置了未加装压力释放阀的升高座模型作为对照... 变压器发生内部电弧放电故障时,如不能有效泄压将导致破坏爆炸,为减少爆炸的隐患和经济损失进行了变压器加装泄压装置数值模拟研究。在变压器升高座模型上,加装了压力释放阀的泄压装置,同时设置了未加装压力释放阀的升高座模型作为对照组,对比分析了泄压装置对变压器升高座抗爆的影响。运用Autodyn软件建立了变压器升高座CEL多物质流固耦合模型,进行爆炸模拟和动力结果分析,得到变压器爆炸动态响应的变形云图和应力云图,通过与试验结果的对比,验证了所建耦合模型的可靠性。在此基础上,通过在变压器升高座内壁上布置测点,得到爆炸动态响应的压强曲线和应力曲线,掌握了内爆过程中封闭装置内壁超压分布情况,进一步揭示内爆规律。结果表明:与未设置泄压装置的仿真结果进行对比分析,增加压力释放阀泄压装置能够安全、可靠的预防变压器超压爆裂损坏,研究结果有助于变压器防爆装置的合理优化设计,避免变压器油箱内部电弧放电真实尺寸模拟试验的复杂性与危险性。 展开更多
关键词 变压器 升高座 防爆 压力释放阀 数值模拟
在线阅读 下载PDF
格上基于零知识证明的可追踪环签名方案
14
作者 孟慧 桑梓鑫 +1 位作者 汤永利 闫玺玺 《重庆邮电大学学报(自然科学版)》 北大核心 2026年第1期49-57,共9页
针对目前格上环签名方案在环成员数量较多的情况下,签名效率低下且签名尺寸和公钥尺寸过大的问题,基于零知识证明,使用E-MLWE(extended module learning with errors)和MSIS(module short interger solution)问题降低了公钥大小,结合拒... 针对目前格上环签名方案在环成员数量较多的情况下,签名效率低下且签名尺寸和公钥尺寸过大的问题,基于零知识证明,使用E-MLWE(extended module learning with errors)和MSIS(module short interger solution)问题降低了公钥大小,结合拒绝采样算法和追踪机制设计了一种可追踪环签名方案,签名算法中使用递归算法压缩了承诺的大小,进一步降低了签名尺寸,在随机预言机模型下证明方案满足可链接性、匿名性和抗陷害性。性能分析表明,签名尺寸与环成员数量为对数大小关系,在环成员数量较多时,公钥的存储开销和签名的通信开销具有明显优势。 展开更多
关键词 环签名 递归 格密码 零知识证明
在线阅读 下载PDF
风险预防原则下的证明问题研究
15
作者 曾祥华 王丽影 《行政与法》 2026年第4期101-115,共15页
风险预防原则已为许多国际文件和国内法所确认,对运用预防原则时的证据、举证责任和证明标准的研究具有十分重要的理论价值和实践价值。严重或不可逆的风险以及科学不确定性是适用预防原则的“门槛”,也是研究预防原则之下证明问题的前... 风险预防原则已为许多国际文件和国内法所确认,对运用预防原则时的证据、举证责任和证明标准的研究具有十分重要的理论价值和实践价值。严重或不可逆的风险以及科学不确定性是适用预防原则的“门槛”,也是研究预防原则之下证明问题的前提。风险评估报告是应用预防原则的主要证据形式。举证责任转移是强预防原则的要求,尽管充满争议,却已经被部分国际争议裁决机构所应用。对待证明问题的态度与对待预防原则的态度密切相连,支持强风险原则的人往往支持举证责任反转(倒置)或者举证责任的转移,反对强预防原则者往往认为举证责任反转会阻碍科学创新。降低证明标准是科学不确定性的内在要求。我国的风险评估制度已经成型,但制度本身有待完善,实践效果有待提升,法律法规和司法解释已经确立了举证责任转移规则,但实际操作中仍然存在一定的困难和阻力,尚需继续探索。在风险和因果关系的证明方面,应当降低证明标准,适用低度盖然性标准。在预防原则作为理念指导之下,将比例原则、成本效益分析、结合个案情况、自由心证综合运用,协调平衡,继续探索,预防原则之下的证明规则、证明标准一定会越来越完善。 展开更多
关键词 预防原则 科学不确定性 风险评估 举证责任 证明标准
在线阅读 下载PDF
论知识产权侵权诉讼中合法来源抗辩的证明
16
作者 王超 《法律科学(西北政法大学学报)》 北大核心 2026年第1期178-189,共12页
知识产权侵权诉讼中合法来源抗辩得到支持的比例明显偏低,症结在于法院为被告设定了过重的证明责任。合法来源抗辩旨在对抗过错要件的成立,其中“不知道产品侵权”是被告对过错的否认,“产品有合法来源”则是被告为否认所附的理由。合... 知识产权侵权诉讼中合法来源抗辩得到支持的比例明显偏低,症结在于法院为被告设定了过重的证明责任。合法来源抗辩旨在对抗过错要件的成立,其中“不知道产品侵权”是被告对过错的否认,“产品有合法来源”则是被告为否认所附的理由。合法来源抗辩并非实体法中的独立抗辩事由,也不是程序法中的抗辩,被告毋庸承担过错要件的证明责任。被告主张合法来源抗辩,实为履行民事诉讼法上的事案解明义务,其履行前提是原告的主张已趋具体化,履行形式是合理说明“不知道产品侵权”并举证证明“产品有合法来源”,不履行的后果是遭受事实层面的不利认定。伴随我国知识产权保护环境持续向好,合法来源抗辩亟需回归过错证明的本旨,为市场主体提供最佳的证据法激励。 展开更多
关键词 知识产权侵权 合法来源抗辩 过错 证明责任 事案解明义务
原文传递
非法证据排除程序的五个维度
17
作者 高咏 《政法论丛》 北大核心 2026年第1期119-131,共13页
非法证据排除程序在我国立法中已形成较为完整的体系,但在司法实践中,该程序的运作仍面临一定挑战。程序能否有效发挥其保障诉讼公正的功能,取决于制度逻辑是否清晰,以及核心制度环节能否得到有效落实。程序独立性的保障、启动机制的合... 非法证据排除程序在我国立法中已形成较为完整的体系,但在司法实践中,该程序的运作仍面临一定挑战。程序能否有效发挥其保障诉讼公正的功能,取决于制度逻辑是否清晰,以及核心制度环节能否得到有效落实。程序独立性的保障、启动机制的合理设置、举证责任倒置与最高证明标准的实施、庭审中控辩双方的力量平衡以及二审程序对程序性违法的监督,这五个维度是该程序能否顺利运行的关键环节。 展开更多
关键词 非法证据排除程序 程序性裁判 证明机制 证据合法性审查
在线阅读 下载PDF
供应链中考虑需求信息更新的最优防重新谈判合约
18
作者 周建亨 罗瑶 +1 位作者 李少坤 柳璐 《管理科学学报》 北大核心 2026年第2期175-190,共16页
面对复杂的供应链环境,构建长期合作关系是上下游企业利益共享、抵抗风险的有效手段,而长期合约是否具有“防重新谈判”性质起着重要的作用.因此,在制造商和零售商的两阶段合作中,考虑需求不确定且类型在不同阶段随机变化(由于零售商更... 面对复杂的供应链环境,构建长期合作关系是上下游企业利益共享、抵抗风险的有效手段,而长期合约是否具有“防重新谈判”性质起着重要的作用.因此,在制造商和零售商的两阶段合作中,考虑需求不确定且类型在不同阶段随机变化(由于零售商更了解市场需求,因此文中也简称为零售商类型),分别构建了非对称信息下(不)完全承诺的三种合约模型,并从防重新谈判的角度分析了三种模型中的最优合约及其性质.研究发现:最优防重新谈判合约与零售商类型在两阶段的相关性相关,随着相关性逐渐增加,最优防重新谈判合约依次是完全承诺分离合约、不完全承诺分离合约、不完全承诺混同合约;当相关性较小时,零售商类型在不同阶段变化较大,导致制造商第一阶段通过分离零售商类型获知的信息并不能指导第二阶段合约的制定,因此完全承诺分离合约具有防重新谈判的性质且是最优防重新谈判合约;制造商利用第一阶段更新的信息可以制定不完全承诺分离与混同合约,当其更关注第二阶段期望利润时,不完全承诺混同合约是最优防重新谈判合约. 展开更多
关键词 需求不确定 非对称信息 信息更新 随机变化 最优防重新谈判合约
在线阅读 下载PDF
论海上货物运输法上的举证责任
19
作者 傅廷中 余俊达 《大连海事大学学报(社会科学版)》 2026年第1期14-28,共15页
海上货物运输发生货损时,船货双方往往难以提供有说服力的证据完成举证,法院只得转而依据举证责任进行判断。因此,海上货物运输法上的举证责任引发学界关注,并产生争议。海上货物运输法上举证责任的相关规定散见于海商法的不同部分,亟... 海上货物运输发生货损时,船货双方往往难以提供有说服力的证据完成举证,法院只得转而依据举证责任进行判断。因此,海上货物运输法上的举证责任引发学界关注,并产生争议。海上货物运输法上举证责任的相关规定散见于海商法的不同部分,亟待推敲并进行理论构建。举证责任问题并非仅在中国出现,英、美两国围绕举证责任均积累了可供参考的经验。海上货物运输法上的举证责任,其实质在于平衡船货双方的利益。对此,可以借助利益衡量理论,兼顾海上货物运输法和举证责任的制度价值,合理分配船货双方的举证责任。 展开更多
关键词 海上货物运输 举证责任 货损 利益衡量
在线阅读 下载PDF
基于极限状态法的锻钢吊钩能力验证实例研究
20
作者 李军 《机械管理开发》 2026年第2期1-4,7,共5页
依据GB/T 41676—2022《起重机设计通则锻钢吊钩的极限状态和能力验证》标准,以50号锻钢吊钩为例,阐述其设计计算与能力验证的关键过程。重点解析吊钩钩柄及钩身危险截面的惯性矩计算方法,系统验证其静强度与疲劳强度。研究充分证明极... 依据GB/T 41676—2022《起重机设计通则锻钢吊钩的极限状态和能力验证》标准,以50号锻钢吊钩为例,阐述其设计计算与能力验证的关键过程。重点解析吊钩钩柄及钩身危险截面的惯性矩计算方法,系统验证其静强度与疲劳强度。研究充分证明极限状态法在起重机关键部件设计中的精确性与可靠性,为吊钩的非标设计提供实施实例。 展开更多
关键词 锻钢吊钩 极限状态法 能力验证
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部