期刊文献+
共找到14,600篇文章
< 1 2 250 >
每页显示 20 50 100
Group Signature Based on Non-interactive Zero-Knowledge Proofs 被引量:2
1
作者 周福才 徐剑 +1 位作者 李慧 王兰兰 《China Communications》 SCIE CSCD 2011年第2期34-41,共8页
Non-Interactive Zero-Knowledge(NIZK for short) proofs are fascinating and extremely useful in many security protocols. In this paper,a new group signature scheme,decisional linear assumption group signature(DLAGS for ... Non-Interactive Zero-Knowledge(NIZK for short) proofs are fascinating and extremely useful in many security protocols. In this paper,a new group signature scheme,decisional linear assumption group signature(DLAGS for short) with NIZK proofs is proposed which can prove and sign the multiple values rather than individual bits based on DLIN assumption. DLAGS does not need to interact between the verifier and issuer,which can decrease the communication times and storage cost compared with the existing interactive group signature schemes. We prove and sign the blocks of messages instead of limiting the proved message to only one bit(0 or 1) in the conventional non-interactive zero-knowledge proof system,and we also prove that our scheme satisfy the property of anonymity,unlinkability and traceability. Finally,our scheme is compared with the other scheme(Benoitt's scheme) which is also based on the NIZK proofs system and the DLIN assumption,and the results show that our scheme requires fewer members of groups and computational times. 展开更多
关键词 group signature non-interactive zero-knowledge proofs commitment scheme groth-sahai proofs system
在线阅读 下载PDF
Block Verification Mechanism Based on Zero-Knowledge Proof in Blockchain
2
作者 Jin Wang Wei Ou +3 位作者 Osama Alfarraj Amr Tolba Gwang-Jun Kim Yongjun Ren 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1805-1819,共15页
Since transactions in blockchain are based on public ledger verification,this raises security concerns about privacy protection.And it will cause the accumulation of data on the chain and resulting in the low efficien... Since transactions in blockchain are based on public ledger verification,this raises security concerns about privacy protection.And it will cause the accumulation of data on the chain and resulting in the low efficiency of block verification,when the whole transaction on the chain is verified.In order to improve the efficiency and privacy protection of block data verification,this paper proposes an efficient block verification mechanism with privacy protection based on zeroknowledge proof(ZKP),which not only protects the privacy of users but also improves the speed of data block verification.There is no need to put the whole transaction on the chain when verifying block data.It just needs to generate the ZKP and root hash with the transaction information,then save them to the smart contract for verification.Moreover,the ZKP verification in smart contract is carried out to realize the privacy protection of the transaction and efficient verification of the block.When the data is validated,the buffer accepts the complete transaction,updates the transaction status in the cloud database,and packages up the chain.So,the ZKP strengthens the privacy protection ability of blockchain,and the smart contracts save the time cost of block verification. 展开更多
关键词 Blockchain privacy protection zero-knowledge proof smart contract
在线阅读 下载PDF
Memorizable Interactive Proof and Zero-Knowledge Proof Systems
3
作者 NingChen Jia-WeiRong 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第6期936-941,共6页
Interactive proof and zero-knowledge proof systems are two important concepts in cryptography and complexity theory. In the past two decades, a great number of interactive proof and zero-knowledge proof protocols have... Interactive proof and zero-knowledge proof systems are two important concepts in cryptography and complexity theory. In the past two decades, a great number of interactive proof and zero-knowledge proof protocols have been designed and applied in practice. In this paper, a simple memorizable zero-knowledge protocol is proposed for graph non-isomorphism problem, based on the memorizable interactive proof system, which is extended from the original definition of interactive proof and is more applicable in reality. Keywords interactive proof - zero-knowledge proof - memorizable interactive proof - memorizable zero-knowledge proof This work was supported by the ministry of Science and Technology of China (Grant No.2001CCA03000), and the National Natural Science Foundation of China (Grant No.60273045).Ning Chen received his B.S. degree from Fudan University in 2001. Now he is a master candidate of Department of Computer Science, Fudan University. His research interests include computational complexity, computational cryptography, algorithm design and analysis.Jia-Wei Rong received her B.S. degree from Fudan University in 2002. Now she is a master candidate of Department of Computer Science, Fudan University. Her research interests include computational cryptography, machine learning, artificial intelligence. 展开更多
关键词 interactive proof zero-knowledge proof memorizable interactive proof memorizable zero-knowledge proof
原文传递
Existence of 3-round zero-knowledge proof systems for NP 被引量:2
4
作者 LI HongDat LI Bao 《Science in China(Series F)》 2008年第3期273-282,共10页
This paper considers the existence of 3-round zero-knowledge proof systems for NP. Whether there exist 3-round non-black-box zero-knowledge proof systems for NP language is an open problem. By introducing a new intera... This paper considers the existence of 3-round zero-knowledge proof systems for NP. Whether there exist 3-round non-black-box zero-knowledge proof systems for NP language is an open problem. By introducing a new interactive proof model, we construct a 3-round zero-knowledge proof system for graph 3-coloring under standard assumptions. Our protocol is a non-black-box zero-knowledge proof because we adopt a special strategy to prove the zero-knowledge property. Consequently, our construction shows the existence of 3-round non-black-box zero-knowledge proof for all languages in NP under the DDH assumption. 展开更多
关键词 interactive proof zero-knowledge proof non-black-box simulation DDH assumption
原文传递
BMSC:A Novel Anonymous Trading Scheme Based on Zero-Knowledge Proof in Ethereum
5
作者 Yang Li Yinyun Zhang +2 位作者 Mengmeng Wang Jianming Zhu Xiuli Wang 《国际计算机前沿大会会议论文集》 2022年第2期59-77,共19页
Blockchains are widely used because of their openness,transparency,nontampering and decentralization.However,there is a high risk of information leakage when trading on blockchain,and the existing anonymous trading sc... Blockchains are widely used because of their openness,transparency,nontampering and decentralization.However,there is a high risk of information leakage when trading on blockchain,and the existing anonymous trading schemes still have some problems.To meet the high requirement of anonymity,the cost of proof submitted by the user is too large,which does not apply to blockchain storage.Meanwhile,transaction verification takes too long to ensure the legitimacy of the transaction.To solve these problems,this paper presents a novel anonymous trading scheme named Block Maze Smart Contract(BMSC)based on the zeroknowledge proof system zk-SNARKs to propose efficiency.This scheme can hide account balances,transaction amounts,and the transfer relationships between transaction parties while preventing overspending attacks and double-spending attacks.Compared with other anonymous schemes,this scheme has less cost of proof and takes less time for transaction verification while meeting the high requirements of anonymity and security. 展开更多
关键词 zero-knowledge proof Ethereum Account-model Anonymous trading
原文传递
A Novel Approach to Estimating Proof Test Coverage for Emergency Shutdown Valves using a Fuzzy Inference System
6
作者 Steve Kriescher Roderick Thomas +2 位作者 Chris Phillips Neil Mac Parthaláin David J.Smith 《Journal of Dynamics, Monitoring and Diagnostics》 2025年第1期44-52,共9页
Published proof test coverage(PTC)estimates for emergency shutdown valves(ESDVs)show only moderate agreement and are predominantly opinion-based.A Failure Modes,Effects,and Diagnostics Analysis(FMEDA)was undertaken us... Published proof test coverage(PTC)estimates for emergency shutdown valves(ESDVs)show only moderate agreement and are predominantly opinion-based.A Failure Modes,Effects,and Diagnostics Analysis(FMEDA)was undertaken using component failure rate data to predict PTC for a full stroke test and a partial stroke test.Given the subjective and uncertain aspects of the FMEDA approach,specifically the selection of component failure rates and the determination of the probability of detecting failure modes,a Fuzzy Inference System(FIS)was proposed to manage the data,addressing the inherent uncertainties.Fuzzy inference systems have been used previously for various FMEA type assessments,but this is the first time an FIS has been employed for use with FMEDA.ESDV PTC values were generated from both the standard FMEDA and the fuzzy-FMEDA approaches using data provided by FMEDA experts.This work demonstrates that fuzzy inference systems can address the subjectivity inherent in FMEDA data,enabling reliable estimates of ESDV proof test coverage for both full and partial stroke tests.This facilitates optimized maintenance planning while ensuring safety is not compromised. 展开更多
关键词 emergency shutdown valves failure modes effects diagnostics analysis fuzzy inference systems proof test coverage
在线阅读 下载PDF
Privacy-preserving analytics for the securitization market: a zero-knowledge distributed ledger technology application 被引量:1
7
作者 Sophie Meralli 《Financial Innovation》 2020年第1期129-148,共20页
A zero-knowledge proof or protocol is a cryptographic technique for verifying private data without revealing it in its clear form.In this paper,we evaluate the potential for zero-knowledge distributed ledger technolog... A zero-knowledge proof or protocol is a cryptographic technique for verifying private data without revealing it in its clear form.In this paper,we evaluate the potential for zero-knowledge distributed ledger technology to alleviate asymmetry of information in the asset-backed securitization market.To frame this inquiry,we conducted market data analyses,a review of prior literature,stakeholder interviews with investors,originators and security issuers and collaboration with blockchain engineers and researchers.We introduce a new system which could enable all market participants in the securitization lifecycle(e.g.investors,rating agencies,regulators and security issuers)to interact on a unique decentralized platform while maintaining the privacy of loan-level data,therefore providing the industry with timely analytics and performance data.Our platform is powered by zkLedger(Narula et al.2018),a zero-knowledge protocol developed by the MIT Media Lab and the first system that enables participants of a distributed ledger to run publicly verifiable analytics on masked data. 展开更多
关键词 Structured finance SECURITIZATION Blockchain zero-knowledge proofs Distributed ledger technology PRIVACY Data analytics
在线阅读 下载PDF
Blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection 被引量:3
8
作者 Yiting Huang Yong Yua +2 位作者 Huilin Li Yannan Li Aikui Tian 《Digital Communications and Networks》 SCIE CSCD 2022年第5期604-613,共10页
The cloud computing technology has emerged,developed,and matured in recent years,consequently commercializing remote outsourcing storage services.An increasing number of companies and individuals have chosen the cloud... The cloud computing technology has emerged,developed,and matured in recent years,consequently commercializing remote outsourcing storage services.An increasing number of companies and individuals have chosen the cloud to store their data.However,accidents,such as cloud server downtime,cloud data loss,and accidental deletion,are serious issues for some applications that need to run around the clock.For some mission and business-critical applications,the continuous availability of outsourcing storage services is also necessary to protect users'outsourced data during downtime.Nevertheless,ensuring the continuous availability of data in public cloud data integrity auditing protocols leads to data privacy issues because auditors can obtain the data content of users by a sufficient number of storage proofs.Therefore,protecting data privacy is a burning issue.In addition,existing data integrity auditing schemes that rely on semi-trusted third-party auditors have several security problems,including single points of failure and performance bottlenecks.To deal with these issues,we propose herein a blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection.We realize a concrete construction by using a verifiable delay function with high efficiency and proof of retrievability,and prove the security of the proposal in a random oracle model.The proposed construction supports dynamic updates for the outsourced data.We also design smart contracts to ensure fairness among the parties involved.Finally,we implement the protocols,and the experimental results demonstrate the efficiency of the proposed protocol. 展开更多
关键词 Continuous availability Verifiable delay function zero-knowledge privacy Blockchain
在线阅读 下载PDF
Precise Zero-Knowledge Arguments with Poly-logarithmic Efficiency
9
作者 丁宁 谷大武 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第5期584-589,共6页
Precise zero-knowledge was introduced by Micali and Pass in STOC06. This notion captures the idea that the view of a verifier can be reconstructed in almost same time. Following the notion, they constructed some preci... Precise zero-knowledge was introduced by Micali and Pass in STOC06. This notion captures the idea that the view of a verifier can be reconstructed in almost same time. Following the notion, they constructed some precise zero-knowledge proofs and arguments, in which the communicated messages are polynomial bits. In this paper, we employ the new simulation technique introduced by them to provide a precise simulator for a modified Kilian's zero-knowledge arguments with poly-logarithmic efficiency (this modification addressed by Rosen), and as a result we show this protocol is a precise zero-knowledge argument with poly-logaxithmic efficiency. We also present an alternative construction of the desired protocols. 展开更多
关键词 CRYPTOGRAPHY zero-knowledge precise zero-knowledge
原文传递
On Sequential Composition of Precise Zero-Knowledge
10
作者 丁宁 谷大武 《Journal of Shanghai Jiaotong university(Science)》 EI 2010年第1期43-48,共6页
Precise zero-knowledge was introduced by Micali and Pass in STOC'06.This notion captures the idea that the view of any verifier in interaction can be reconstructed in almost time.Pass also obtained a sequential co... Precise zero-knowledge was introduced by Micali and Pass in STOC'06.This notion captures the idea that the view of any verifier in interaction can be reconstructed in almost time.Pass also obtained a sequential composition lemma for precise zero-knowledge protocols.However,this lemma doesn't provide tight precisions for composed protocols.In this paper we further obtain a sequential composition lemma for a subclass of precise zero-knowledge protocols,which all satisfy a property:their simulators use the code of verifier in almost the black-box way.We call such subclass emulated black-box zero-knowledge protocols.Our lemma provides better precisions for sequential composition of such protocols. 展开更多
关键词 CRYPTOGRAPHY zero-knowledge precise zero-knowledge
原文传递
Time Dilation Cosmology 3: Mathematical Proof of the 3 Temporal and 2 Spatial Acceleration Factors
11
作者 Joseph H. (Cass) Forrington 《Journal of Modern Physics》 2024年第12期2228-2237,共10页
This is the fifth paper in a series on Time Dilation Cosmology, TDC. TDC is an eternal holographic model of the universe based on time dilation that ties astrophysics to quantum physics and resolves all the conundrums... This is the fifth paper in a series on Time Dilation Cosmology, TDC. TDC is an eternal holographic model of the universe based on time dilation that ties astrophysics to quantum physics and resolves all the conundrums in astrophysics and serves as a model for the unified field. In the author’s previous four TDC papers, it was demonstrated that all gravitationally induced velocities are compensation for the apparent difference in the rates of time, “dRt”, due to mass/energy densities, and, vice-versa, in all force-induced velocities the dRt is compensation for the velocity, so the uniform evolution of the continuum at c is maintained at the invariant 1 s/s rate of time of the universe as a whole. These compensations make it impossible for an event to lag behind or get ahead of the evolving continuum. When the author did the first velocity formula derivations in “General Relativity: Effects in Time as Causation” [1], the author felt the explanations for the appearance of the 2spatial and the 3temporal acceleration factors in the formulas were correct, but poorly explained and incomplete. This paper is a proof of the temporal and spatial acceleration factors used in the time dilation-based velocity formula derivations in the Time Dilation Cosmology model. 展开更多
关键词 Mathematical proof Time Dilation Cosmology Acceleration Factors
在线阅读 下载PDF
磁流体密封原理及技术研究进展 被引量:2
12
作者 曾群锋 邓作炜 +1 位作者 张俊锋 贾谦 《润滑与密封》 北大核心 2025年第1期169-181,共13页
磁流体密封技术已在气体和真空条件下获得广泛应用,并且对液体密封的研究也日益受到关注。磁流体密封具有众多优点,如“零”泄漏、绿色环保、使用寿命长和可靠稳定等。综述磁流体在真空、气体、液体和防尘领域的研究进展,包括密封特性、... 磁流体密封技术已在气体和真空条件下获得广泛应用,并且对液体密封的研究也日益受到关注。磁流体密封具有众多优点,如“零”泄漏、绿色环保、使用寿命长和可靠稳定等。综述磁流体在真空、气体、液体和防尘领域的研究进展,包括密封特性、液-液界面稳定性、仿真分析和结构设计等。分析磁流体密封技术研究和发展存在的问题,展望磁流体密封领域的未来发展方向。未来磁流体密封技术有望进一步创新和发展,例如高性能磁流体材料研究、智能磁控系统设计、集成模块化设计等,为密封领域带来更多突破性的解决方案。 展开更多
关键词 磁流体密封 密封结构设计 磁性颗粒 真空密封 防尘密封
在线阅读 下载PDF
基于工业云存储系统的数据防篡改批量审计方案 被引量:1
13
作者 张晓均 郝云溥 +2 位作者 李磊 李晨阳 周子玉 《计算机应用》 北大核心 2025年第3期891-895,共5页
为解决工业云存储系统数据遭受篡改等网络主动攻击问题,实现工业数据云端安全共享的目标,并确保工业数据传输与存储过程的机密性、完整性与可用性,提出基于工业云存储系统的数据防篡改批量审计方案。在该方案中,设计基于双线性对映射的... 为解决工业云存储系统数据遭受篡改等网络主动攻击问题,实现工业数据云端安全共享的目标,并确保工业数据传输与存储过程的机密性、完整性与可用性,提出基于工业云存储系统的数据防篡改批量审计方案。在该方案中,设计基于双线性对映射的同态数字签名算法,使第三方审计者实现对工业云存储系统数据的批量防篡改完整性检测,并及时将防篡改完整性审计结果反馈给工程服务终端用户;此外,通过加入审计者减轻工程服务终端用户的计算负担,同时确保工业加密数据在传输与存储过程中的完整性。安全性分析与性能比较结果表明,所提方案通过设计防篡改检测向量,使得第三方审计者的计算量从O(n)次双线性对操作减少到O(1)次常量级双线性对操作,极大地降低了第三方审计者的计算开销。可见,所提方案适用于需要对大量工业云存储系统核心数据文件进行防篡改检测的轻量级批量审计场景。 展开更多
关键词 工业云存储 防篡改 同态数字签名 数据完整性 批量审计
在线阅读 下载PDF
基于UTXO模型区块链的众包物流可信身份认证模型 被引量:3
14
作者 李致远 吴越 +1 位作者 张威威 李沅格 《江苏大学学报(自然科学版)》 CAS 北大核心 2025年第1期57-63,共7页
针对现有集中式众包物流平台中用户身份数据存储与管理存在的隐私泄露和篡改问题,提出一种基于UTXO模型区块链的众包物流可信身份认证模型.该模型包括利用区块链技术实现身份注册、身份验证、身份撤销及身份认证.针对链上存储用户隐私... 针对现有集中式众包物流平台中用户身份数据存储与管理存在的隐私泄露和篡改问题,提出一种基于UTXO模型区块链的众包物流可信身份认证模型.该模型包括利用区块链技术实现身份注册、身份验证、身份撤销及身份认证.针对链上存储用户隐私数据风险的问题,采用混合加解密方案对链上个人信息做安全存储与分享;针对平台认证用户身份的问题,采用可信身份凭证以零知识证明方式登录众包物流平台.对身份信息以及认证进行安全性分析,并将该方法与LIU方法、LI方法的安全性能进行了对比.在Python3.9环境下完成试验,进行了身份信息加密和零知识身份认证测试分析.结果表明该方案的认证时延和处理事务能力均优于现有的SHAO方案. 展开更多
关键词 众包物流 区块链 身份管理 UTXO模型 可信身份认证 零知识证明
在线阅读 下载PDF
Quantum-Resilient Blockchain for Secure Digital Identity Verification in DeFi
15
作者 Ahmed I.Alutaibi 《Computers, Materials & Continua》 2025年第10期875-903,共29页
The rapid evolution of quantum computing poses significant threats to traditional cryptographic schemes,particularly in Decentralized Finance(DeFi)systems that rely on legacy mechanisms like RSA and ECDSA for digital ... The rapid evolution of quantum computing poses significant threats to traditional cryptographic schemes,particularly in Decentralized Finance(DeFi)systems that rely on legacy mechanisms like RSA and ECDSA for digital identity verification.This paper proposes a quantum-resilient,blockchain-based identity verification framework designed to address critical challenges in privacy preservation,scalability,and post-quantum security.The proposed model integrates Post-quantum Cryptography(PQC),specifically lattice-based cryptographic primitives,with Decentralized Identifiers(DIDs)and Zero-knowledge Proofs(ZKPs)to ensure verifiability,anonymity,and resistance to quantum attacks.A dual-layer architecture is introduced,comprising an identity layer for credential generation and validation,and an application layer for DeFi protocol integration.To evaluate its performance,the framework is tested on multiple real-world DeFi platforms using metrics such as verification latency,throughput,attack resistance,energy efficiency,and quantum attack simulation.The results demonstrate that the proposed framework achieves 90%latency reduction and over 35%throughput improvement compared to traditional blockchain identity solutions.It also exhibits a high quantum resistance score(95/100),with successful secure verification under simulated quantum adversaries.The revocation mechanism—implemented using Merkle-tree-based proofs—achieves average response times under 40 ms,and the system maintains secure operations with energy consumption below 9 J per authentication cycle.Additionally,the paper presents a security and cost tradeoff analysis using ZKP schemes such as Bulletproofs and STARKs,revealing superior bits-per-byte efficiency and reduced proof sizes.Real-world adoption scenarios,including integration with six major DeFi protocols,indicate a 25%increase in verified users and a 15%improvement in Total Value Locked(TVL).The proposed solution is projected to remain secure until 2041(basic version)and 2043(advanced version),ensuring long-term sustainability and future-proofing against evolving quantum threats.This work establishes a scalable,privacy-preserving identity model that aligns with emerging post-quantum security standards for decentralized ecosystems. 展开更多
关键词 Quantum-resistant cryptography decentralized identity DeFi blockchain zero-knowledge proofs post-quantum security lattice-based encryption
在线阅读 下载PDF
A lightweight dual authentication scheme for V2V communication in 6G-based vanets
16
作者 Xia Feng Yaru Wang +1 位作者 Kaiping Cui Liangmin Wang 《Digital Communications and Networks》 2025年第4期1224-1235,共12页
The advancement of 6G wireless communication technology has facilitated the integration of Vehicular Ad-hoc Networks(VANETs).However,the messages transmitted over the public channel in the open and dynamic VANETs are ... The advancement of 6G wireless communication technology has facilitated the integration of Vehicular Ad-hoc Networks(VANETs).However,the messages transmitted over the public channel in the open and dynamic VANETs are vulnerable to malicious attacks.Although numerous researchers have proposed authentication schemes to enhance the security of Vehicle-to-Vehicle(V2V)communication,most existing methodologies face two significant challenges:(1)the majority of the schemes are not lightweight enough to support realtime message interaction among vehicles;(2)the sensitive information like identity and position is at risk of being compromised.To tackle these issues,we propose a lightweight dual authentication protocol for V2V communication based on Physical Unclonable Function(PUF).The proposed scheme accomplishes dual authentication between vehicles by the combination of Zero-Knowledge Proof(ZKP)and MASK function.The security analysis proves that our scheme provides both anonymous authentication and information unlinkability.Additionally,the performance analysis demonstrates that the computation overhead of our scheme is approximately reduced 23.4% compared to the state-of-the-art schemes.The practical simulation conducted in a 6G network environment demonstrates the feasibility of 6G-based VANETs and their potential for future advancements. 展开更多
关键词 Vehicular ad-hoc network Identity authentication Physical unclonable function MASK function zero-knowledge proof 6G wireless communication technology
在线阅读 下载PDF
程序性事实观下刑事证据制度改革路径探究 被引量:1
17
作者 杨波 《法学论坛》 北大核心 2025年第1期27-38,共12页
程序性事实观是证据法与程序法关系的高度凝结,是一种理性的事实观,其能够打破结果性事实观的局限与束缚,为刑事证据制度的构建提供直接、有效的理论支撑。程序性事实观下,刑事证据制度的体系化重塑应首先明确“准确认定案件事实”的立... 程序性事实观是证据法与程序法关系的高度凝结,是一种理性的事实观,其能够打破结果性事实观的局限与束缚,为刑事证据制度的构建提供直接、有效的理论支撑。程序性事实观下,刑事证据制度的体系化重塑应首先明确“准确认定案件事实”的立法目的,进而以事实认定的准确性为核心,全面构建逻辑严谨、层次分明的证据规则体系以及理性科学的刑事诉讼证明制度。程序性事实观要求完善刑事诉讼程序,为事实证明活动的充分展开提供理想的程序空间。 展开更多
关键词 程序性事实观 事实 证据规则 证明制度
原文传递
中国小学数学六年级教材中的推理与证明 被引量:1
18
作者 徐彦辉 郑安妮 《数学教育学报》 北大核心 2025年第2期69-76,共8页
《义务教育数学课程标准(2022版)》中强调了推理与证明在小学数学中的重要性.应用Bieda等人的推理与证明任务分析框架,分析了人教版、北师大版、苏教版六年级教材中的推理与证明任务.研究发现:3版教材中的推理与证明任务较少,平均占比为... 《义务教育数学课程标准(2022版)》中强调了推理与证明在小学数学中的重要性.应用Bieda等人的推理与证明任务分析框架,分析了人教版、北师大版、苏教版六年级教材中的推理与证明任务.研究发现:3版教材中的推理与证明任务较少,平均占比为15.21%.通过对题目设计目的和类型的分析发现,小学数学教材试题在推理与证明活动的种类及在教材中所处的位置上存在差异,叙事部分和习题部分比其它部分的推理证明任务更多;推理与证明任务的目的分布失衡,评估观点的证明机会极少;推理与证明任务中引出观点的类型分布不均,非类属证明的练习机会极少,人教版与苏教版教材推理与证明任务中很少有提供合理解释的机会. 展开更多
关键词 数学教材 小学 推理与证明 教材分析 六年级
在线阅读 下载PDF
船联网上基于区块链的航行事件信息过滤方法 被引量:1
19
作者 汪洋 叶挺 +2 位作者 陈志强 王腾飞 吴兵 《控制与决策》 北大核心 2025年第1期148-154,共7页
船联网(internet of vehicle,IoS)是船舶信息交换的载体.基于区块链技术,在IoS上构建一种可信的信息交换机制,并提出相应的航行事件置信度计算与船舶信誉管理方案.该方案借鉴信息过滤的思想得到船舶综合相似度,利用加权熵值反向计算融... 船联网(internet of vehicle,IoS)是船舶信息交换的载体.基于区块链技术,在IoS上构建一种可信的信息交换机制,并提出相应的航行事件置信度计算与船舶信誉管理方案.该方案借鉴信息过滤的思想得到船舶综合相似度,利用加权熵值反向计算融合的评级,根据回应船舶评级偏离融合评级的程度更新回应船舶的信誉值;然后采用最小二乘法建立信誉值倒数与评级误差之间的拟合关系,从而得以更新报告船舶的信誉值;进一步设计基于船舶信誉值的DPoS(delegated proof of stake)共识机制,旨在优先选择信誉值较高的船舶作为见证者船舶,以保障系统出块环境的稳定性和高效性.结果显示,在船舶滥用行为占比为40%的情况下,航行事件真实性判定的准确率仍在75%以上.研究表明,所提出的方案不仅有效提高了航行事件真实性判定的准确率,还能识别恶意船舶并限制其滥用行为,从而保证IoS环境的安全和稳定. 展开更多
关键词 船联网 航行事件通告 区块链 信息过滤 信誉管理方案 DPoS共识机制
原文传递
基于信誉的委员会共识机制 被引量:1
20
作者 孙敏 焦世行 王晨燕 《计算机应用》 北大核心 2025年第1期170-177,共8页
授权股权证明(DPoS)作为主流共识机制的一种,选举过程耗时长、节点投票不积极和恶意节点难处理的核心问题制约着它的快速发展。针对上述问题,提出一种基于信誉的委员会共识机制——幸运信誉证明(PoLaC)。首先,将信誉值作为节点历史行为... 授权股权证明(DPoS)作为主流共识机制的一种,选举过程耗时长、节点投票不积极和恶意节点难处理的核心问题制约着它的快速发展。针对上述问题,提出一种基于信誉的委员会共识机制——幸运信誉证明(PoLaC)。首先,将信誉值作为节点历史行为的评估标准,并选择高信誉节点作为委员会成员,从而极大地简化选举流程;其次,引入幸运值概念来提高普通节点竞选成功的概率,从而激励普通节点参与网络共识;最后,采取延迟分叉的方式修正恶意节点的行为。实验结果表明,在共识通信量方面,投票意愿为50%时,PoLaC网络比DPoS网络的共识通信量少30%;在低权重节点收益方面,PoLaC网络的收益是DPoS的3倍;在委员会恶意节点占比方面,进入信誉稳定期的PoLaC网络的委员会恶意节点数约为DPoS的1/5;而相较于其他同类信誉共识机制,PoLaC在网络通信量、节点活跃度以及恶意节点处理方面均具有一定优势。 展开更多
关键词 区块链 共识机制 委员会共识 信誉选举 授权股权证明
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部