期刊文献+
共找到14,746篇文章
< 1 2 250 >
每页显示 20 50 100
Group Signature Based on Non-interactive Zero-Knowledge Proofs 被引量:2
1
作者 周福才 徐剑 +1 位作者 李慧 王兰兰 《China Communications》 SCIE CSCD 2011年第2期34-41,共8页
Non-Interactive Zero-Knowledge(NIZK for short) proofs are fascinating and extremely useful in many security protocols. In this paper,a new group signature scheme,decisional linear assumption group signature(DLAGS for ... Non-Interactive Zero-Knowledge(NIZK for short) proofs are fascinating and extremely useful in many security protocols. In this paper,a new group signature scheme,decisional linear assumption group signature(DLAGS for short) with NIZK proofs is proposed which can prove and sign the multiple values rather than individual bits based on DLIN assumption. DLAGS does not need to interact between the verifier and issuer,which can decrease the communication times and storage cost compared with the existing interactive group signature schemes. We prove and sign the blocks of messages instead of limiting the proved message to only one bit(0 or 1) in the conventional non-interactive zero-knowledge proof system,and we also prove that our scheme satisfy the property of anonymity,unlinkability and traceability. Finally,our scheme is compared with the other scheme(Benoitt's scheme) which is also based on the NIZK proofs system and the DLIN assumption,and the results show that our scheme requires fewer members of groups and computational times. 展开更多
关键词 group signature non-interactive zero-knowledge proofs commitment scheme groth-sahai proofs system
在线阅读 下载PDF
Block Verification Mechanism Based on Zero-Knowledge Proof in Blockchain
2
作者 Jin Wang Wei Ou +3 位作者 Osama Alfarraj Amr Tolba Gwang-Jun Kim Yongjun Ren 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1805-1819,共15页
Since transactions in blockchain are based on public ledger verification,this raises security concerns about privacy protection.And it will cause the accumulation of data on the chain and resulting in the low efficien... Since transactions in blockchain are based on public ledger verification,this raises security concerns about privacy protection.And it will cause the accumulation of data on the chain and resulting in the low efficiency of block verification,when the whole transaction on the chain is verified.In order to improve the efficiency and privacy protection of block data verification,this paper proposes an efficient block verification mechanism with privacy protection based on zeroknowledge proof(ZKP),which not only protects the privacy of users but also improves the speed of data block verification.There is no need to put the whole transaction on the chain when verifying block data.It just needs to generate the ZKP and root hash with the transaction information,then save them to the smart contract for verification.Moreover,the ZKP verification in smart contract is carried out to realize the privacy protection of the transaction and efficient verification of the block.When the data is validated,the buffer accepts the complete transaction,updates the transaction status in the cloud database,and packages up the chain.So,the ZKP strengthens the privacy protection ability of blockchain,and the smart contracts save the time cost of block verification. 展开更多
关键词 Blockchain privacy protection zero-knowledge proof smart contract
在线阅读 下载PDF
Privacy-preserving analytics for the securitization market: a zero-knowledge distributed ledger technology application 被引量:1
3
作者 Sophie Meralli 《Financial Innovation》 2020年第1期129-148,共20页
A zero-knowledge proof or protocol is a cryptographic technique for verifying private data without revealing it in its clear form.In this paper,we evaluate the potential for zero-knowledge distributed ledger technolog... A zero-knowledge proof or protocol is a cryptographic technique for verifying private data without revealing it in its clear form.In this paper,we evaluate the potential for zero-knowledge distributed ledger technology to alleviate asymmetry of information in the asset-backed securitization market.To frame this inquiry,we conducted market data analyses,a review of prior literature,stakeholder interviews with investors,originators and security issuers and collaboration with blockchain engineers and researchers.We introduce a new system which could enable all market participants in the securitization lifecycle(e.g.investors,rating agencies,regulators and security issuers)to interact on a unique decentralized platform while maintaining the privacy of loan-level data,therefore providing the industry with timely analytics and performance data.Our platform is powered by zkLedger(Narula et al.2018),a zero-knowledge protocol developed by the MIT Media Lab and the first system that enables participants of a distributed ledger to run publicly verifiable analytics on masked data. 展开更多
关键词 Structured finance SECURITIZATION Blockchain zero-knowledge proofs Distributed ledger technology PRIVACY Data analytics
在线阅读 下载PDF
Comments and Research on Proofs of Chain Rule 被引量:1
4
作者 张通 《Chinese Quarterly Journal of Mathematics》 CSCD 2001年第3期100-104,共5页
In this paper we point out that the proofs of Chain Rule in many intensively used textbooks are not strict an construct anexa mple of a composite function f(u) which is differentiable with respects t o the independe... In this paper we point out that the proofs of Chain Rule in many intensively used textbooks are not strict an construct anexa mple of a composite function f(u) which is differentiable with respects t o the independednt variable u, but is not differentiable with respect to the dependent variable u=g(x). A strict proof of Chain Rule is presented. Incon sistency of the form and content of Chain Rule is disclosed. 展开更多
关键词 Chain Rule proof unstrict
在线阅读 下载PDF
Blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection 被引量:3
5
作者 Yiting Huang Yong Yua +2 位作者 Huilin Li Yannan Li Aikui Tian 《Digital Communications and Networks》 SCIE CSCD 2022年第5期604-613,共10页
The cloud computing technology has emerged,developed,and matured in recent years,consequently commercializing remote outsourcing storage services.An increasing number of companies and individuals have chosen the cloud... The cloud computing technology has emerged,developed,and matured in recent years,consequently commercializing remote outsourcing storage services.An increasing number of companies and individuals have chosen the cloud to store their data.However,accidents,such as cloud server downtime,cloud data loss,and accidental deletion,are serious issues for some applications that need to run around the clock.For some mission and business-critical applications,the continuous availability of outsourcing storage services is also necessary to protect users'outsourced data during downtime.Nevertheless,ensuring the continuous availability of data in public cloud data integrity auditing protocols leads to data privacy issues because auditors can obtain the data content of users by a sufficient number of storage proofs.Therefore,protecting data privacy is a burning issue.In addition,existing data integrity auditing schemes that rely on semi-trusted third-party auditors have several security problems,including single points of failure and performance bottlenecks.To deal with these issues,we propose herein a blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection.We realize a concrete construction by using a verifiable delay function with high efficiency and proof of retrievability,and prove the security of the proposal in a random oracle model.The proposed construction supports dynamic updates for the outsourced data.We also design smart contracts to ensure fairness among the parties involved.Finally,we implement the protocols,and the experimental results demonstrate the efficiency of the proposed protocol. 展开更多
关键词 Continuous availability Verifiable delay function zero-knowledge privacy Blockchain
在线阅读 下载PDF
Game-Based Automated Security Proofs for Cryptographic Protocols 被引量:1
6
作者 顾纯祥 光焱 祝跃飞 《China Communications》 SCIE CSCD 2011年第4期50-57,共8页
Provable security has become a popular approach for analyzing the security of cryptographic protocols.However,writing and verifying proofs by hand are prone to errors.This paper advocates the automatic security proof ... Provable security has become a popular approach for analyzing the security of cryptographic protocols.However,writing and verifying proofs by hand are prone to errors.This paper advocates the automatic security proof framework with sequences of games.We make slight modifications to Blanchet's calculus to make it easy for parsing the initial game.The main contribution of this work is that it introduces algebraic properties with observational equivalences to automatic security proofs,and thus can deal with some practical cryptographic schemes with hard problems.We illustrate the use of algebraic properties in the framework by proving the semantic security of the ElGamal encryption scheme. 展开更多
关键词 cryptographic protocols probable security automatic security proof process calculus
在线阅读 下载PDF
Precise Zero-Knowledge Arguments with Poly-logarithmic Efficiency
7
作者 丁宁 谷大武 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第5期584-589,共6页
Precise zero-knowledge was introduced by Micali and Pass in STOC06. This notion captures the idea that the view of a verifier can be reconstructed in almost same time. Following the notion, they constructed some preci... Precise zero-knowledge was introduced by Micali and Pass in STOC06. This notion captures the idea that the view of a verifier can be reconstructed in almost same time. Following the notion, they constructed some precise zero-knowledge proofs and arguments, in which the communicated messages are polynomial bits. In this paper, we employ the new simulation technique introduced by them to provide a precise simulator for a modified Kilian's zero-knowledge arguments with poly-logarithmic efficiency (this modification addressed by Rosen), and as a result we show this protocol is a precise zero-knowledge argument with poly-logaxithmic efficiency. We also present an alternative construction of the desired protocols. 展开更多
关键词 CRYPTOGRAPHY zero-knowledge precise zero-knowledge
原文传递
On Sequential Composition of Precise Zero-Knowledge
8
作者 丁宁 谷大武 《Journal of Shanghai Jiaotong university(Science)》 EI 2010年第1期43-48,共6页
Precise zero-knowledge was introduced by Micali and Pass in STOC'06.This notion captures the idea that the view of any verifier in interaction can be reconstructed in almost time.Pass also obtained a sequential co... Precise zero-knowledge was introduced by Micali and Pass in STOC'06.This notion captures the idea that the view of any verifier in interaction can be reconstructed in almost time.Pass also obtained a sequential composition lemma for precise zero-knowledge protocols.However,this lemma doesn't provide tight precisions for composed protocols.In this paper we further obtain a sequential composition lemma for a subclass of precise zero-knowledge protocols,which all satisfy a property:their simulators use the code of verifier in almost the black-box way.We call such subclass emulated black-box zero-knowledge protocols.Our lemma provides better precisions for sequential composition of such protocols. 展开更多
关键词 CRYPTOGRAPHY zero-knowledge precise zero-knowledge
原文传递
Area inside a Circle: Intuitive and Rigorous Proofs
9
作者 Vali Siadat 《American Journal of Computational Mathematics》 2017年第1期102-108,共7页
In this article I conduct a short review of the proofs of the area inside a circle. These include intuitive as well as rigorous analytic proofs. This discussion is important not just from mathematical view point but a... In this article I conduct a short review of the proofs of the area inside a circle. These include intuitive as well as rigorous analytic proofs. This discussion is important not just from mathematical view point but also because pedagogically the calculus books still use circular reasoning today to prove the area inside a circle (also that of an ellipse) on this important historical topic, first illustrated by Archimedes. I offer an innovative approach through the introduction of a theorem, which will lead to proving the area inside a circle avoiding circular argumentation. 展开更多
关键词 Area Circle ELLIPSE CIRCULAR REASONING Intuitive proof Rigorous proof
在线阅读 下载PDF
Constructive Proofs of the Brouwer Type Coincidence Theorems
10
作者 刘文斌 史少云 黄庆道 《Northeastern Mathematical Journal》 CSCD 2000年第1期36-40,共5页
This note gives constructive proofs of the Brouwer type coincidence theorems via the homotopy method.
关键词 Brouwer type coincidence theorem constructive proof homotopy method
在线阅读 下载PDF
Dynamic Proofs of Retrievability Based on Partitioning-Based Square Root Oblivious RAM
11
作者 Jian Xu Zhihao Jiang +2 位作者 Andi Wang Chen Wang Fucai Zhou 《Computers, Materials & Continua》 SCIE EI 2018年第12期589-602,共14页
With the development of cloud storage,the problem of efficiently checking and proving data integrity needs more consideration.Therefore,much of growing interest has been pursed in the context of the integrity verifica... With the development of cloud storage,the problem of efficiently checking and proving data integrity needs more consideration.Therefore,much of growing interest has been pursed in the context of the integrity verification of cloud storage.Provable data possession(PDP)and Proofs of retrievablity(POR)are two kinds of important scheme which can guarantee the data integrity in the cloud storage environments.The main difference between them is that POR schemes store a redundant encoding of the client data on the server so as to she has the ability of retrievablity while PDP does not have.Unfortunately,most of POR schemes support only static data.Stefanov et al.proposed a dynamic POR,but their scheme need a large of amount of client storage and has a large audit cost.Cash et al.use Oblivious RAM(ORAM)to construct a fully dynamic POR scheme,but the cost of their scheme is also very heavy.Based on the idea which proposed by Cash,we propose dynamic proofs of retrievability via Partitioning-Based Square Root Oblivious RAM(DPoR-PSR-ORAM).Firstly,the notions used in our scheme are defined.The Partitioning-Based Square Root Oblivious RAM(PSR-ORAM)protocol is also proposed.The DPOR-PSR-ORAM Model which includes the formal definitions,security definitions and model construction methods are described in the paper.Finally,we give the security analysis and efficiency analysis.The analysis results show that our scheme not only has the property of correctness,authenticity,next-read pattern hiding and retrievabiltiy,but also has the high efficiency. 展开更多
关键词 Cloud storage proofs of retrievability partitioning framework oblivious RAM
在线阅读 下载PDF
A Novel Approach to Estimating Proof Test Coverage for Emergency Shutdown Valves using a Fuzzy Inference System
12
作者 Steve Kriescher Roderick Thomas +2 位作者 Chris Phillips Neil Mac Parthaláin David J.Smith 《Journal of Dynamics, Monitoring and Diagnostics》 2025年第1期44-52,共9页
Published proof test coverage(PTC)estimates for emergency shutdown valves(ESDVs)show only moderate agreement and are predominantly opinion-based.A Failure Modes,Effects,and Diagnostics Analysis(FMEDA)was undertaken us... Published proof test coverage(PTC)estimates for emergency shutdown valves(ESDVs)show only moderate agreement and are predominantly opinion-based.A Failure Modes,Effects,and Diagnostics Analysis(FMEDA)was undertaken using component failure rate data to predict PTC for a full stroke test and a partial stroke test.Given the subjective and uncertain aspects of the FMEDA approach,specifically the selection of component failure rates and the determination of the probability of detecting failure modes,a Fuzzy Inference System(FIS)was proposed to manage the data,addressing the inherent uncertainties.Fuzzy inference systems have been used previously for various FMEA type assessments,but this is the first time an FIS has been employed for use with FMEDA.ESDV PTC values were generated from both the standard FMEDA and the fuzzy-FMEDA approaches using data provided by FMEDA experts.This work demonstrates that fuzzy inference systems can address the subjectivity inherent in FMEDA data,enabling reliable estimates of ESDV proof test coverage for both full and partial stroke tests.This facilitates optimized maintenance planning while ensuring safety is not compromised. 展开更多
关键词 emergency shutdown valves failure modes effects diagnostics analysis fuzzy inference systems proof test coverage
在线阅读 下载PDF
格上基于零知识证明的可追踪环签名方案
13
作者 孟慧 桑梓鑫 +1 位作者 汤永利 闫玺玺 《重庆邮电大学学报(自然科学版)》 北大核心 2026年第1期49-57,共9页
针对目前格上环签名方案在环成员数量较多的情况下,签名效率低下且签名尺寸和公钥尺寸过大的问题,基于零知识证明,使用E-MLWE(extended module learning with errors)和MSIS(module short interger solution)问题降低了公钥大小,结合拒... 针对目前格上环签名方案在环成员数量较多的情况下,签名效率低下且签名尺寸和公钥尺寸过大的问题,基于零知识证明,使用E-MLWE(extended module learning with errors)和MSIS(module short interger solution)问题降低了公钥大小,结合拒绝采样算法和追踪机制设计了一种可追踪环签名方案,签名算法中使用递归算法压缩了承诺的大小,进一步降低了签名尺寸,在随机预言机模型下证明方案满足可链接性、匿名性和抗陷害性。性能分析表明,签名尺寸与环成员数量为对数大小关系,在环成员数量较多时,公钥的存储开销和签名的通信开销具有明显优势。 展开更多
关键词 环签名 递归 格密码 零知识证明
在线阅读 下载PDF
论知识产权侵权诉讼中合法来源抗辩的证明
14
作者 王超 《法律科学(西北政法大学学报)》 北大核心 2026年第1期178-189,共12页
知识产权侵权诉讼中合法来源抗辩得到支持的比例明显偏低,症结在于法院为被告设定了过重的证明责任。合法来源抗辩旨在对抗过错要件的成立,其中“不知道产品侵权”是被告对过错的否认,“产品有合法来源”则是被告为否认所附的理由。合... 知识产权侵权诉讼中合法来源抗辩得到支持的比例明显偏低,症结在于法院为被告设定了过重的证明责任。合法来源抗辩旨在对抗过错要件的成立,其中“不知道产品侵权”是被告对过错的否认,“产品有合法来源”则是被告为否认所附的理由。合法来源抗辩并非实体法中的独立抗辩事由,也不是程序法中的抗辩,被告毋庸承担过错要件的证明责任。被告主张合法来源抗辩,实为履行民事诉讼法上的事案解明义务,其履行前提是原告的主张已趋具体化,履行形式是合理说明“不知道产品侵权”并举证证明“产品有合法来源”,不履行的后果是遭受事实层面的不利认定。伴随我国知识产权保护环境持续向好,合法来源抗辩亟需回归过错证明的本旨,为市场主体提供最佳的证据法激励。 展开更多
关键词 知识产权侵权 合法来源抗辩 过错 证明责任 事案解明义务
原文传递
论海上货物运输法上的举证责任
15
作者 傅廷中 余俊达 《大连海事大学学报(社会科学版)》 2026年第1期14-28,共15页
海上货物运输发生货损时,船货双方往往难以提供有说服力的证据完成举证,法院只得转而依据举证责任进行判断。因此,海上货物运输法上的举证责任引发学界关注,并产生争议。海上货物运输法上举证责任的相关规定散见于海商法的不同部分,亟... 海上货物运输发生货损时,船货双方往往难以提供有说服力的证据完成举证,法院只得转而依据举证责任进行判断。因此,海上货物运输法上的举证责任引发学界关注,并产生争议。海上货物运输法上举证责任的相关规定散见于海商法的不同部分,亟待推敲并进行理论构建。举证责任问题并非仅在中国出现,英、美两国围绕举证责任均积累了可供参考的经验。海上货物运输法上的举证责任,其实质在于平衡船货双方的利益。对此,可以借助利益衡量理论,兼顾海上货物运输法和举证责任的制度价值,合理分配船货双方的举证责任。 展开更多
关键词 海上货物运输 举证责任 货损 利益衡量
在线阅读 下载PDF
基于极限状态法的锻钢吊钩能力验证实例研究
16
作者 李军 《机械管理开发》 2026年第2期1-4,7,共5页
依据GB/T 41676—2022《起重机设计通则锻钢吊钩的极限状态和能力验证》标准,以50号锻钢吊钩为例,阐述其设计计算与能力验证的关键过程。重点解析吊钩钩柄及钩身危险截面的惯性矩计算方法,系统验证其静强度与疲劳强度。研究充分证明极... 依据GB/T 41676—2022《起重机设计通则锻钢吊钩的极限状态和能力验证》标准,以50号锻钢吊钩为例,阐述其设计计算与能力验证的关键过程。重点解析吊钩钩柄及钩身危险截面的惯性矩计算方法,系统验证其静强度与疲劳强度。研究充分证明极限状态法在起重机关键部件设计中的精确性与可靠性,为吊钩的非标设计提供实施实例。 展开更多
关键词 锻钢吊钩 极限状态法 能力验证
在线阅读 下载PDF
防寒靴热湿舒适性能的主客观综合评测试点研究
17
作者 弓太生 李文博 +3 位作者 杜美娴 吴婷 周素静 刘世超 《皮革科学与工程》 北大核心 2026年第1期80-87,共8页
【目的】为探究防寒靴整鞋热湿舒适性及鞋帮材料、环境温度对防寒靴热湿舒适性的影响。【方法】使用气候仓模拟0、-5和-10°C三个温度条件,用传感器测量两款防寒靴鞋腔的温度和相对湿度,同时分别采用四点和七点强度等级量表进行闷... 【目的】为探究防寒靴整鞋热湿舒适性及鞋帮材料、环境温度对防寒靴热湿舒适性的影响。【方法】使用气候仓模拟0、-5和-10°C三个温度条件,用传感器测量两款防寒靴鞋腔的温度和相对湿度,同时分别采用四点和七点强度等级量表进行闷湿感和热暖感评价。【结果】在三种环境温度下,气凝胶防寒靴各部位的温度都高于17防寒靴2~4°C。气凝胶防寒靴的相对湿度略高于17防寒靴,17防寒靴的平均吸湿量高于气凝胶防寒靴1.39 g。气凝胶防寒靴的热湿舒适性主观评价优于17防寒靴。【结论】气凝胶保温棉可提高鞋靴的保温性能、减轻鞋靴质量。低温环境下Coolmax做内里材料仍有较好的吸湿排汗能力,可提高防寒靴的湿舒适性能。在防寒靴的热湿舒适性测评中,受试者对潮湿和足部不适的感知与高排汗部位并不对应。 展开更多
关键词 防寒靴 热湿舒适性 鞋腔内温湿度 气候仓 主客观评价 革制品
原文传递
A Blockchain-Based Efficient Verification Scheme for Context Semantic-Aware Ciphertext Retrieval
18
作者 Haochen Bao Lingyun Yuan +2 位作者 Tianyu Xie Han Chen Hui Dai 《Computers, Materials & Continua》 2026年第1期550-579,共30页
In the age of big data,ensuring data privacy while enabling efficient encrypted data retrieval has become a critical challenge.Traditional searchable encryption schemes face difficulties in handling complex semantic q... In the age of big data,ensuring data privacy while enabling efficient encrypted data retrieval has become a critical challenge.Traditional searchable encryption schemes face difficulties in handling complex semantic queries.Additionally,they typically rely on honest but curious cloud servers,which introduces the risk of repudiation.Furthermore,the combined operations of search and verification increase system load,thereby reducing performance.Traditional verification mechanisms,which rely on complex hash constructions,suffer from low verification efficiency.To address these challenges,this paper proposes a blockchain-based contextual semantic-aware ciphertext retrieval scheme with efficient verification.Building on existing single and multi-keyword search methods,the scheme uses vector models to semantically train the dataset,enabling it to retain semantic information and achieve context-aware encrypted retrieval,significantly improving search accuracy.Additionally,a blockchain-based updatable master-slave chain storage model is designed,where the master chain stores encrypted keyword indexes and the slave chain stores verification information generated by zero-knowledge proofs,thus balancing system load while improving search and verification efficiency.Finally,an improved non-interactive zero-knowledge proof mechanism is introduced,reducing the computational complexity of verification and ensuring efficient validation of search results.Experimental results demonstrate that the proposed scheme offers stronger security,balanced overhead,and higher search verification efficiency. 展开更多
关键词 Searchable encryption blockchain context semantic awareness zero-knowledge proof
在线阅读 下载PDF
CPM4DA:基于双向拍卖的防串谋机制研究
19
作者 李雪林 柳絮 +1 位作者 张健 孙玉坤 《南京师大学报(自然科学版)》 北大核心 2026年第1期83-95,共13页
双向拍卖是各类系统中极具效力的激励机制.然而,现有双向拍卖研究主要聚焦于设计仅涉及买方或卖方单侧的防串谋机制,未能充分应对买卖双方联合串谋的场景,影响资源分配结果的公平性.为此,本文先深入剖析双向拍卖中参与者(买卖双方)的串... 双向拍卖是各类系统中极具效力的激励机制.然而,现有双向拍卖研究主要聚焦于设计仅涉及买方或卖方单侧的防串谋机制,未能充分应对买卖双方联合串谋的场景,影响资源分配结果的公平性.为此,本文先深入剖析双向拍卖中参与者(买卖双方)的串谋动机,并把串谋策略定义为提升联盟内参与者效用的同时降低联盟外参与者效用的行为.基于这一视角,本文以优化资源分配为核心目标,设计了面向双向拍卖的防串谋(Collusion Proof Mechanism for Double Auctions,CPM4DA)机制,旨在降低市场参与者的串谋概率,保障资源分配公平性.通过理论分析与证明,CPM4DA机制满足防串谋性、激励相容性、个体理性和弱预算平衡等关键博弈属性.此外,本文在频谱市场中开展仿真实验,将CPM4DA机制与现有防串谋机制进行性能对比.结果表明,CPM4DA在支付系数一致性、分配效率和防串谋性方面表现优异,能够提升市场定价公平性,降低参与者的串谋动机.本文研究成果为双向拍卖中防串谋机制的研发奠定了理论与技术基础. 展开更多
关键词 机制设计 双向拍卖 系统激励 防串谋 公平交易
在线阅读 下载PDF
人工智能时代刑事程序正义理论的挑战与革新
20
作者 周洪波 张骋 《西华大学学报(哲学社会科学版)》 2026年第1期1-10,共10页
针对传统刑事程序正义理论在人工智能时代所面临的挑战和凸显的局限,当前学界提出了以“技术规制”为核心的“技术性程序正义”理论予以回应。该理论虽然关注到了纠正司法偏见的核心维度,但仍未形成整全妥当的理论。人工智能时代刑事诉... 针对传统刑事程序正义理论在人工智能时代所面临的挑战和凸显的局限,当前学界提出了以“技术规制”为核心的“技术性程序正义”理论予以回应。该理论虽然关注到了纠正司法偏见的核心维度,但仍未形成整全妥当的理论。人工智能时代刑事诉讼的典型特征表现为:一方面,案件证据生成的数据化和诉讼证明的智能辅助化,呈现出明显的技术化、客观化特征;另一方面,技术化并未完全克服受到人的主观性因素的影响,诉讼证明仍然具有一定的或然性特征。因此,为实现合理认定案件事实,刑事程序正义理论应当兼顾“技术认知”与“常情常理判断”展开程序规范回应。在新的刑事程序正义理论中,完善专家辅助人制度、引入对智能辅助决策系统结论的常情常理审查、强化法官庭外调查主观能动性与落实合议制多数决制等,具有关键意义。 展开更多
关键词 人工智能 程序正义 证明标准 诉讼证明
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部