期刊文献+
共找到143,305篇文章
< 1 2 250 >
每页显示 20 50 100
新型倒置A^(2)/O耦联MBR组合工艺处理农村低C/N废水的研究
1
作者 韩卫萍 盖磊 《水处理技术》 CAS 北大核心 2025年第1期114-119,共6页
针对农村低C/N污水污染物和营养盐去除率差的问题,以倒置A^(2)/O耦联膜生物反应器(MBR)组合工艺为探究对象,通过控制进水污染物浓度,在中温条件下考察了有机负荷(OLR)对倒置A^(2)/O耦联MBR组合工艺处理农村低C/N污水的影响。结果表明,OL... 针对农村低C/N污水污染物和营养盐去除率差的问题,以倒置A^(2)/O耦联膜生物反应器(MBR)组合工艺为探究对象,通过控制进水污染物浓度,在中温条件下考察了有机负荷(OLR)对倒置A^(2)/O耦联MBR组合工艺处理农村低C/N污水的影响。结果表明,OLR由150 mg/L提高至450 mg/L时,总氮(TN)和溶解性磷酸盐(SOP)去除率分别由67.6%和86.6%提高至72.4%和94.3%,进一步提高OLR降低了组合工艺对污染物和营养盐的去除。此外,OLR能影响新工艺内污泥特征,提高OLR促进了胞外聚合物(EPS)分泌,尤其在OLR为600 mg/L组别内,EPS含量提高至139.6 mg/g。进水OLR对缺氧池内EPS的影响要大于其对厌氧池内EPS的影响。OLR能影响新工艺内污染物和营养盐去除相关关键酶的活性,当OLR为450 mg/L时,污染物和营养盐去除相关关键活性酶最强。研究结果为农村低C/N污水的高效处理提供了理论依据和数据支撑。 展开更多
关键词 农村低C/N污水 倒置A^(2)/o MBR 胞外聚合物 关键酶
下载PDF
倒置A^(2)/O+A生化法+膜法+磁混凝法污水处理工程实例
2
作者 计建洪 耿学坚 +2 位作者 王丽聪 杭彩云 庄惠生 《印染》 北大核心 2025年第1期64-67,共4页
采用“倒置A^(2)/O+A生化法+膜法+磁混凝物化法”组合工艺处理污水,分析了工艺特点,并详述了主要构筑物及设备参数。该组合工艺处理效果优良,除磷脱氮效果好,出水COD、TP、NH_(3)-N、TN月均值分别为28、0.2、0.3、6.06mg/L,达到了DB32/1... 采用“倒置A^(2)/O+A生化法+膜法+磁混凝物化法”组合工艺处理污水,分析了工艺特点,并详述了主要构筑物及设备参数。该组合工艺处理效果优良,除磷脱氮效果好,出水COD、TP、NH_(3)-N、TN月均值分别为28、0.2、0.3、6.06mg/L,达到了DB32/1072—2018《太湖地区城镇污水处理厂及重点工业行业主要水污染物排放限值》其他区域污染物排放标准,其中COD、TP和NH_(3)-N三个指标达到了GB3838—2002《地表水环境质量标准》Ⅳ类水排放标准。 展开更多
关键词 废水处理 倒置A^(2)/o 除磷脱氮 磁混凝沉淀 膜法
下载PDF
谈汉语拼音的字母“o”和元音“o”
3
作者 石锋 《常熟理工学院学报》 2025年第1期32-35,64,共5页
本文从八个方面讨论汉语拼音中“o”的读音,以把字母“o”和元音“o”区分开来。一、制定《汉语拼音方案》有语音学原则、文字学原则和兼顾传统的做法。二、普通话基础音系没有“o”元音音位。三、汉语拼音中的字母“o”有三种不同的发... 本文从八个方面讨论汉语拼音中“o”的读音,以把字母“o”和元音“o”区分开来。一、制定《汉语拼音方案》有语音学原则、文字学原则和兼顾传统的做法。二、普通话基础音系没有“o”元音音位。三、汉语拼音中的字母“o”有三种不同的发音。四、中国学生的语音直觉就是“bo、duo”的韵母相同。五、教外国学生汉语拼音时要注意说明并操练字母“o”在不同条件下的实际发音。六、语文字典可以兼顾韵母“o”的读音和叹词“喔”的规范。七、可以适当编制相应的使用说明以妥善处理《汉语拼音方案》使用中的问题。八、建议完善《汉语拼音方案》,以便更好地发挥汉语拼音的作用。 展开更多
关键词 汉语拼音 字母“o 元音“o 语音学原则 文字学原则
下载PDF
Multi-dimensional multiplexing optical secret sharing framework with cascaded liquid crystal holograms 被引量:3
4
作者 Keyao Li Yiming Wang +6 位作者 Dapu Pi Baoli Li Haitao Luan Xinyuan Fang Peng Chen Yanqing Lu Min Gu 《Opto-Electronic Advances》 SCIE EI CAS CSCD 2024年第1期28-35,共8页
Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since... Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since the amount of available information channels is limited.Herein,we propose and demonstrate an optical secret sharing framework based on the multi-dimensional multiplexing liquid crystal(LC)holograms.The LC holograms are used as spatially separated shares to carry secret images.The polarization of the incident light and the distance between different shares are served as secret keys,which can significantly improve the information security and capacity.Besides,the decryption condition is also restricted by the applied external voltage due to the variant diffraction efficiency,which further increases the information security.In implementation,an artificial neural network(ANN)model is developed to carefully design the phase distribution of each LC hologram.With the advantage of high security,high capacity and simple configuration,our optical secret sharing framework has great potentials in optical encryption and dynamic holographic display. 展开更多
关键词 holographic encryption optical secret sharing cascaded liquid crystal hologram multi-dimensional multiplexing
下载PDF
基于改进K-means算法的室内可见光通信O-OFDM系统信道均衡技术
5
作者 贾科军 连江龙 +1 位作者 张常瑞 蔺莹 《电讯技术》 北大核心 2025年第1期96-102,共7页
在室内可见光通信中符号间干扰和噪声会严重影响系统性能,K均值(K-means)均衡方法可以抑制光无线信道的影响,但其复杂度较高,且在聚类边界处易出现误判。提出了改进聚类中心点的K-means(Improved Center K-means,IC-Kmeans)算法,通过随... 在室内可见光通信中符号间干扰和噪声会严重影响系统性能,K均值(K-means)均衡方法可以抑制光无线信道的影响,但其复杂度较高,且在聚类边界处易出现误判。提出了改进聚类中心点的K-means(Improved Center K-means,IC-Kmeans)算法,通过随机生成足够长的训练序列,然后将训练序列每一簇的均值作为K-means聚类中心,避免了传统K-means反复迭代寻找聚类中心。进一步,提出了基于神经网络的IC-Kmeans(Neural Network Based IC-Kmeans,NNIC-Kmeans)算法,使用反向传播神经网络将接收端二维数据映射至三维空间,以增加不同簇之间混合数据的距离,提高了分类准确性。蒙特卡罗误码率仿真表明,IC-Kmeans均衡和传统K-means算法的误码率性能相当,但可以显著降低复杂度,特别是在信噪比较小时。同时,在室内多径信道模型下,与IC-Kmeans和传统Kmeans均衡相比,NNIC-Kmeans均衡的光正交频分复用系统误码率性能最好。 展开更多
关键词 可见光通信 光正交频分复用 多径信道 信道均衡 K-means算法 反向传播神经网络
下载PDF
Low-Cost Federated Broad Learning for Privacy-Preserved Knowledge Sharing in the RIS-Aided Internet of Vehicles 被引量:1
6
作者 Xiaoming Yuan Jiahui Chen +4 位作者 Ning Zhang Qiang(John)Ye Changle Li Chunsheng Zhu Xuemin Sherman Shen 《Engineering》 SCIE EI CAS CSCD 2024年第2期178-189,共12页
High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency... High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency of local data learning models while preventing privacy leakage in a high mobility environment.In order to protect data privacy and improve data learning efficiency in knowledge sharing,we propose an asynchronous federated broad learning(FBL)framework that integrates broad learning(BL)into federated learning(FL).In FBL,we design a broad fully connected model(BFCM)as a local model for training client data.To enhance the wireless channel quality for knowledge sharing and reduce the communication and computation cost of participating clients,we construct a joint resource allocation and reconfigurable intelligent surface(RIS)configuration optimization framework for FBL.The problem is decoupled into two convex subproblems.Aiming to improve the resource scheduling efficiency in FBL,a double Davidon–Fletcher–Powell(DDFP)algorithm is presented to solve the time slot allocation and RIS configuration problem.Based on the results of resource scheduling,we design a reward-allocation algorithm based on federated incentive learning(FIL)in FBL to compensate clients for their costs.The simulation results show that the proposed FBL framework achieves better performance than the comparison models in terms of efficiency,accuracy,and cost for knowledge sharing in the IoV. 展开更多
关键词 Knowledge sharing Internet of Vehicles Federated learning Broad learning Reconfigurable intelligent surfaces Resource allocation
下载PDF
A Blind Batch Encryption and Public Ledger-Based Protocol for Sharing Sensitive Data 被引量:1
7
作者 Zhiwei Wang Nianhua Yang +2 位作者 Qingqing Chen Wei Shen Zhiying Zhang 《China Communications》 SCIE CSCD 2024年第1期310-322,共13页
For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and all... For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks. 展开更多
关键词 blind batch encryption data sharing onetime adaptive access public ledger security and privacy
下载PDF
大学生信息成瘾行为的触发路径与干预策略:基于S-O-R理论视角
8
作者 张晨 姜为翰 钱鹏博 《科技情报研究》 2025年第1期118-130,共13页
[目的/意义]文章以大学生为研究对象,探究该群体信息成瘾行为的影响机制,为大学生信息成瘾行为的预防和管理提供价值参考。[方法/过程]引入刺激-机体-反应(S-O-R)理论,利用文献梳理总结大学生信息成瘾过程中的外部刺激,深度剖析机体在... [目的/意义]文章以大学生为研究对象,探究该群体信息成瘾行为的影响机制,为大学生信息成瘾行为的预防和管理提供价值参考。[方法/过程]引入刺激-机体-反应(S-O-R)理论,利用文献梳理总结大学生信息成瘾过程中的外部刺激,深度剖析机体在成瘾过程中产生的认知心理,构建大学生信息成瘾行为理论模型,运用结构方程模型实证分析大学生信息成瘾的触发路径。[结果/结论]研究结果表明,信息过载、间歇性奖励和行为管理会显著正向影响大学生的不确定性回避,进而导致大学生信息成瘾。同时,信息过载也会使大学生产生信息焦虑,信息焦虑显著正向影响大学生信息成瘾行为。面向高等院校、大学生群体和科技企业,提出针对性建议与对策,有助于完善高等院校管理体系,促进学生适应信息化环境,推动高等教育事业更好发展。 展开更多
关键词 信息成瘾 S-o-R理论 结构方程模型 干预策略
下载PDF
典型污水处理工艺中N_(2)O排放特征差异及机制
9
作者 陈慧玲 齐鲁 +7 位作者 陈加波 夏智恒 李乾岗 敖梓鼎 姜昭 张彤彤 王洪臣 刘国华 《中国环境科学》 北大核心 2025年第2期718-726,共9页
主要对比了SBR和AAO这两类典型污水处理工艺中N_(2)O的排放特征,并分析引起差异的机制.结果表明,按照SBR的总氮去除量计算的N_(2)O排放因子为2.36%,比AAO高1.92倍.其中好氧段为两种工艺中N_(2)O产生的主要阶段,占总产生量的90%以上.间... 主要对比了SBR和AAO这两类典型污水处理工艺中N_(2)O的排放特征,并分析引起差异的机制.结果表明,按照SBR的总氮去除量计算的N_(2)O排放因子为2.36%,比AAO高1.92倍.其中好氧段为两种工艺中N_(2)O产生的主要阶段,占总产生量的90%以上.间歇运行的SBR工艺相较于连续运行的AAO工艺,低DO时间占比更久,在好氧运行开始时会发生NH_(4)^(+)-N浓度的突增,且存在NO_(2)^(-)-N的高浓度积累.微生物菌群结构及酶活性分析显示了SBR工艺的硝化细菌AOB/NOB比值及NOR活性分别为AAO工艺的1.7倍和1.4倍,进一步促进好氧阶段AOB介导的硝化反硝化途径产生更多的N_(2)O,这是SBR具有高N_(2)O排放因子的本质原因. 展开更多
关键词 污水处理 N_(2)o AAo SBR 排放特征 机制
下载PDF
A New Double Layer Multi-Secret Sharing Scheme
10
作者 Elavarasi Gunasekaran Vanitha Muthuraman 《China Communications》 SCIE CSCD 2024年第1期297-309,共13页
Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message i... Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods. 展开更多
关键词 genetic algorithm oppositional whale optimization algorithm rectangle block cipher secret sharing scheme SHARES universal share
下载PDF
固体氧化物电解池共电解CO_(2)/H_(2)O阴极研究进展与挑战
11
作者 韩超 王越 +5 位作者 冯开宇 高娜 张礼格 崔天成 李涛 肖国萍 《燃料化学学报(中英文)》 北大核心 2025年第2期198-210,共13页
本综述重点介绍了固体氧化物电解池(SOEC)的发展历史、基本机理和关键阴极材料的研究进展。在共电解过程中,SOEC阴极在控制电池运行稳定性方面具有至关重要的作用,然而目前最常用的Ni-YSZ金属陶瓷材料由于Ni的粗化、团聚等原因,导致其... 本综述重点介绍了固体氧化物电解池(SOEC)的发展历史、基本机理和关键阴极材料的研究进展。在共电解过程中,SOEC阴极在控制电池运行稳定性方面具有至关重要的作用,然而目前最常用的Ni-YSZ金属陶瓷材料由于Ni的粗化、团聚等原因,导致其稳定性不佳,研究者在探索提高金属陶瓷电极稳定性方法的同时,也在尝试寻找SOEC共电解中可替代金属陶瓷电极的阴极材料,钙钛矿材料由于具有较好的混合导电性、抗积炭性、杂质耐受性、氧化还原稳定性被研究者所关注,但其相对较低的催化活性是大多数钙钛矿相关氧化物面临的主要挑战,研究者发现通过浸渍、掺杂、脱溶等技术可以增加材料表面氧空位和活性三相界面,这些氧空位可以作为宿主位点在高温下容纳CO_(2)分子,从而降低电极极化电阻,提高电极的电化学性能,且浸渍法具有易于操作、效率高、制备温度低等优点,掺杂法具有掺杂过程简单、无污染和低成本等优点,原位溶出法具有稳定性高、效率高、性能好等优点,均易于后期推广。因此本文结合金属陶瓷和钙钛矿等阴极材料存在的问题和挑战,归纳了采用浸渍、掺杂、脱溶等技术提升阴极材料的性能和稳定性等方面的进展,为SOEC的商业化提供技术可行性分析。 展开更多
关键词 固体氧化物电解池 Co_(2)/H_(2)o共电解 金属陶瓷 钙钛矿
下载PDF
A General Framework for Intelligent IoT Data Acquisition and Sharing in an Untrusted Environment Based on Blockchain
12
作者 Lu Yin Xue Yongtao +4 位作者 Li Qingyuan Wu Luocheng Li Taosen Yang Peipei Zhu Hongbo 《China Communications》 SCIE CSCD 2024年第3期137-148,共12页
Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The m... Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The main challenge at this stage is to integrate the blockchain from the resourceconstrained Io T devices and ensure the data of Io T system is credible. We provide a general framework for intelligent Io T data acquisition and sharing in an untrusted environment based on the blockchain, where gateways become Oracles. A distributed Oracle network based on Byzantine Fault Tolerant algorithm is used to provide trusted data for the blockchain to make intelligent Io T data trustworthy. An aggregation contract is deployed to collect data from various Oracle and share the credible data to all on-chain users. We also propose a gateway data aggregation scheme based on the REST API event publishing/subscribing mechanism which uses SQL to achieve flexible data aggregation. The experimental results show that the proposed scheme can alleviate the problem of limited performance of Io T equipment, make data reliable, and meet the diverse data needs on the chain. 展开更多
关键词 blockchain data sharing Internet of Things oRACLE
下载PDF
Improved Multipartite Quantum Secret Sharing Protocol Using Preshared Greenberger-Horne-Zeilinger States 被引量:3
13
作者 谢灯 叶明勇 李兴华 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第12期1027-1030,共4页
Inspired by the protocol presented by Bagherinezhad and Karimipour[Phys.Rev.A 67(2003) 044302], which will be shown to be insecure,we present a multipartite quantum secret sharing protocol using reusable GreenbergerHo... Inspired by the protocol presented by Bagherinezhad and Karimipour[Phys.Rev.A 67(2003) 044302], which will be shown to be insecure,we present a multipartite quantum secret sharing protocol using reusable GreenbergerHorne -Zeilinger(GHZ) states.This protocol is robust against eavesdropping and could be used for the circumstance of many parties. 展开更多
关键词 secret sharing Greenberger-Horne-Zeilinger state quantum cryptography
下载PDF
A Framework Based on the DAO and NFT in Blockchain for Electronic Document Sharing
14
作者 Lin Chen Jiaming Zhu +2 位作者 Yuting Xu Huanqin Zheng Shen Su 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第9期2373-2395,共23页
In the information age,electronic documents(e-documents)have become a popular alternative to paper documents due to their lower costs,higher dissemination rates,and ease of knowledge sharing.However,digital copyright ... In the information age,electronic documents(e-documents)have become a popular alternative to paper documents due to their lower costs,higher dissemination rates,and ease of knowledge sharing.However,digital copyright infringements occur frequently due to the ease of copying,which not only infringes on the rights of creators but also weakens their creative enthusiasm.Therefore,it is crucial to establish an e-document sharing system that enforces copyright protection.However,the existing centralized system has outstanding vulnerabilities,and the plagiarism detection algorithm used cannot fully detect the context,semantics,style,and other factors of the text.Digital watermark technology is only used as a means of infringement tracing.This paper proposes a decentralized framework for e-document sharing based on decentralized autonomous organization(DAO)and non-fungible token(NFT)in blockchain.The use of blockchain as a distributed credit base resolves the vulnerabilities inherent in traditional centralized systems.The e-document evaluation and plagiarism detection mechanisms based on the DAO model effectively address challenges in comprehensive text information checks,thereby promoting the enhancement of e-document quality.The mechanism for protecting and circulating e-document copyrights using NFT technology ensures effective safeguarding of users’e-document copyrights and facilitates e-document sharing.Moreover,recognizing the security issues within the DAO governance mechanism,we introduce an innovative optimization solution.Through experimentation,we validate the enhanced security of the optimized governance mechanism,reducing manipulation risks by up to 51%.Additionally,by utilizing evolutionary game analysis to deduce the equilibrium strategies of the framework,we discovered that adjusting the reward and penalty parameters of the incentive mechanism motivates creators to generate superior quality and unique e-documents,while evaluators are more likely to engage in assessments. 展开更多
关键词 Electronic document sharing blockchain DAo NFT evolutionary game
下载PDF
Prevalence and Factors Associated with Sharing of Human Immunodeficiency Seropositivity Status among Serodiscordant Couples in the City of Parakou (Benin)
15
作者 Djossou Sègnon Eurydice Elvire Damien Georgia Barikissou +7 位作者 Meba Bio Mamatou Tokpanoude Ignace Ahanhanzo-Glele Rhonel Ataigba Iretinethania Elie Agossoukpe Benoit Kakpo-Zannou Rodrigue Kamoutchoni Corneille Aguemon Badirou 《Open Journal of Epidemiology》 2024年第1期1-18,共18页
Introduction: In serodiscordant couples, sharing serostatus is a crucial step in the HIV risk management process. The aim of this study was to determine the prevalence and factors associated with serostatus sharing am... Introduction: In serodiscordant couples, sharing serostatus is a crucial step in the HIV risk management process. The aim of this study was to determine the prevalence and factors associated with serostatus sharing among HIV serodiscordant couples in the city of Parakou. Setting and methods: This study was carried out in the city of Parakou, capital of northern Benin. It was a descriptive, analytical cross-sectional study with non-probability sampling for convenience. Socio-demographic data, as well as data on antecedents, behaviours, social and marital life, were collected using a questionnaire gave to the participants. Clinical and therapeutic data were collected from patients’ medical records and follow-up charts. Data were analyzed and processed using R 4.3.1 software. The significance level was set at 5%, and logistic regression was used to identify potential predictors of shared serostatus among serodiscordant couples in the city of Parakou in 2022. Results: A total of 299 participants in long-term serodiscordant relationships were included in our study. The average age of the subjects was 37.55 ± 10.25 years. Women were the infected partner in 80.27% of cases. The most common level of education was secondary (33.45%). Most respondents (230 subjects, 76.92%) were married. The average duration of the couple’s relationship was 121.68 months ± 96.32. The most frequent screening circumstances were: Prevention of mother-to-child transmission (PMTCT) (50.84%) and hospital screening (26.09%). The infected partner shared his or her serostatus with his or her spouse in 47.83% of cases. Potential predictors of serostatus sharing within the couple were: marital status (p Conclusion: The sharing of serostatus within serodiscordant couples needs to be managed in a way that takes into account the social and marital characteristics of the couple. 展开更多
关键词 Serodiscordance sharing of Serostatus HIV PARTNER BENIN
下载PDF
FADSF:A Data Sharing Model for Intelligent Connected Vehicles Based on Blockchain Technology
16
作者 Yan Sun Caiyun Liu +1 位作者 Jun Li Yitong Liu 《Computers, Materials & Continua》 SCIE EI 2024年第8期2351-2362,共12页
With the development of technology,the connected vehicle has been upgraded from a traditional transport vehicle to an information terminal and energy storage terminal.The data of ICV(intelligent connected vehicles)is ... With the development of technology,the connected vehicle has been upgraded from a traditional transport vehicle to an information terminal and energy storage terminal.The data of ICV(intelligent connected vehicles)is the key to organically maximizing their efficiency.However,in the context of increasingly strict global data security supervision and compliance,numerous problems,including complex types of connected vehicle data,poor data collaboration between the IT(information technology)domain and OT(operation technology)domain,different data format standards,lack of shared trust sources,difficulty in ensuring the quality of shared data,lack of data control rights,as well as difficulty in defining data ownership,make vehicle data sharing face a lot of problems,and data islands are widespread.This study proposes FADSF(Fuzzy Anonymous Data Share Frame),an automobile data sharing scheme based on blockchain.The data holder publishes the shared data information and forms the corresponding label storage on the blockchain.The data demander browses the data directory information to select and purchase data assets and verify them.The data demander selects and purchases data assets and verifies them by browsing the data directory information.Meanwhile,this paper designs a data structure Data Discrimination Bloom Filter(DDBF),making complaints about illegal data.When the number of data complaints reaches the threshold,the audit traceability contract is triggered to punish the illegal data publisher,aiming to improve the data quality and maintain a good data sharing ecology.In this paper,based on Ethereum,the above scheme is tested to demonstrate its feasibility,efficiency and security. 展开更多
关键词 Blockchain connected vehicles data sharing smart contracts credible traceability
下载PDF
Improvement and security analysis of multi-ring discrete modulation continuous variable quantum secret sharing scheme
17
作者 姜欢窈 聂敏 +3 位作者 杨光 孙爱晶 张美玲 裴昌幸 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期189-197,共9页
In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propos... In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value. 展开更多
关键词 discrete modulation continuous variable quantum secret sharing scheme
下载PDF
A verifiable essential secret image sharing scheme based on HLRs(VESIS-(t,s,k,n))
18
作者 Massoud Hadian Dehkordi Seyed Taghi Farahi Samaneh Mashhadi 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第2期388-410,共23页
In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to u... In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to use essential secret image sharing schemes.In this article,a verifiable essential secret image sharing scheme based on HLRs is proposed.Shareholder's share consists of two parts.The first part is produced by the shareholders,which prevents the fraud of dealers.The second part is a shadow image that is produced by using HLRs and the first part of share.The verification of the first part of the shares is done for the first time by using multilinear and bilinear maps.Also,for verifying shadow images,Bloom Filters are used for the first time.The proposed scheme is more efficient than similar schemes,and for the first part of the shares,has formal security. 展开更多
关键词 Bloom Filter CRYPToGRAPHY Essential Secret Image sharing Verifiability
下载PDF
Cryptanalysis of efficient semi-quantum secret sharing protocol using single particles
19
作者 高甘 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期254-257,共4页
In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three... In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three dishonest agents,Bob,Charlie and Emily can collude to obtain Alice's secret without the help of David. 展开更多
关键词 security loophole rearranging orders semi-quantum secret sharing single particles
下载PDF
Blockchain-Based Key Management Scheme Using Rational Secret Sharing
20
作者 Xingfan Zhao Changgen Peng +1 位作者 Weijie Tan Kun Niu 《Computers, Materials & Continua》 SCIE EI 2024年第4期307-328,共22页
Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes... Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes have become a research focus for blockchain private key protection.The security of private keys for blockchain user wallet is highly related to user identity authentication and digital asset security.The threshold blockchain private key management schemes based on verifiable secret sharing have made some progress,but these schemes do not consider participants’self-interested behavior,and require trusted nodes to keep private key fragments,resulting in a narrow application scope and low deployment efficiency,which cannot meet the needs of personal wallet private key escrow and recovery in public blockchains.We design a private key management scheme based on rational secret sharing that considers the self-interest of participants in secret sharing protocols,and constrains the behavior of rational participants through reasonable mechanism design,making it more suitable in distributed scenarios such as the public blockchain.The proposed scheme achieves the escrow and recovery of personal wallet private keys without the participation of trusted nodes,and simulate its implementation on smart contracts.Compared to other existing threshold wallet solutions and keymanagement schemes based on password-protected secret sharing(PPSS),the proposed scheme has a wide range of applications,verifiable private key recovery,low communication overhead,higher computational efficiency when users perform one-time multi-key escrow,no need for trusted nodes,and personal rational constraints and anti-collusion attack capabilities. 展开更多
关键词 Blockchain smart contract rational secret sharing key management
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部