搜索结果: 1-15 共查到“DDH”相关记录24条 . 查询时间(0.171 秒)
成人DDH患者保髋手术失败后的THA疗效分析
发育性髋关节发育不良 保髋手术 全髋人工关节置换术
2021/3/4
回顾性分析保髋手术治疗失败后的成人发育性髋关节发育不良患者再次行全髋人工关节置换作者:的中期疗效。方法 选择2014年1月至2019年1月收治的22例(30髋)保髋手术失败后行全髋关节置换术(全髋关节置换术,THA)的发育性髋关节发育不良患者作为研究对象,其中男7例,女15例;行保髋关节手术时年龄1〜18岁,平均(7.9±3.4)岁;行THA时年龄22〜63岁,平均(...
探讨髋关节发育不良(DDH)患者血清及其滑膜组织中的P物质(P,SP),钙结合蛋白(S100钙结合蛋白A12,S100A12)表达及其意义。方法 本研究采取回顾性研究方法,挑选我院2013年4月至2018年4月收治的182例DDH患者,其中单纯的DDH患者114例(DDH组),DDH合并骨关节炎(骨关节炎,OA) )的患者68例(OA组),同时拾取短部部外伤骨折实施手术的40例患者作为部位,分别...
DDH-based Multisignatures with Public Key Aggregation
Multisignatures Decisional Diffie-Hellman assumption Blockchain
2019/7/8
A multisignature scheme allows a group of signers to produce a joint signature on a common message, which is more compact than a collection of distinct signatures from all signers. Given this signatur...
回顾性研究发现,股骨截骨术并非低龄DDH患儿手术治疗所必须的,而应根据患儿具体情况合理选择;本研究通过多中心前瞻性研究进一步探讨对于18个月至3岁DDH患儿是否要行股骨截骨术。FSODDH项目为一项多中心前瞻性随机对照临床试验研究。研究设计拟招募200名单侧低龄DDH患儿,随机分成股骨截骨组(n=100)和股骨不截骨组(n=100)。
Non-Zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR
Non-zero inner product encryption lattices generic constructions functional encryption for inner products
2019/1/18
In non-zero inner product encryption (NIPE) schemes, ciphertexts and secret keys are associated with vectors and decryption is possible whenever the inner product of these vectors does not equal zero....
Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH
Pseudorandom functions LWE MDDH
2018/11/19
We construct efficient and tightly secure pseudorandom functions (PRFs) with only logarithmic security loss and short secret keys. This yields very simple and efficient variants of well-known construc...
Indistinguishability Obfuscation from DDH-like Assumptions on Constant-Degree Graded Encodings
Obfuscation Constant-Degree Graded Encoding Schemes SXDH
2016/12/10
All constructions of general purpose indistinguishability obfuscation (IO) rely on either meta-assumptions that encapsulate an exponential family of assumptions (e.g., Pass, Seth and Telang, CRYPTO 20...
Indistinguishability Obfuscation from DDH on 5-linear Maps and Locality-5 PRGs
Indistinguishability Obfuscation 5-linear Maps Local PRG
2016/12/7
When plugging in a candidate PRG with locality-5 (eg, [Goldreich, ECCC 2010, O'Donnell and Witmer, CCC 2014]), we obtain a construction of IO from subexponential DDH on 5-linear maps and LWE. Previous...
Improving Practical UC-Secure Commitments based on the DDH Assumption
universally composable commitments adaptive security public-key cryptography
2016/6/29
At Eurocrypt 2011, Lindell presented practical static and adaptively UC-secure commitment
schemes based on the DDH assumption. Later, Blazy et al. (at ACNS 2013) improved the effi-
ciency of the Lin...
Breaking the Circuit Size Barrier for Secure Computation Under DDH
Secure computation function secret sharing private information retrieval
2016/6/7
Under the Decisional Diffie-Hellman (DDH) assumption, we present a 2-out-of-2 secret sharing scheme that supports a compact evaluation of branching programs on the shares. More concretely, there is an...
Linearly Homomorphic Encryption from DDH
Linearly Homomorphic Encryption Orders of Quadratic Fields
2016/1/4
We design a linearly homomorphic encryption scheme whose security relies on
the hardness of the decisional Diffie-Hellman problem. Our approach requires some special
features of the underlying group...
Short Accountable Ring Signatures Based on DDH
Accountable ring signatures group signatures one-out-of-many zero-knowledge proofs
2015/12/29
Ring signatures and group signatures are prominent cryptographic primitives offering a combination
of privacy and authentication. They enable individual users to anonymously sign messages on behalf o...
Efficiently Obfuscating Re-Encryption Program under DDH Assumption
Re-encryption circuit Average-case secure obfuscation DDH Assumption
2015/12/23
A re-encryption program (or a circuit) converts a ciphertext encrypted under Alice’s public
key pk1 to a ciphertext of the same message encrypted under Bob’s public key pk2. Hohenberger et
al. (TCC ...
第八届关节外科研讨会聚焦DDH全程规范诊治(图)
第八届 关节外科研讨会 DDH全程规范诊治
2015/8/11
七月骄阳似火,群贤汇聚羊城。2015年7月11日,由中山大学附属第一医院关节外科、广东省健康管理学会骨科专业委员会主办的第八届关节外科研讨会正式开幕。
DDH发病率仍居高不下,不同种族人群发病率为1.8-3.5%,约1/3的髋关节OA来自于DDH.。尽管当代骨科诊疗技术已经有了快速的发展,但是,DDH的诊治依然是骨科领域的难题之一。原因之一,就是国内尚缺乏有效的治疗手段与统一的治疗规范。故此次会...
New Constructions and Applications of Trapdoor DDH Groups
trapdoor DDH group hidden pairing
2014/3/12
Trapdoor Decisional Diffie-Hellman (TDDH) groups, introduced by Dent and Galbraith (ANTS 2006), are groups where the DDH problem is hard, unless one is in possession of a secret trapdoor which enables...