Publication number: 20250053279
Abstract: The embodiments of the disclosure provide a method, apparatus, device and storage medium for presenting information, which relate to the technical field of computers. The method includes: obtaining object search information, in response to the object search information being object category information, determining a target object category corresponding to the object search information, and presenting object information of a plurality of target objects corresponding to the target object category in a search result presentation page; where all the plurality of target objects are different, and object information of a target object includes object attribute information and image resource information of the target object. By employing the above technical solution, when the user is searching the object category, object information of a plurality of target objects different from each other corresponding to the target object category is presented in the search result page.
Type:
Application
Filed:
August 9, 2024
Publication date:
February 13, 2025
Inventors:
Jing LIN, Duanliang ZHOU, Long RU, Chao WU, Conghai YAO, Yelun LIU, Bin QIAN, Siyi YE, Jie WANG, Wenhao LI, Wenjing LIU, Shengan CAI, Tingting YANG, Yiwei WANG, Junjun YAO, Yifei QIU, Ju YANG, Yunfei SONG, Chuan ZHAO, Xianhui WEI, Xiaofeng WANG, Jianwen WU, Meng CHEN, Mang WANG, Peng HE, Kaijian LIU, Liangpeng XU, Yuhang LIU, Xiang XIAO, Runyu CHEN, Da LEI, Xiangnan LUO, Zheng PENG, Shaolong CHEN, Binghua XU, Hongtao XUE, Guorong ZHU, Qinglin XU, Pingping HUANG, Hongtao HU
Publication number: 20250038976
Abstract: A lattice-based proxy signature method, apparatus and device, a lattice-based proxy signature verification method, apparatus and device, and a storage medium. Polynomials are randomly selected in rings to calculate public and private keys of nodes, and the magnitudes of proxy public and private keys are the same as the magnitudes of public and private keys of an original signer. Therefore, compared with existing proxy signature schemes, the present application has smaller lengths of public and private keys and higher storage efficiency. Proxy signature information generated in the present application shows a signature of the original signer and also shows a signature of a proxy signer. Once a proxy signature is created, the proxy signature cannot be repudiated by the proxy signer, and has strong non-repudiation and strong unforgeability. The proxy signature method has the advantage of resisting quantum computer attack.
Type:
Application
Filed:
August 18, 2022
Publication date:
January 30, 2025
Applicants:
ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID, GUIZHOU POWER GRID CO., LTD.
Inventors:
Bin QIAN, Houpeng HU, Yong XIAO, Jiaxiang OU, Mi ZHOU, Pengcheng LI, Yi LUO, Yanhong XIAO, Ji WANG, Xin WU, Fusheng LI, Peilin HE, Xiaoming LIN, Zhenghao GAO, Jianlin TANG, Zerui CHEN, Fan ZHANG, Gaoyi LONG, Qiang CHANG, Qin FENG, Yuanhong CEN