In recent years, epidemics, earthquakes, forest fires, floods, and other public health emergencies and natural disasters have occurred frequently, and the role of emergency logistics has become more and more prominent. In this paper, on the basis of sorting out the current situation of emergency logistics guarantee in China, we use hierarchical analysis and fuzzy evaluation methods to calculate the weight of each index factor and guarantee the effectiveness of emergency logistics, respectively. The study gives examples to analyze and calculate the guarantee effectiveness of emergency logistics so as to draw the influence of emergency logistics. The key factors of emergency logistics can provide decision guidance for strengthening the construction of the emergency logistics system and improving the level of emergency logistics guarantee.
The fuzzy vault algorithm is mainly used for data privacy protection in fault-tolerant environments, It binds biometric features and secret data together safely to form a vault, which can realize "fuzzy" unlocking. in the real-life, fuzzy vault is mainly used in biometric authentication, image capture, recognition, etc. However, At present, most fuzzy vault schemes have the problems of high computational complexity and low communication efficiency. To solve the problems of high computational complexity and low communication efficiency in identity authentication, we based on the fuzzy vault scheme and construct a multi-secret sharing fuzzy vault scheme. which splits the big secret value into multiple sub-secret values and uses the RS code multi-secret sharing decoding method to improve the efficiency of biological identity authentication. Firstly, splits the big secret value into multiple sub-secret values. Then, We construct a multi-secret sharing scheme. our scheme supports the sharing of multi-secret information. Finally, we analyze the computational complexity and communication complexity of the scheme. The analysis shows that our scheme can reduce the computational complexity and communication complexity by an order of magnitude.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.