期刊文献+
共找到635篇文章
< 1 2 32 >
每页显示 20 50 100
Improvement and security analysis of multi-ring discrete modulation continuous variable quantum secret sharing scheme
1
作者 姜欢窈 聂敏 +3 位作者 杨光 孙爱晶 张美玲 裴昌幸 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期189-197,共9页
In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propos... In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value. 展开更多
关键词 discrete modulation continuous variable quantum secret sharing scheme
在线阅读 下载PDF
Aerodynamic/stealth design of S-duct inlet based on discrete adjoint method 被引量:1
2
作者 Jun DENG Ke ZHAO +4 位作者 Lin ZHOU Wei ZHANG Bowen SHU Jiangtao HUANG Zhenghong GAO 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI CSCD 2024年第4期725-746,共22页
It is a major challenge for the airframe-inlet design of modern combat aircrafts,as the flow and electromagnetic wave propagation in the inlet of stealth aircraft are very complex.In this study,an aerodynamic/stealth ... It is a major challenge for the airframe-inlet design of modern combat aircrafts,as the flow and electromagnetic wave propagation in the inlet of stealth aircraft are very complex.In this study,an aerodynamic/stealth optimization design method for an S-duct inlet is proposed.The upwind scheme is introduced to the aerodynamic adjoint equation to resolve the shock wave and flow separation.The multilevel fast multipole algorithm(MLFMA)is utilized for the stealth adjoint equation.A dorsal S-duct inlet of flying wing layout is optimized to improve the aerodynamic and stealth characteristics.Both the aerodynamic and stealth characteristics of the inlet are effectively improved.Finally,the optimization results are analyzed,and it shows that the main contradiction between aerodynamic characteristics and stealth characteristics is the centerline and crosssectional area.The S-duct is smoothed,and the cross-sectional area is increased to improve the aerodynamic characteristics,while it is completely opposite for the stealth design.The radar cross section(RCS)is reduced by phase cancelation for low frequency conditions.The method is suitable for the aerodynamic/stealth design of the aircraft airframe-inlet system. 展开更多
关键词 S-duct inlet aerodynamic/stealth optimization design discrete adjoint upwind scheme multilevel fast multipole algorithm(MLFMA)
在线阅读 下载PDF
Applicability of Temperature Discrete Equation to NMRF Boundary Layer Scheme in GRAPES Model 被引量:3
3
作者 ZHANG Yan-xia CHEN Zi-tong +1 位作者 MENG Wei-guang XU Dao-shen 《Journal of Tropical Meteorology》 SCIE 2022年第1期12-28,共17页
By deriving the discrete equation of the parameterized equation for the New Medium-Range Forecast(NMRF)boundary layer scheme in the GRAPES model,the adjusted discrete equation for temperature is obviously different fr... By deriving the discrete equation of the parameterized equation for the New Medium-Range Forecast(NMRF)boundary layer scheme in the GRAPES model,the adjusted discrete equation for temperature is obviously different from the original equation under the background of hydrostatic equilibrium and adiabatic hypothesis.In the present research,three discrete equations for temperature in the NMRF boundary layer scheme are applied,namely the original(hereafter NMRF),the adjustment(hereafter NMRF-gocp),and the one in the YSU boundary-layer scheme(hereafter NMRF-TZ).The results show that the deviations of height,temperature,U and V wind in the boundary layer in the NMRF-gocp and NMRF-TZ experiments are smaller than those in the NMRF experiment and the deviations in the NMRF-gocp experiment are the smallest.The deviations of humidity are complex for the different forecasting lead time in the three experiments.Moreover,there are obvious diurnal variations of deviations from these variables,where the diurnal variations of deviations from height and temperature are similar and those from U and V wind are also similar.However,the diurnal variation of humidity is relatively complicated.The root means square errors of 2m temperature(T2m)and 10m speed(V10m)from the three experiments show that the error of NMRF-gocp is the smallest and that of NMRF is the biggest.There is also a diurnal variation of T2m and V10m,where T2m has double peaks and V10m has only one peak.Comparison of the discrete equations between NMRF and NMRF-gocp experiments shows that the deviation of temperature is likely to be caused by the calculation of vertical eddy diffusive coefficients of heating,which also leads to the deviations of other elements. 展开更多
关键词 NMRF boundary layer scheme turbulent equation temperature discrete equation CMA-GD model
在线阅读 下载PDF
Threshold Signature Scheme Based on Discrete Logarithm and Quadratic Residue
4
作者 FEI Ru-chun 1,2 , WANG Li-na 1 1.School of Computer, Wuhan University, Wuhan 430072, Hubei, China 2.Department of Information Engineering, Benxi College of Metallurgy, Benxi 117022,Liaoning,China 《Wuhan University Journal of Natural Sciences》 CAS 2004年第5期770-774,共5页
Digital signature scheme is a very important research field in computer security and modern cryptography. A (k, n) threshold digital signature scheme is proposed by integrating digital signature scheme with Shamir sec... Digital signature scheme is a very important research field in computer security and modern cryptography. A (k, n) threshold digital signature scheme is proposed by integrating digital signature scheme with Shamir secret sharing scheme. It can realize group-oriented digital signature, and its security is based on the difficulty in computing discrete logarithm and quadratic residue on some special conditions. In this scheme, effective digital signature can not be generated by anyk?1 or fewer legal users, or only by signature executive. In addition, this scheme can identify any legal user who presents incorrect partial digital signature to disrupt correct signature, or any illegal user who forges digital signature. A method of extending this scheme to an Abelian group such as elliptical curve group is also discussed. The extended scheme can provide rapider computing speed and stronger security in the case of using shorter key. Key words threshold scheme - digital signature - discrete logarithm - quadratic residuc - threshold digital signature CLC number TP 309. 7 Foundation item: Supported the National Nature Science Foundation of China, Hubei Province (90104005, 2002 AB0039)Biography: FEI Ru-chun (1964-), male, Ph. D candidate, Associated professor, research direction: information security and cryptography. 展开更多
关键词 threshold scheme digital signature discrete logarithm quadratic residuc threshold digital signature
在线阅读 下载PDF
Novel Discrete Particle Swarm Optimization Based on Huge Value Penalty for Solving Engineering Problem 被引量:7
5
作者 YU Ying YU Xiaochun LI Yongsheng 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2009年第3期410-418,共9页
For the purpose of solving the engineering constrained discrete optimization problem, a novel discrete particle swarm optimization(DPSO) is proposed. The proposed novel DPSO is based on the idea of normal particle s... For the purpose of solving the engineering constrained discrete optimization problem, a novel discrete particle swarm optimization(DPSO) is proposed. The proposed novel DPSO is based on the idea of normal particle swarm optimization(PSO), but deals with the variables as discrete type, the discrete optimum solution is found through updating the location of discrete variable. To avoid long calculation time and improve the efficiency of algorithm, scheme of constraint level and huge value penalty are proposed to deal with the constraints, the stratagem of reproducing the new particles and best keeping model of particle are employed to increase the diversity of particles. The validity of the proposed DPSO is examined by benchmark numerical examples, the results show that the novel DPSO has great advantages over current algorithm. The optimum designs of the 100-1 500 mm bellows under 0.25 MPa are fulfilled by DPSO. Comparing the optimization results with the bellows in-service, optimization results by discrete penalty particle swarm optimization(DPPSO) and theory solution, the comparison result shows that the global discrete optima of bellows are obtained by proposed DPSO, and confirms that the proposed novel DPSO and schemes can be used to solve the engineering constrained discrete problem successfully. 展开更多
关键词 discrete particle swarm optimization location updating scheme of constraints level huge value penalty optimization design BELLOWS
在线阅读 下载PDF
THE DYNAMICAL BEHAVIOR OF FULLY DISCRETE SPECTRAL METHOD FOR NONLINEAR SCHRODINGER EQUATION WITH WEAKLY DAMPED 被引量:3
6
作者 向新民 《Numerical Mathematics A Journal of Chinese Universities(English Series)》 SCIE 1999年第2期165-176,共12页
Nonlinear Schrodinger equation (NSE) arises in many physical problems. It is a very important equation. A lot of works studied the wellposed, the existence of solution of NSE etc. And there are many works studied the ... Nonlinear Schrodinger equation (NSE) arises in many physical problems. It is a very important equation. A lot of works studied the wellposed, the existence of solution of NSE etc. And there are many works studied the numerical methods for it. Recently, since the development of infinite dimensional dynamic system the dynamical behavior of NSE has been investigated. The paper [1] studied the long time wellposedness, the existence of universal attractor and the estimate of Lyapunov exponent for NSE with weakly damped. At the same time it was need to study the large time new computational methods and to discuss its convergence error estimate, the existence of approximate attractors etc. In this pape we study the NSE with weakly damped (1.1). We assume,where 0【λ【2 is a constant. If we wish to construct the higher accuracy computational scheme, it will be difficult that staigh from the equation (1.1). Therefore we start with (1. 4) and use fully discrete Fourier spectral method with time difference to 展开更多
关键词 nonlinear SCHRODINGER equation INFINITE dimensional dynamic system dynamical behavior fully discrete spectral method large TIME convergence difference scheme vrich TIME differ-
在线阅读 下载PDF
AN EFFICIENT 3-DIMENSIONAL DISCRETE WAVELET TRANSFORM ARCHITECTURE FOR VIDEO PROCESSING APPLICATION 被引量:1
7
作者 Ganapathi Hegde Pukhraj Vaya 《Journal of Electronics(China)》 2012年第6期534-540,共7页
This paper presents an optimized 3-D Discrete Wavelet Transform (3-DDWT) architecture. 1-DDWT employed for the design of 3-DDWT architecture uses reduced lifting scheme approach. Further the architecture is optimized ... This paper presents an optimized 3-D Discrete Wavelet Transform (3-DDWT) architecture. 1-DDWT employed for the design of 3-DDWT architecture uses reduced lifting scheme approach. Further the architecture is optimized by applying block enabling technique, scaling, and rounding of the filter coefficients. The proposed architecture uses biorthogonal (9/7) wavelet filter. The architecture is modeled using Verilog HDL, simulated using ModelSim, synthesized using Xilinx ISE and finally implemented on Virtex-5 FPGA. The proposed 3-DDWT architecture has slice register utilization of 5%, operating frequency of 396 MHz and a power consumption of 0.45 W. 展开更多
关键词 3-D discrete Wavelet Transform (3-DDWT) Lifting scheme PIPELINING Video coding Low power
在线阅读 下载PDF
Low complexity reconfigurable architecture for the 5/3 and 9/7 discrete wavelet transform
8
作者 Xiong Cheng yi Tian Jinwen Liu Jian 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第2期303-308,共6页
Efficient reconfigurable VLSI architecture for 1-D 5/3 and 9/7 wavelet transforms adopted in JPEG2000 proposal, based on lifting scheme is proposed. The embedded decimation technique based on fold and time multiplexin... Efficient reconfigurable VLSI architecture for 1-D 5/3 and 9/7 wavelet transforms adopted in JPEG2000 proposal, based on lifting scheme is proposed. The embedded decimation technique based on fold and time multiplexing, as well as embedded boundary data extension technique, is adopted to optimize the design of the architecture. These reduce significantly the required numbers of the multipliers, adders and registers, as well as the amount of accessing external memory, and lead to decrease efficiently the hardware cost and power consumption of the design. The architecture is designed to generate an output per clock cycle, and the detailed component and the approximation of the input signal are available alternately. Experimental simulation and comparison results are presented, which demonstrate that the proposed architecture has lower hardware complexity, thus it is adapted for embedded applications. The presented architecture is simple, regular and scalable, and well suited for VLSI implementation. 展开更多
关键词 VLSI discrete wavelet transform lifting scheme embedded decimation reeonfigurable.
在线阅读 下载PDF
Two-dimensional discrete mathematical model of tumor-induced angiogenesis
9
作者 赵改平 陈二云 +3 位作者 吴洁 许世雄 M.W.Collins 龙泉 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 2009年第4期455-462,共8页
A 2D discrete mathematical model of a nine-point finite difference scheme is built to simulate tumor-induced angiogenesis. Nine motion directions of an individual endothelial cell and two parent vessels are extended i... A 2D discrete mathematical model of a nine-point finite difference scheme is built to simulate tumor-induced angiogenesis. Nine motion directions of an individual endothelial cell and two parent vessels are extended in the present model. The process of tumor-induced angiogenesis is performed by coupling random motility, chemotaxis, and haptotaxis of endothelial cell in different mechanical environments inside and outside the tumor. The results show that nearly realistic tumor microvascular networks with neoplastic pathophysiological characteristics can be generated from the present model. Moreover, the theoretical capillary networks generated in numerical simulations of the discrete model may provide useful information for further clinical research. 展开更多
关键词 tumor angiogenesis discrete mathematical model nine-point scheme nu-merical simulation
在线阅读 下载PDF
A Principal Theorem of Normal Discretization Schemes for Operator Equations of the First Kind
10
作者 Du Nai lin 1, Wang Hannah 2 1.School of Mathematics and Statistics, Wuhan University, Wuhan 430072, China 2. School of Foreign Languages and Literature,Wuhan University,Wuhan 430072,China 《Wuhan University Journal of Natural Sciences》 EI CAS 2001年第4期767-768,共2页
The authors announce a newly-proved theorem of theirs. This theorem is of principal significance to numerical computation of operator equations of the first kind.
关键词 operator equation of the first kind normal discretization scheme pure pseudoinverse
在线阅读 下载PDF
Stability Analysis for a Discrete SIR Epidemic Model with Delay and General Nonlinear Incidence Function
11
作者 Aboudramane Guiro Dramane Ouedraogo Harouna Ouedraogo 《Applied Mathematics》 2018年第9期1039-1054,共16页
In this paper, we construct a backward difference scheme for a class of SIR epidemic model with general incidence f . The step sizeτ used in our discretization is one. The dynamical properties are investigated (posit... In this paper, we construct a backward difference scheme for a class of SIR epidemic model with general incidence f . The step sizeτ used in our discretization is one. The dynamical properties are investigated (positivity and the boundedness of solution). By constructing the Lyapunov function, the general incidence function f must satisfy certain assumptions, under which, we establish the global stability of endemic equilibrium when R0 >1. The global stability of diseases-free equilibrium is also established when R0 ≤1. In addition we present numerical results of the continuous and discrete model of the different class according to the value of basic reproduction number R0. 展开更多
关键词 discrete Model DELAY LYAPUNOV Functional NONLINEAR Incidence BACKWARD Difference scheme Local STABILITY Global STABILITY
在线阅读 下载PDF
Numerical Solution of Advection Diffusion Equation Using Semi-Discretization Scheme
12
作者 Khandoker Nasrin Ismet Ara Md. Masudur Rahaman Md. Sabbir Alam 《Applied Mathematics》 2021年第12期1236-1247,共12页
Numerical diffusion and oscillatory behavior characteristics are averted applying numerical solutions of advection-diffusion equation are themselves immensely sophisticated. In this paper, two numerical methods have b... Numerical diffusion and oscillatory behavior characteristics are averted applying numerical solutions of advection-diffusion equation are themselves immensely sophisticated. In this paper, two numerical methods have been used to solve the advection diffusion equation. We use an explicit finite difference scheme for the advection diffusion equation and semi-discretization on the spatial variable for advection-diffusion equation yields a system of ordinary differential equations solved by Euler’s method. Numerical assessment has been executed with specified initial and boundary conditions, for which the exact solution is known. We compare the solutions of the advection diffusion equation as well as error analysis for both schemes. 展开更多
关键词 Advection Diffusion Equation Finite Difference scheme SEMI-discretIZATION Rate of Convergence Error Analysis
在线阅读 下载PDF
Event-Triggered Finite-Time H Filtering for Discrete-Time Nonlinear Stochastic Systems
13
作者 Aiqing Zhang Yunyuan Dong 《Journal of Applied Mathematics and Physics》 2023年第1期13-21,共9页
This paper addresses the problem of event-triggered finite-time H<sub>∞</sub> filter design for a class of discrete-time nonlinear stochastic systems with exogenous disturbances. The stochastic Lyapunov-K... This paper addresses the problem of event-triggered finite-time H<sub>∞</sub> filter design for a class of discrete-time nonlinear stochastic systems with exogenous disturbances. The stochastic Lyapunov-Krasoviskii functional method is adopted to design a filter such that the filtering error system is stochastic finite-time stable (SFTS) and preserves a prescribed performance level according to the pre-defined event-triggered criteria. Based on stochastic differential equations theory, some sufficient conditions for the existence of H<sub>∞</sub> filter are obtained for the suggested system by employing linear matrix inequality technique. Finally, the desired H<sub>∞</sub> filter gain matrices can be expressed in an explicit form. 展开更多
关键词 Event-Triggered scheme discrete-Time Nonlinear Stochastic Systems Stochastic Finite-Time Stable Linear Matrix Inequalities (LMIS)
在线阅读 下载PDF
A New Class of Simple,General and Efficient Finite Volume Schemes for Overdetermined Thermodynamically Compatible Hyperbolic Systems
14
作者 Saray Busto Michael Dumbser 《Communications on Applied Mathematics and Computation》 EI 2024年第3期1742-1778,共37页
In this paper,a new efficient,and at the same time,very simple and general class of thermodynamically compatiblefinite volume schemes is introduced for the discretization of nonlinear,overdetermined,and thermodynamicall... In this paper,a new efficient,and at the same time,very simple and general class of thermodynamically compatiblefinite volume schemes is introduced for the discretization of nonlinear,overdetermined,and thermodynamically compatiblefirst-order hyperbolic systems.By construction,the proposed semi-discrete method satisfies an entropy inequality and is nonlinearly stable in the energy norm.A very peculiar feature of our approach is that entropy is discretized directly,while total energy conservation is achieved as a mere consequence of the thermodynamically compatible discretization.The new schemes can be applied to a very general class of nonlinear systems of hyperbolic PDEs,including both,conservative and non-conservative products,as well as potentially stiff algebraic relaxation source terms,provided that the underlying system is overdetermined and therefore satisfies an additional extra conservation law,such as the conservation of total energy density.The proposed family offinite volume schemes is based on the seminal work of Abgrall[1],where for thefirst time a completely general methodology for the design of thermodynamically compatible numerical methods for overdetermined hyperbolic PDE was presented.We apply our new approach to three particular thermodynamically compatible systems:the equations of ideal magnetohydrodynamics(MHD)with thermodynamically compatible generalized Lagrangian multiplier(GLM)divergence cleaning,the unifiedfirst-order hyperbolic model of continuum mechanics proposed by Godunov,Peshkov,and Romenski(GPR model)and thefirst-order hyperbolic model for turbulent shallow waterflows of Gavrilyuk et al.In addition to formal mathematical proofs of the properties of our newfinite volume schemes,we also present a large set of numerical results in order to show their potential,efficiency,and practical applicability. 展开更多
关键词 Overdetermined thermodynamically compatible hyperbolic systems Hyperbolic and thermodynamically compatible(HTC)finite volume schemes Abgrall framework discrete entropy inequality Nonlinear stability in the energy norm Applications to ideal magnetohydrodynamics(MHD) Godounov-Peshkov-Romenski(GPR)model of continuum mechanics Turbulent shallow water(TSW)flows
在线阅读 下载PDF
基于迎风格式伴随方程的飞行器边界特性设计方法
15
作者 邓俊 高正红 +2 位作者 黄江涛 赵轲 夏露 《北京航空航天大学学报》 北大核心 2025年第1期281-292,共12页
飞行器的边界特性决定了其安全性和飞行性能,是飞行器设计的难点和重点。引入迎风格式伴随方程和不同的通量限制器处理形式,提高复杂流动问题的伴随方程求解精度、效率和鲁棒性,拓展伴随优化方法在飞行器边界特性设计的应用范围。介绍... 飞行器的边界特性决定了其安全性和飞行性能,是飞行器设计的难点和重点。引入迎风格式伴随方程和不同的通量限制器处理形式,提高复杂流动问题的伴随方程求解精度、效率和鲁棒性,拓展伴随优化方法在飞行器边界特性设计的应用范围。介绍了离散伴随求解梯度的基本原理,在此基础上推导了伴随方程的无黏项及其边界条件的变分形式,根据通量限制器的处理方式,形成一阶精度、二阶精度和混合精度的伴随方程。对伴随方程的边界处理措施进行了研究。通过ONERA M6机翼梯度精度和鲁棒性验证算例,对比迎风格式和中心格式的伴随方程求解性能,分析限制器和边界处理措施对伴随方程的收敛性和梯度精度的影响。通过CRM翼身组合体巡航气动优化设计和边界特性优化设计算例,验证了求解器对飞行器巡航性能设计和边界特性设计的有效性。计算和设计结果表明,建立的迎风格式伴随方程求解方法鲁棒和梯度精度高,能够适用于飞行器边界特性设计难题的求解。 展开更多
关键词 迎风格式 通量限制器 离散伴随方程 梯度计算 边界特性 气动优化
在线阅读 下载PDF
变温壁驱动腔内热蠕流特性的离散统一气体动理学格式模拟
16
作者 刘赞奇 罗源 +2 位作者 翁万良 何清 陶实 《物理学报》 北大核心 2025年第4期200-213,共14页
为考察壁面温度变化对受限空间内稀薄气体流动与传热特性的影响,采用离散统一气体动理学格式(DUGKS)模拟研究了方腔内的热蠕流动.腔体四周为静止漫反射恒温壁面,上、下壁温度则随时间周期性变化.模拟的参数范围如下:变温频率0.5≤S_(t)... 为考察壁面温度变化对受限空间内稀薄气体流动与传热特性的影响,采用离散统一气体动理学格式(DUGKS)模拟研究了方腔内的热蠕流动.腔体四周为静止漫反射恒温壁面,上、下壁温度则随时间周期性变化.模拟的参数范围如下:变温频率0.5≤S_(t)≤5.0、变温振幅0.1≤A_(h)≤0.8和克努森数0.01≤Kn≤10.数值结果表明:方腔内气体流动与传热特性呈现周期性变化,且不会出现反傅里叶热传递.变温频率、振幅和克努森数的提高均可增强腔内热蠕流动强度,且变温壁面附近速度滑移和温度跳跃增大.St和Kn的增大导致出现传热滞后现象,壁面换热能力减弱.特别地,当St=0.5较小时腔内观察到复杂涡流结构;St=5.0时气体由变温壁面向腔体水平中心线均匀流动,涡流消失的同时左、右壁面中点附近由吸热区转变为放热区.A_(h)增大时腔内温度场和速度场结构变化不大,而壁面传热强度减小. 展开更多
关键词 热蠕流 离散统一气体动理学 变温壁面 漫反射边界
在线阅读 下载PDF
Enhancing the Security of He-Kiesler Signature Schemes 被引量:1
17
作者 李春辉 陈一宏 《Journal of Beijing Institute of Technology》 EI CAS 2003年第3期326-328,共3页
Although the He Kiesler signature is said to be proposed based on the discrete logarithm problem and the factorization problem, it has been proved that the signature is not as secure as it was stated to be. A new sig... Although the He Kiesler signature is said to be proposed based on the discrete logarithm problem and the factorization problem, it has been proved that the signature is not as secure as it was stated to be. A new signature scheme is here proposed based on the discrete logarithm problem and the factorization problem to enhance the security of the He Kiesler signature. 展开更多
关键词 digital signture scheme discrete logarithm FACTORING
在线阅读 下载PDF
A NEW PUBLIC-KEY ENCRYPTION SCHEME BASED ON LUCAS SEQUENCE 被引量:2
18
作者 Jiang Zhengtao Hao Yanhua Wang Yumin 《Journal of Electronics(China)》 2005年第5期490-497,共8页
Investigated the properties of LUCas sequence(LUC), the paper proposed a new variant of (probabilistic) public-key encryption scheme. Security analysis of the proposed encryption schemes shows that its one-wayness is ... Investigated the properties of LUCas sequence(LUC), the paper proposed a new variant of (probabilistic) public-key encryption scheme. Security analysis of the proposed encryption schemes shows that its one-wayness is equivalent to partial LUC discrete logarithm problem in ZN, and for the proposed probabilistic encryption scheme, its semantic security is equivalent to decisional LUC Diffie-Hellman problem in ZN. At last, the efficiency of the proposed schemes is briefly analyzed. 展开更多
关键词 Probabilistic public-key encryption scheme LUCas sequence(LUC) discrete logarithm Integer factorization
在线阅读 下载PDF
AN EFFICIENT AND SECURE (t, n) THRESHOLD SECRET SHARING SCHEME 被引量:1
19
作者 Pang Liaojun Sun Xi Wang Yumin 《Journal of Electronics(China)》 2006年第5期731-735,共5页
Based on Shamir’s threshold secret sharing scheme and the discrete logarithm problem, a new (t, n) threshold secret sharing scheme is proposed in this paper. In this scheme, each participant’s secret shadow is selec... Based on Shamir’s threshold secret sharing scheme and the discrete logarithm problem, a new (t, n) threshold secret sharing scheme is proposed in this paper. In this scheme, each participant’s secret shadow is selected by the participant himself, and even the secret dealer cannot gain anything about his secret shadow. All the shadows are as short as the shared secret. Each participant can share many secrets with other partici- pants by holding only one shadow. Without extra equations and information designed for verification, each participant is able to check whether another participant provides the true information or not in the recovery phase. Unlike most of the existing schemes, it is unnecessary to maintain a secure channel between each par- ticipant and the dealer. Therefore, this scheme is very attractive, especially under the circumstances that there is no secure channel between the dealer and each participant at all. The security of this scheme is based on that of Shamir’s threshold scheme and the difficulty in solving the discrete logarithm problem. Analyses show that this scheme is a computationally secure and efficient scheme. 展开更多
关键词 Secret sharing Threshold scheme discrete logarithm
在线阅读 下载PDF
Threshold Decryption Scheme withMultiple Policies
20
作者 FEIRu-chun WANGLi-na 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期243-247,共5页
Based on the difficulty in computing discrete logarilhm and square 1001 onsome special conditions, we propose a basic threshold seeret sharing scheme for multiple secretswith multiple policies, which allows a group of... Based on the difficulty in computing discrete logarilhm and square 1001 onsome special conditions, we propose a basic threshold seeret sharing scheme for multiple secretswith multiple policies, which allows a group of users to share multiple secrttkeys and only onesecret shadow to be ktpt by each user. An efficient threshold decryption scheme with multiplepolicies is designed on the basis of the basic threshold scheme. This decryption scheme allowsmultiple secret keys to he shared among a groupof users, and each user to ketp only one secretshadow. Different public keys can be used to encrypt documents. If and only if the number ofcooperated users who koop the secret shadows is greater than or c-qual to the threshold value of thecorresponding secret key, they can cooperate to decrypt the documents. It is proved that theproposed scheme has very strong security, unless the attackers can solve the discrete logarithmproblem and the square root problem. 展开更多
关键词 multiple secret keys threshold scheme seeret shadow discrete logarithm square root threshold deayp-tion scheme
在线阅读 下载PDF
上一页 1 2 32 下一页 到第
使用帮助 返回顶部