期刊文献+

CONTACT黎曼流形上S.TANNO联络的数量曲率 被引量:2

THE SCAIAR CURVATURE OF S. TANNO' CONNECTION ON CONTACT RIEMANNIAN MANIFOLDS
下载PDF
导出
摘要 自从陈省身和 R.S.Hamilton(见[1])研究3-维紧致 Contact流形上的与 Webster 挠率相关的 Dirichlet energy 以来,对 Contact 流形上几何学的研究取得了很大的进展,获得不少新的成果。特别 N.Tanak 和S.Tanno 讨论了同一流形上 Contact 黎曼结构与 stongly Pseudo—Con-vex 可积 CR-结构的等价性,把 SPC 可积 CR-结构的某些已知结果自然地推广到 Contact 黎曼流形上,丰富了 Contact 黎曼流形的几何内容。为了在Contact 流形上给出相关于 Contact 形式的标准黎曼度量,S.Tanno 讨论了 Contact 流形上的变分问题,并在 Contact 黎曼流形上定义了联络,它是非退化可积 CR-流形上标准仿射联络的自然推广。本文在 Contact 黎曼流形上讨论了关于联络的截面曲率及相关的几个等价条件,并在此基础上给出了联络的曲率张量与数量曲率公式。 Since S.S.chern and R.S.Hamilton have done the research about a critical metric of the Dirichlet energy Concerning the Webster torsion tensor on three-dimensional Contact manifolds. A lot of new geometric results have been given on Contact ma- nifolds. The Canonical affine Connection on a nondegenrate integr- able CR-manifold Was generalized to the Contact Riemannian manifolds by S.TANND,that richen the geometric Content of Contact manifolds One of the important problems in the study of Contact man- ifolds is to find differential geometric propertieswhich are ind- ependent of the choice of Contact forms. The purpose of this paper is,based on S.TANNO' Connect- ion on Contact Riemannian manifolds,to prove four equivatent Condition Concerning the sectional curvature,and give the for- mulas of the Curvature tensor and sclalar curvature.
出处 《东北师大学报(自然科学版)》 CAS CSCD 1990年第1期33-38,共6页 Journal of Northeast Normal University(Natural Science Edition)
关键词 切触黎曼流形 联络 数理曲率 Contact Riemannian Manifolds Nondegenerate Integrable CR structures
  • 相关文献

同被引文献13

  • 1BETHENCOURT J, SAHAI A, WATERS B. Ciphertextpolicy attribute-based encryption [C]// IEEE Symposium on Security and Privacy. Washington: IEEE Computer Society, 2007: 321-334.
  • 2OSTROVSKY R, SAHAI A, WATERS B. Attribute based encryption with non-monotonic access structures [C]// Proceedings of the l~th A CM Conference on Computer and Communications Security. New York: ACM, 2007: 195-203.
  • 3WATERS B. Ciphertext-policy attribute-based encryp- tion: An expressive, efficient, and provably secure realization [C]// l~th International Conference on Practice and Theory in Public Key Cryptography. Taormina, Italy: Springer-Verlag, 2011: 53-70.
  • 4BONEH D, FRANKLIN M. Identity based encryption from the weil pairing [C]// Proceedings of the 21st An- nual International Cryptology Conference on Advances in Cryptology. London: Springer-Verlag, 2001: 213- 229.
  • 5BOLDYREVA A, GOYAL V, KUMAR V. Identity-based encryption with efficient revocation [C]//Proceedings of the 15th ACM Conference on Computer and Com- munications Security. New York: ACM, 2008: 417-426.
  • 6WATERS B. Dual system encryption: realizing fully se- cure ibe and hibe under simple assumptions [C]//29th Annual International Cryptology Conference. Santa Barbara: Springer-Verlag, 2009: 619-636.
  • 7LEWKO A, WATERS B. New techniques for dual system encryption and fully secure hibe with short ciphertexts [C]// 7th Theory of Cryptography Conference. Zurich, Switzerland: Springer-Verlag, 2010: 455-479.
  • 8LEWKO A, OKAMOTO T, SAHAI A, et al. Fully se- cure functional encryption: Attribute-based encryp- tion and (hierarchical) inner product encryption [C]// 29th Annual International Conference on the Theory and Applications of Cryptographie Techniques. French Riviera: Springer-Verlag, 2010: 62-91.
  • 9AIELLO W, LODHA S, OSTROVSKY R. Fast digital identity revocation (extended abstract) [C]// 18th Annual International Cryptology Conference Santa Barbara. Santa Barbara: Springer-Verlag, 1998: 137-152.
  • 10LIBERT B, VERGNAUD D. Adaptive-ID secure revo- cable identity-based encryption [C]// The Cryptographers' Track at the RSA Conference 2009. San Fran- cisco: Springer-Verlag, 2009: 1-15.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部