期刊文献+

有限域上遍历矩阵的特性研究 被引量:6

On the Properties of the Ergodic Matrix over Finite Field
原文传递
导出
摘要 对有限域上遍历矩阵的性质进行了分析,给出了有限域上遍历矩阵的计数定理,并对遍历矩阵序对(A,B)关于矩阵M的双侧幂乘集〈A〉M〈B〉的秩及基数进行了全面分析.给出了R_k(A,B)集的构成及其基数的有关定理,所得到的结论对利用遍历矩阵实现有关的公钥密码具有理论上的指导意义. We analyzed the properties of the ergodic matrix over finite field,And deduced the theorem on the number of the ergodic matrices over finite fields.We also comprehensively analyzes the rank and cardinal number of the two-side exponentiation set about the given matrix M and the ergodic matrix pair(A,B).And given the related theorems about the structure and cardinal number of the set.The results have the important theoretical significance for constructing the public key cryptography based on the ergodic matrices.
出处 《数学学报(中文版)》 SCIE CSCD 北大核心 2012年第3期457-468,共12页 Acta Mathematica Sinica:Chinese Series
基金 "十一五"国家密码发展基金资助项目(2006L014J00002)
关键词 有限域 遍历矩阵 遍历矩阵的双侧幂乘集 finite field ergodic matrix two-side exponentiation set of ergodic matrix pair
  • 相关文献

参考文献12

  • 1赵永哲,赵博,裴士辉,姜占华.HFEM公钥密码方案的设计与实现[J].通信学报,2011,32(6):24-31. 被引量:11
  • 2裴士辉,赵永哲,赵宏伟.基于遍历矩阵的公钥加密方案[J].电子学报,2010,38(8):1908-1913. 被引量:11
  • 3Lin D.D.Algebra Basis & Finite Field[]..2006
  • 4Lidl,R.,Niederreiter,H. Introduction to Finite Fields and Their Applications . 1986
  • 5Darafsheh,M. R.The maximum element order in the groups related to linear group8 which is a multiple of the defining characteristic[].Finite Fields and Their Applications.2008
  • 6Green,J.A.The characters of the finite general linear groups[].Transactions of the American Mathematical Society.1955
  • 7Shi W,Xiao Y.Quotient of the Group and the Number of Conjugacy[].Southeat Asian Bulletin ofMathematics.1998
  • 8M. R. Darafsheh.Order of elements in the groups related to the general linear group[].Finite Fields and Their Applications.2005
  • 9M. R. Darafsheh.Order of elements in the groups related to the general linear group[].Finite Fields and Their Applications.2005
  • 10Darafsheh,M. R.The maximum element order in the groups related to linear group8 which is a multiple of the defining characteristic[].Finite Fields and Their Applications.2008

二级参考文献28

  • 1赵永哲,黄声烈,姜占华.GF(2^k)上的遍历矩阵及其特性分析[J].小型微型计算机系统,2005,26(12):2135-2139. 被引量:14
  • 2PEI Shihui ZHAO Hongwei ZHAO Yongzhe.Public Key Cryptography Based on Ergodic Matrices over Finite Field[J].Wuhan University Journal of Natural Sciences,2006,11(6):1525-1528. 被引量:8
  • 3J Proos,C Zalka.Shor’s discrete logarithm quantum algorithm for elliptic curves .http://arxiv.org/abs/quant-ph/0301141,2003-1-25.
  • 4T G Draper.Addition on a quantum computer .http://arxiv.org/abs/quant-ph/ 0008033,2000-9-7.
  • 5L M K Vandersypen,M Steffen,G Breyta,C S Yannoni,M H Sherwood,I L Chuang.Experimental realization of Shor’s quantum factoring algorithm using nuclear magnetic resonance[J].Nature,2001,414(6866):883-887.
  • 6H Hfner,W Hsel,C F Roos,J Benhelm,D Chek al kar,M Chwalla,T Kber,U D Rapol,M Riebe,P O Schmidt,C Becher,O Ghne,W Dr,R Blatt.Scalable multiparticle entanglement of trapped ions[J].Nature,2005,438(7068):643-646.
  • 7S Micali,C Rackoff,B Sloan.The notion of security for probabilistic cryptosystems[J].SIAM Journal on Computing,1988,17(2):412-426.
  • 8Pei Shi-hui,Zhao Yong-zhe,Zhao Hong-wei.Construct public key encryption scheme using ergodic matrices over GF(2) .Proceedings of the 4th International Conference on Theory and Applications of Models of Computation,TAMC 2007 .Berlin:Springer-Verlag,2007.181-188.
  • 9M Abdalla,M Bellare,P Rogaway.The oracle Diffie-Hellman assumptions and an analysis of DHIES .Topics in Cryptology CT-RSA 2001 .Berlin:Springer-Verlag,2001.143-158.
  • 10M Bellare,A Desai,E Jokipii,P.Rogaway.A concrete security treatment of symmetric encryption:analysis of the DES mode of operation .Proceedings of the 38th Annual Symposium on Foundations of Computer Science .Los Alamitos:IEEE Computer Society Press,1997.394-403.

共引文献14

同被引文献27

引证文献6

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部