期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
A Feasible Point Method with Bundle Modification for Nonsmooth Convex Constrained Optimization 被引量:3
1
作者 Jin-bao JIAN chun-ming tang Lu SHI 《Acta Mathematicae Applicatae Sinica》 SCIE CSCD 2018年第2期254-273,共20页
In this paper, a bundle modification strategy is proposed for nonsmooth convex constrained min- imization problems. As a result, a new feasible point bundle method is presented by applying this strategy. Whenever the ... In this paper, a bundle modification strategy is proposed for nonsmooth convex constrained min- imization problems. As a result, a new feasible point bundle method is presented by applying this strategy. Whenever the stability center is updated, some points in the bundle will be substituted by new ones which have lower objective values and/or constraint values, aiming at getting a better bundle. The method generates feasible serious iterates on which the objective function is monotonically decreasing. Global convergence of the algorithm is established, and some preliminary numerical results show that our method performs better than the standard feasible point bundle method. 展开更多
关键词 nonsmooth optimization feasible point method bundle modification global convergence
原文传递
Double-authentication-preventing signatures revisited:new definition and construction from chameleon hash
2
作者 Fei LI Wei GAO +2 位作者 Gui-lin WANG Ke-fei CHEN chun-ming tang 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2019年第2期176-186,共11页
Double-authentication-preventing signature(DAPS) is a novel signature notion proposed at ESORICS2014. The double-authentication-preventing property means that any pair of signatures on two different messages with the ... Double-authentication-preventing signature(DAPS) is a novel signature notion proposed at ESORICS2014. The double-authentication-preventing property means that any pair of signatures on two different messages with the same subject will result in an immediate collapse of the signature system. A few potential applications of DAPS have been discussed by its inventors, such as providing a kind of self-enforcement to discourage certificate authority(CA) from misbehaving in public key infrastructure and offering CA some cryptographic arguments to resist legal coercion. In this study, we focus on some fundamental issues on DAPS. We propose a new definition,which is slightly weakened but still reasonable and strong enough to capture the DAPS concept. We develop the new notion of invertible chameleon hash functions with key exposure. Then we propose a generic DAPS scheme, which is provably secure if the underlying invertible chameleon hash function with key exposure is secure. We instantiate this general construction to obtain the DAPS schemes respectively based on the well-known assumptions of integer factorization, Rivest-Shamir-Adleman(RSA), and computational Diffie-Hellman(CDH). They are more efficient than previous DAPS schemes. Furthermore, unlike previous constructions, the trusted setup condition is not needed by our DAPS schemes based on RSA and CDH. 展开更多
关键词 Double-authentication-preventing SIGNATURES CHAMELEON HASH function Digital signature Provable security AUTHORITY trust level
原文传递
The Complexity and Randomness of Linear Multi-secret Sharing Schemes with Non-threshold Structures
3
作者 chun-ming tang Shu-guang DAI 《Acta Mathematicae Applicatae Sinica》 SCIE CSCD 2014年第4期1073-1084,共12页
In a linear multi-secret sharing scheme with non-threshold structures, several secret values are shared among n participants, and every secret value has a specified access structure. The efficiency of a multi- secret ... In a linear multi-secret sharing scheme with non-threshold structures, several secret values are shared among n participants, and every secret value has a specified access structure. The efficiency of a multi- secret sharing scheme is measured by means of the complexity a and the randomness . Informally, the com- plexity a is the ratio between the maximum of information received by each participant and the minimum of information corresponding to every key. The randomness is the ratio between the amount of information distributed to the set of users U = {1, …, n} and the minimum of information corresponding to every key. In this paper, we discuss a and of any linear multi-secret sharing schemes realized by linear codes with non-threshold structures, and provide two algorithms to make a and to be the minimum, respectively. That is, they are optimal. 展开更多
关键词 secret sharing multi-secret sharing scheme non-threshold multi-access structure linear code COMPLEXITY RANDOMNESS
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部