期刊文献+
共找到48篇文章
< 1 2 3 >
每页显示 20 50 100
An Unbounded Fully Homomorphic Encryption Scheme Based on Ideal Lattices and Chinese Remainder Theorem
1
作者 Zhiyong Zheng Fengxia Liu Kun Tian 《Journal of Information Security》 2023年第4期366-395,共30页
We propose an unbounded fully homomorphic encryption scheme, i.e. a scheme that allows one to compute on encrypted data for any desired functions without needing to decrypt the data or knowing the decryption keys. Thi... We propose an unbounded fully homomorphic encryption scheme, i.e. a scheme that allows one to compute on encrypted data for any desired functions without needing to decrypt the data or knowing the decryption keys. This is a rational solution to an old problem proposed by Rivest, Adleman, and Dertouzos [1] in 1978, and to some new problems that appeared in Peikert [2] as open questions 10 and open questions 11 a few years ago. Our scheme is completely different from the breakthrough work [3] of Gentry in 2009. Gentry’s bootstrapping technique constructs a fully homomorphic encryption (FHE) scheme from a somewhat homomorphic one that is powerful enough to evaluate its own decryption function. To date, it remains the only known way of obtaining unbounded FHE. Our construction of an unbounded FHE scheme is straightforward and can handle unbounded homomorphic computation on any refreshed ciphertexts without bootstrapping transformation technique. 展开更多
关键词 Fully Homomorphic Encryption Ideal Lattices Chinese remainder Theorem General Compact Knapsacks Problem
下载PDF
Diophantine Quotients and Remainders with Applications to Fermat and Pythagorean Equations
2
作者 Prosper Kouadio Kimou François Emmanuel Tanoé 《American Journal of Computational Mathematics》 2023年第1期199-210,共12页
Diophantine equations have always fascinated mathematicians about existence, finitude, and the calculation of possible solutions. Among these equations, one of them will be the object of our research. This is the Pyth... Diophantine equations have always fascinated mathematicians about existence, finitude, and the calculation of possible solutions. Among these equations, one of them will be the object of our research. This is the Pythagoras’- Fermat’s equation defined as follows.                                                                                         (1) when , it is well known that this equation has an infinity of solutions but has none (non-trivial) when . We also know that the last result, named Fermat-Wiles theorem (or FLT) was obtained at great expense and its understanding remains out of reach even for a good fringe of professional mathematicians. The aim of this research is to set up new simple but effective tools in the treatment of Diophantine equations and that of Pythagoras-Fermat. The tools put forward in this research are the properties of the quotients and the Diophantine remainders which we define as follows. Let a non-trivial triplet () solution of Equation (1) such that . and are called the Diophantine quotients and remainders of solution . We compute the remainder and the quotient of b and c by a using the division algorithm. Hence, we have: and et with . We prove the following important results. if and only if and if and only if . Also, we deduce that or for any hypothetical solution . We illustrate these results by effectively computing the Diophantine quotients and remainders in the case of Pythagorean triplets using a Python program. In the end, we apply the previous properties to directly prove a partial result of FLT. . 展开更多
关键词 Diophantine Equation Modular Arithmetic Fermat-Wiles Theorem Pythagorean Triplets Division Theorem Division Algorithm Python Program Diophantine Quotients Diophantine remainders
下载PDF
Lie Symmetries and Conserved Quantities of Holonomic Systems with Remainder Coordinates 被引量:1
3
作者 梅凤翔 《Journal of Beijing Institute of Technology》 EI CAS 1998年第1期26-31,共6页
Aim To study the Lie symmetries and the consered quantities of the holonomic systems with remainder coordinates. Methods Using the invariance of the ordinary differential equations under the infinitesimal transformati... Aim To study the Lie symmetries and the consered quantities of the holonomic systems with remainder coordinates. Methods Using the invariance of the ordinary differential equations under the infinitesimal transformations to establish the determining equations and the restriction equations of the Lie symmetries of the systems. Results and Conclusion the structure equation and the form of conserved quantities were obtained. An example was given to illustrate the application of the result. 展开更多
关键词 analytical mechanics remainder coordinate Lie symmetry conserved quantity
下载PDF
Research on Auto-detection for Remainder Particles of Aerospace Relay Based on Wavelet Analysis 被引量:17
4
作者 GAO Hong-liang ZHANG Hui WANG Shu-juan 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2007年第1期75-80,共6页
Aerospace relay is one kind of electronic components which is used widely in national defense system and aerospace system. The existence of remainder particles induces the reliability declining, which has become a sev... Aerospace relay is one kind of electronic components which is used widely in national defense system and aerospace system. The existence of remainder particles induces the reliability declining, which has become a severe problem in the development of aerospace relay. Traditional particle impact noise detection (PIND) method for remainder detection is ineffective for small particles, due to its low precision and involvement of subjective factors. An auto-detection method for PIND output signals is proposed in this paper, which is based on direct wavelet de-noising (DWD), cross-correlation analysis (CCA) and homo-filtering (HF), the method enhances the affectivity of PIND test about the small particles. In the end, some practical PIND output signals are analysed, and the validity of this new method is proved. 展开更多
关键词 aerospace relay remainder particles PIND wavelet analysis
下载PDF
Quantum Secret Sharing Based on Chinese Remainder Theorem 被引量:3
5
作者 施荣华 粟倩 +1 位作者 郭迎 李门浩 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第4期573-578,共6页
A novel quantum secret sharing (QSS) scheme is proposed on the basis of Chinese Remainder Theorem (CRT). In the scheme, the classical messages are mapped to secret sequences according to CRT equations, and distrib... A novel quantum secret sharing (QSS) scheme is proposed on the basis of Chinese Remainder Theorem (CRT). In the scheme, the classical messages are mapped to secret sequences according to CRT equations, and distributed to different receivers by different dimensional superdense-coding respectively. CRT's secret sharing function, together with high-dimensional superdense-eoding, provide convenience, security, and large capability quantum channel for secret distribution and recovering. Analysis shows the security of the scheme. 展开更多
关键词 quantum secret sharing Chinese remainder Theorem quantum superdense-coding
下载PDF
Generalized Lutzky Conserved Quantities of Holonomic Systems with Remainder Coordinates Subjected to Unilateral Constraints 被引量:2
6
作者 ZHANG Yi 《Communications in Theoretical Physics》 SCIE CAS CSCD 2006年第4期732-736,共5页
This paper focuses on studying the relation between a velocity-dependent symmetry and a generalized Lutzky conserved quantity for a holonomic system with remainder coordinates subjected to unilateral constraints. The ... This paper focuses on studying the relation between a velocity-dependent symmetry and a generalized Lutzky conserved quantity for a holonomic system with remainder coordinates subjected to unilateral constraints. The differential equations of motion of the system are established, and the definition of Lie symmetry for the system is given. The conditions under which a Lie symmetry can directly lead up to a generalized Lutzky conserved quantity and the form of the new conserved quantity are obtained, and an example is given to illustrate the application of the results. 展开更多
关键词 analytical mechanics remainder coordinate unilateral constraint holonomic system SYMMETRY conserved quantity
下载PDF
Order of Dirichlet Series in the Whole Plane and Remainder Estimation 被引量:2
7
作者 黄慧珺 宁菊红 《Chinese Quarterly Journal of Mathematics》 2015年第4期515-523,共9页
In this paper, firstly, the p order and pz order of Dirichlet series which converges in the whole plane are studied. Secondly, the equivalence relation between remainder logarithm In En-1 (f, α), In Rn(f, α) and... In this paper, firstly, the p order and pz order of Dirichlet series which converges in the whole plane are studied. Secondly, the equivalence relation between remainder logarithm In En-1 (f, α), In Rn(f, α) and coefficients logarithm In |an| is discussed respectively. Finally, the theory of applying remainder to estimate ρorder and ρβ order can be obtained by using the equivalence relation. 展开更多
关键词 Dirichlet series ρ order ρβorder remainder estimation
下载PDF
AN INTEGRATION METHOD WITH FITTING CUBIC SPLINE FUNCTIONS TO A NUMERICAL MODEL OF 2ND-ORDER SPACE-TIME DIFFERENTIAL REMAINDER——FOR AN IDEAL GLOBAL SIMULATION CASE WITH PRIMITIVE ATMOSPHERIC EQUATIONS
8
作者 辜旭赞 张兵 王明欢 《Journal of Tropical Meteorology》 SCIE 2013年第4期388-396,共9页
In this paper,the forecasting equations of a 2nd-order space-time differential remainder are deduced from the Navier-Stokes primitive equations and Eulerian operator by Taylor-series expansion.Here we introduce a cubi... In this paper,the forecasting equations of a 2nd-order space-time differential remainder are deduced from the Navier-Stokes primitive equations and Eulerian operator by Taylor-series expansion.Here we introduce a cubic spline numerical model(Spline Model for short),which is with a quasi-Lagrangian time-split integration scheme of fitting cubic spline/bicubic surface to all physical variable fields in the atmospheric equations on spherical discrete latitude-longitude mesh.A new algorithm of"fitting cubic spline—time step integration—fitting cubic spline—……"is developed to determine their first-and2nd-order derivatives and their upstream points for time discrete integral to the governing equations in Spline Model.And the cubic spline function and its mathematical polarities are also discussed to understand the Spline Model’s mathematical foundation of numerical analysis.It is pointed out that the Spline Model has mathematical laws of"convergence"of the cubic spline functions contracting to the original functions as well as its 1st-order and 2nd-order derivatives.The"optimality"of the 2nd-order derivative of the cubic spline functions is optimal approximation to that of the original functions.In addition,a Hermite bicubic patch is equivalent to operate on a grid for a 2nd-order derivative variable field.Besides,the slopes and curvatures of a central difference are identified respectively,with a smoothing coefficient of 1/3,three-point smoothing of that of a cubic spline.Then the slopes and curvatures of a central difference are calculated from the smoothing coefficient 1/3 and three-point smoothing of that of a cubic spline,respectively.Furthermore,a global simulation case of adiabatic,non-frictional and"incompressible"model atmosphere is shown with the quasi-Lagrangian time integration by using a global Spline Model,whose initial condition comes from the NCEP reanalysis data,along with quasi-uniform latitude-longitude grids and the so-called"shallow atmosphere"Navier-Stokes primitive equations in the spherical coordinates.The Spline Model,which adopted the Navier-Stokes primitive equations and quasi-Lagrangian time-split integration scheme,provides an initial ideal case of global atmospheric circulation.In addition,considering the essentially non-linear atmospheric motions,the Spline Model could judge reasonably well simple points of any smoothed variable field according to its fitting spline curvatures that must conform to its physical interpretation. 展开更多
关键词 NUMERICAL forecast and NUMERICAL SIMULATION 2nd-order SPACE-TIME differential remainder NUMERICAL model cubic spline functions Navier-Stokes PRIMITIVE EQUATIONS quasi-Lagrangian time-split integration scheme global SIMULATION case
下载PDF
Fast Arithmetics Using Chinese Remaindering
9
作者 George Davida Bruce Litow 《China Communications》 SCIE CSCD 2007年第4期45-47,共3页
In this paper,some issues concerning the Chinese remaindering representation are discussed.A new converting method is described. An efficient refinement of the division algorithm of Chiu,Davida and Litow is given.
关键词 WILL NCI Fast Arithmetics Using Chinese remaindering 一刀
下载PDF
A method based on Chinese remainder theorem with all phase DFT for DOA estimation in sparse array
10
作者 CAO Chenghu ZHAO Yongbo +2 位作者 PANG Xiaojiao XU Baoqing CHEN Sheng 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2020年第1期1-11,共11页
This paper takes further insight into the sparse geometry which offers a larger array aperture than uniform linear array(ULA)with the same number of physical sensors.An efficient method based on closed-form robust Chi... This paper takes further insight into the sparse geometry which offers a larger array aperture than uniform linear array(ULA)with the same number of physical sensors.An efficient method based on closed-form robust Chinese remainder theorem(CFRCRT)is presented to estimate the direction of arrival(DOA)from their wrapped phase with permissible errors.The proposed algorithm has significantly less computational complexity than the searching method while maintaining similar estimation precision.Furthermore,we combine all phase discrete Fourier transfer(APDFT)and the CFRCRT algorithm to achieve a considerably high DOA estimation precision.Both the theoretical analysis and simulation results demonstrate that the proposed algorithm has a higher estimation precision as well as lower computation complexity. 展开更多
关键词 direction of arrival(DOA) wrapped phase closedform robust Chinese remainder theorem(CFRCRT) all phase discrete Fourier transfer(APDFT)
下载PDF
THE REMAINDER-EFFECT ANALYSIS OF FINITE DIFFERENCE SCHEMES AND THE APPLICATIONS
11
作者 刘儒勋 周朝晖 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 1995年第1期87-96,共10页
In the present paper two contents are enclosed .First ,the Fourier analysis approach of the dispersion relation and group velocity effect of finite difference schemes is discussed.the defects of the approach is pointe... In the present paper two contents are enclosed .First ,the Fourier analysis approach of the dispersion relation and group velocity effect of finite difference schemes is discussed.the defects of the approach is pointed out and the correction is made;Second,a new systematic analysis method -remaider -effect analysis (abbr.REAM)is proposed by means of the modified partial differential equations (abbr MPDE)of finite difference schemes.The analysis is based on the synthetical study of the rational dispersion-and dissipation relations of finite difference schemes.And the method clearly possesses constructivity 展开更多
关键词 finite difference scheme.remainder effect group velocity
下载PDF
Chinese Remainder Codes
12
作者 张爱丽 刘秀峰 靳蕃 《Journal of Southwest Jiaotong University(English Edition)》 2004年第1期73-78,共6页
Chinese Remainder Codes are constructed by applying weak block designs and Chinese Remainder Theorem of ring theory. The new type of linear codes take the congruence class in the congruence class ring R/I 1∩I 2∩..... Chinese Remainder Codes are constructed by applying weak block designs and Chinese Remainder Theorem of ring theory. The new type of linear codes take the congruence class in the congruence class ring R/I 1∩I 2∩...∩I n for the information bit, embed R/J i into R/I 1∩I 2∩...∩I n, and asssign the cosets of R/J i as the subring of R/I 1∩I 2∩...∩I n and the cosets of R/J i in R/I 1∩I 2∩...∩I n as check lines. There exist many code classes in Chinese Remainder Codes, which have high code rates. Chinese Remainder Codes are the essential generalization of Sun Zi Codes. 展开更多
关键词 Block design Chinese remainder Theorem Error-correcting codes Sun Zi Codes
下载PDF
Quantum Group Signature Scheme Based on Chinese Remainder Theorem
13
作者 Xin Sun Ying Guo +3 位作者 Jinjing Shi Wei Zhang Qin Xiao Moon Ho Lee 《Journal of Software Engineering and Applications》 2013年第5期16-20,共5页
A novel quantum group signature scheme is proposed based on Chinese Remainder Theorem (CRT), in order to improve the security of quantum signature. The generation and verification of the signature can be successfully ... A novel quantum group signature scheme is proposed based on Chinese Remainder Theorem (CRT), in order to improve the security of quantum signature. The generation and verification of the signature can be successfully conducted only if all the participants cooperate with each other and with the message owner's and the arbitrator's help. The quantum parallel algorithm is applied to efficiently compare the restored quantum message to the original quantum message. All the operations in signing and verifying phase can be executed in quantum circuits. It has a wide application to E-payment system, Online contract, Online notarization and etc. 展开更多
关键词 QUANTUM SIGNATURE GROUP SIGNATURE Chinese remainder THEOREM
下载PDF
New Asymptotic Results on Fermat-Wiles Theorem
14
作者 Kimou Kouadio Prosper Kouakou Kouassi Vincent Tanoé François 《Advances in Pure Mathematics》 2024年第6期421-441,共21页
We analyse the Diophantine equation of Fermat xp yp = zp with p > 2 a prime, x, y, z positive nonzero integers. We consider the hypothetical solution (a, b, c) of previous equation. We use Fermat main divisors, Dio... We analyse the Diophantine equation of Fermat xp yp = zp with p > 2 a prime, x, y, z positive nonzero integers. We consider the hypothetical solution (a, b, c) of previous equation. We use Fermat main divisors, Diophantine remainders of (a, b, c), an asymptotic approach based on Balzano Weierstrass Analysis Theorem as tools. We construct convergent infinite sequences and establish asymptotic results including the following surprising one. If z y = 1 then there exists a tight bound N such that, for all prime exponents p > N , we have xp yp zp. 展开更多
关键词 Fermat’s Last Theorem Fermat-Wiles Theorem Kimou’s Divisors Diophantine Quotient Diophantine remainders Balzano Weierstrass Analysis Theorem
下载PDF
Range estimation based on symmetry polynomial aided Chinese remainder theorem for multiple targets in a pulse Doppler radar 被引量:2
15
作者 Chenghu CAO Yongbo ZHAO 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2022年第2期304-316,共13页
To avoid Doppler ambiguity,pulse Doppler radar may operate on a high pulse repetition frequency(PRF).The use of a high PRF can,however,lead to range ambiguity in many cases.At present,the major efficient solution to s... To avoid Doppler ambiguity,pulse Doppler radar may operate on a high pulse repetition frequency(PRF).The use of a high PRF can,however,lead to range ambiguity in many cases.At present,the major efficient solution to solve range ambiguity is based on a waveform design scheme.It adds complexity to a radar system.However,the traditional multiple-PRF-based scheme is difficult to be applied in multiple targets because of unknown correspondence between the target range and measured range,especially using the Chinese remainder theorem(CRT)algorithm.We make a study of the CRT algorithm for multiple targets when the residue set contains noise error.In this paper,we present a symmetry polynomial aided CRT algorithm to effectively achieve range estimation of multiple targets when the measured ranges are overlapped with noise error.A closed-form and robust CRT algorithm for single target and the Aitken acceleration algorithm for finding roots of a polynomial equation are used to decrease the computational complexity of the proposed algorithm. 展开更多
关键词 Range ambiguity Erroneous range Multiple targets Symmetry polynomial aided Chinese remainder theorem
原文传递
A proactive secret sharing scheme based on Chinese remainder theorem 被引量:1
16
作者 Keju MENG Fuyou MIAO +3 位作者 Yu NING Wenchao HUANG Yan XIONG Chin-Chen CHANG 《Frontiers of Computer Science》 SCIE EI CSCD 2021年第2期133-142,共10页
If an adversary tries to obtain a secret s in a(t,n)threshold secret sharing(SS)scheme,it has to capture no less than t shares instead of the secret s directly.However,if a shareholder keeps a fixed share for a long t... If an adversary tries to obtain a secret s in a(t,n)threshold secret sharing(SS)scheme,it has to capture no less than t shares instead of the secret s directly.However,if a shareholder keeps a fixed share for a long time,an adversary may have chances to filch some shareholders’shares.In a proactive secret sharing(PSS)scheme,shareholders are supposed to refresh shares at fixed period without changing the secret.In this way,an adversary can recover the secret if and only if it captures at least t shares during a period rather than any time,and thus PSS provides enhanced protection to long-lived secrets.The existing PSS schemes are almost based on linear SS but no Chinese Remainder Theorem(CRT)-based PSS scheme was proposed.This paper proposes a PSS scheme based on CRT for integer ring to analyze the reason why traditional CRT-based SS is not suitable to design PSS schemes.Then,an ideal PSS scheme based on CRT for polynomial ring is also proposed.The scheme utilizes isomorphism of CRT to implement efficient share refreshing. 展开更多
关键词 proactive secret sharing Chinese remainder theorem polynomial ring integer ring ISOMORPHISM
原文传递
Remainder terms for several inequalities on some groups of Heisenberg-type
17
作者 LIU HePing ZHANG An 《Science China Mathematics》 SCIE CSCD 2015年第12期2565-2580,共16页
We give estimates of the remainder terms for several conformally-invariant Sobolev-type inequalities on the Heisenberg group. By considering the variations of associated functionals, we give a stability for two dual i... We give estimates of the remainder terms for several conformally-invariant Sobolev-type inequalities on the Heisenberg group. By considering the variations of associated functionals, we give a stability for two dual inequalities: The fractional Sobolev(FS) and Hardy-Littlewood-Sobolev(HLS) inequalities, in terms of distance to the submanifold of extremizers. Then we compare their remainder terms to improve the inequalities in another way. We also compare, in the limit case, the remainder terms of Beckner-Onofri(BO) inequality and its dual logarithmic Hardy-Littlewood-Sobolev(Log-HLS) inequality. Besides, we also list without proof some results for other groups of Iwasawa-type. Our results generalize earlier works on Euclidean spaces of Chen et al.(2013) and Dolbeault and Jankowiak(2014) onto some groups of Heisenberg-type. We worked for "almost"all fractions especially for comparing results, and the stability of HLS is also absolutely new, even for Euclidean case. 展开更多
关键词 remainder terms stability Sobolev-type inequalities Heisenberg groups
原文传递
The Generalization of the Chinese Remainder Theorem
18
作者 Li Rong YU Digital Communication. Technical Research Institute. Beijing 100083. P. R. China Li Bo LUO Department of Mathematics. Beijing Normal University. Beijing 100875. P. R. China Guangdong Women’s Professional College. Guangdong 510300. P. R. China 《Acta Mathematica Sinica,English Series》 SCIE CSCD 2002年第3期531-538,共8页
We generalize the Chinese Remainder Theorem. use it to study number theory models, compare and analyse several number theory theorems in non-standard number theory models.
关键词 Non-standard number THN model Chinese remainder Theorem
原文传递
A Fast Method to Compute the Inertia of Bezout Matrix and Its Application 被引量:2
19
作者 冯琴荣 《Chinese Quarterly Journal of Mathematics》 CSCD 2001年第1期52-58,共7页
In this paper, we present a fast and fraction free procedure for computing the inertia of Bezout matrix and we can determine the numbers of different real roots and different pairs of conjugate complex roots of a pol... In this paper, we present a fast and fraction free procedure for computing the inertia of Bezout matrix and we can determine the numbers of different real roots and different pairs of conjugate complex roots of a polynomial equation with integer coefficients quickly based on this result. 展开更多
关键词 Bezout matrix polynomial remainder sequence INERTIA polynomial equation squarefree
下载PDF
Applying two channels to vector space secret sharing based multi-signature scheme 被引量:1
20
作者 肖清华 平玲娣 +1 位作者 陈小平 潘雪增 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第1期56-62,共7页
Secret sharing and digital signature is an important research area in information security and has wide applications in such fields as safeguarding and legal use of confidential information, secure multiparty computat... Secret sharing and digital signature is an important research area in information security and has wide applications in such fields as safeguarding and legal use of confidential information, secure multiparty computation and electronic commerce. But up to now, study of signature based on general vector space secret sharing is very weak. Aiming at this drawback, the authors did some research on vector space secret sharing against cheaters, and proposed an efficient but secure vector space secret sharing based multi-signature scheme, which is implemented in two channels. In this scheme, the group signature can be easily produced if an authorized subset of participants pool their secret shadows and it is impossible for them to generate a group signature if an unauthorized subset of participants pool their secret shadows. The validity of the group signature can be verified by means of verification equations. A group signature of authorized subset of participants cannot be impersonated by any other set of partici- pants. Moreover, the suspected forgery can be traced, and the malicious participants can be detected in the scheme. None of several possible attacks can successfully break this scheme. 展开更多
关键词 Vector space secret sharing MULTI-SIGNATURE Discrete logarithm Chinese remainder theorem
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部