期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Effects of T-Factor on Quantum Annealing Algorithms for Integer Factoring Problem
1
作者 Zhiqi Liu Shihui Zheng +2 位作者 Xingyu Yan Ping Pan Licheng Wang 《Journal of Quantum Computing》 2023年第1期41-54,共14页
The hardness of the integer factoring problem(IFP)plays a core role in the security of RSA-like cryptosystems that are widely used today.Besides Shor’s quantum algorithm that can solve IFP within polynomial time,quan... The hardness of the integer factoring problem(IFP)plays a core role in the security of RSA-like cryptosystems that are widely used today.Besides Shor’s quantum algorithm that can solve IFP within polynomial time,quantum annealing algorithms(QAA)also manifest certain advantages in factoring integers.In experimental aspects,the reported integers that were successfully factored by using the D-wave QAA platform are much larger than those being factored by using Shor-like quantum algorithms.In this paper,we report some interesting observations about the effects of QAA for solving IFP.More specifically,we introduce a metric,called T-factor that measures the density of occupied qubits to some extent when conducting IFP tasks by using D-wave.We find that T-factor has obvious effects on annealing times for IFP:The larger of T-factor,the quicker of annealing speed.The explanation of this phenomenon is also given. 展开更多
关键词 Quantum annealing algorithm integer factorization problem T-factor D-WAVE
下载PDF
New signature scheme based on two cryptographic assumptions 被引量:2
2
作者 郑明辉 崔国华 《Journal of Southeast University(English Edition)》 EI CAS 2007年第3期461-464,共4页
In order to improve the security of the signature scheme, a digital signature based on two hard-solved problems is proposed. The discrete logarithm problem and the factoring problem are two well known hard- solved mat... In order to improve the security of the signature scheme, a digital signature based on two hard-solved problems is proposed. The discrete logarithm problem and the factoring problem are two well known hard- solved mathematical problems. Combining the E1Gamal scheme based on the discrete logarithm problem and the OSS scheme based on the factoring problem, a digital signature scheme based on these two cryptographic assumptions is proposed. The security of the proposed scheme is based on the difficulties of simultaneously solving the factoring problem and the discrete logarithm problem. So the signature scheme will be still secure under the situation that any one of the two hard-problems is solved. Compared with previous schemes, the proposed scheme is more efficient in terms of space storage, signature length and computation complexities. 展开更多
关键词 digital signature SECURITY factoring problem discrete logarithm problem
下载PDF
Colluding attacks on a group signature scheme 被引量:1
3
作者 郭兴阳 唐朝京 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第10期1011-1014,共4页
Xie and Yu (2005) proposed a group signature scheme and claimed that it is the most efficient group signature scheme so far and secure. In this paper, we show that two dishonest group members can collude to launch two... Xie and Yu (2005) proposed a group signature scheme and claimed that it is the most efficient group signature scheme so far and secure. In this paper, we show that two dishonest group members can collude to launch two attacks on the scheme. In the first attack they can derive the group secret key and then generate untraceable group signatures. In the second attack, they can impersonate other group members once they see their signatures. Therefore we conclude that the signature scheme is not secure. We show that some parameters should be carefully selected in the scheme to resist our attacks. 展开更多
关键词 Group signature Colluding attack Factoring problem
下载PDF
A novel group signature with one time secret key
4
作者 谢琪 于秀源 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第6期560-564,共5页
A new group signature with one time secret key is proposed. The main merits are that it only needs the trusted center issuing the partial secret key one time for each group member; and that the group member can genera... A new group signature with one time secret key is proposed. The main merits are that it only needs the trusted center issuing the partial secret key one time for each group member; and that the group member can generate his different secret key each time when he wants to sign a message. The group public key is constant and the size of the signature is independent of the number of group members. The total computation cost of signature and verification requires only 8 modular exponentiations. 展开更多
关键词 CRYPTOGRAPHY Group signature Discrete logarithm problem Factoring problem
下载PDF
A CLASS OF FACTORIZED QUASI-NEWTON METHODS FOR NONLINEAR LEAST SQUARES PROBLEMS 被引量:4
5
作者 C.X. Xu X.F. Ma M.Y. Kong(Department of Mathematics, Xi’an Jiaotong University, Xi’an, China) 《Journal of Computational Mathematics》 SCIE CSCD 1996年第2期143-158,共16页
This paper gives a class of descent methods for nonlinear least squares solution. A class of updating formulae is obtained by using generalized inverse matrices. These formulae generate an approximation to the second ... This paper gives a class of descent methods for nonlinear least squares solution. A class of updating formulae is obtained by using generalized inverse matrices. These formulae generate an approximation to the second part of the Hessian matrix of the objective function, and are updated in such a way that the resulting approximation to the whole Hessian matrix is the convex class of Broyden-like up-dating formulae. It is proved that the proposed updating formulae are invariant under linear transformation and that the class of factorized quasi-Newton methods are locally and superlinearly convergent. Numerical results are presented and show that the proposed methods are promising. 展开更多
关键词 BFGS A CLASS OF FACTORIZED QUASI-NEWTON METHODS FOR NONLINEAR LEAST SQUARES problemS
原文传递
Past review,current progress,and challenges ahead on the cocktail party problem 被引量:3
6
作者 Yan-min QIAN Chao WENG +2 位作者 Xuan-kai CHANG Shuai WANG Dong YU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2018年第1期40-63,共24页
The cocktail party problem,i.e.,tracing and recognizing the speech of a specific speaker when multiple speakers talk simultaneously,is one of the critical problems yet to be solved to enable the wide application of au... The cocktail party problem,i.e.,tracing and recognizing the speech of a specific speaker when multiple speakers talk simultaneously,is one of the critical problems yet to be solved to enable the wide application of automatic speech recognition(ASR) systems.In this overview paper,we review the techniques proposed in the last two decades in attacking this problem.We focus our discussions on the speech separation problem given its central role in the cocktail party environment,and describe the conventional single-channel techniques such as computational auditory scene analysis(CASA),non-negative matrix factorization(NMF) and generative models,the conventional multi-channel techniques such as beamforming and multi-channel blind source separation,and the newly developed deep learning-based techniques,such as deep clustering(DPCL),the deep attractor network(DANet),and permutation invariant training(PIT).We also present techniques developed to improve ASR accuracy and speaker identification in the cocktail party environment.We argue effectively exploiting information in the microphone array,the acoustic training set,and the language itself using a more powerful model.Better optimization ob jective and techniques will be the approach to solving the cocktail party problem. 展开更多
关键词 Cocktail party problem Computational auditory scene analysis Non-negative matrix factorization Permutation invariant training Multi-talker speech processing
原文传递
More on half-wormholes and ensemble averages
7
作者 Jia Tian Yingyu Yang 《Communications in Theoretical Physics》 SCIE CAS CSCD 2023年第9期1-21,共21页
We continue our study Half-Wormholes and Ensemble Averages about the half-wormhole proposal.By generalizing the original proposal of the half-wormhole,we propose a new way to detect half-wormholes.The crucial idea is ... We continue our study Half-Wormholes and Ensemble Averages about the half-wormhole proposal.By generalizing the original proposal of the half-wormhole,we propose a new way to detect half-wormholes.The crucial idea is to decompose the observables into self-averaged sectors and non-self-averaged sectors.We find the contributions from different sectors have interesting statistics in the semi-classical limit.In particular,dominant sectors tend to condense and the condensation explains the emergence of half-wormholes and we expect that the appearance of condensation is a signal of possible bulk description.We also initiate the study of multi-linked half-wormholes using our approach. 展开更多
关键词 half-wormholes factorization problem quantum gravity ensemble averages SYK
原文传递
Provably secure robust threshold partial blind signature 被引量:5
8
作者 CAO Zhenfu ZHU Haojin LU Rongxing 《Science in China(Series F)》 2006年第5期604-615,共12页
Threshold digital signature and blind signature are playing important roles in cryptography as well as in practical applications such as e-cash and e-voting systems. Over the past few years, many cryptographic researc... Threshold digital signature and blind signature are playing important roles in cryptography as well as in practical applications such as e-cash and e-voting systems. Over the past few years, many cryptographic researchers have made considerable headway in this field. However, to our knowledge, most of existing threshold blind signature schemes are based on the discrete logarithm problem. In this paper, we propose a new robust threshold partial blind signature scheme based on improved RSA cryptosystem, This scheme is the first threshold partial blind signature scheme based on factoring, and the robustness of threshold partial blind signature is also introduced. Moreover, in practical application, the proposed scheme will be especially suitable for blind signature-based voting systems with multiple administrators and secure electronic cash systems to prevent their abuse. 展开更多
关键词 threshold signature blind signature improved RSA cryptosystem factoring problem electronic cash.
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部