期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
A Multivariate Public Key Cryptographic Scheme 被引量:5
1
作者 YUAN Feng SUN Ying +2 位作者 JIANG Jijun ZHAO Shangwei XU Shengwei 《China Communications》 SCIE CSCD 2014年第12期120-124,共5页
This paper presents a multivariate public key cryptographic scheme over a finite field with odd prime characteristic.The idea of embedding and layering is manifested in its construction.The security of the scheme is a... This paper presents a multivariate public key cryptographic scheme over a finite field with odd prime characteristic.The idea of embedding and layering is manifested in its construction.The security of the scheme is analyzed in detail,and this paper indicates that the scheme can withstand the up to date differential cryptanalysis.We give heuristic arguments to show that this scheme resists all known attacks. 展开更多
关键词 public key cryptography polynomials multivariate finite field
下载PDF
Upper bounds of Schubert polynomials
2
作者 Neil Jiuyu Fan Peter Long Guo 《Science China Mathematics》 SCIE CSCD 2022年第6期1319-1330,共12页
Let w be a permutation of{1,2,...,n},and let D(w)be the Rothe diagram of w.The Schubert polynomial■w_(x)can be realized as the dual character of the flagged Weyl module associated with D(w).This implies the following... Let w be a permutation of{1,2,...,n},and let D(w)be the Rothe diagram of w.The Schubert polynomial■w_(x)can be realized as the dual character of the flagged Weyl module associated with D(w).This implies the following coefficient-wise inequality:Min_(x)≤■_(w)(x)≤Max_(w)xwhere both Min_(w)(x)and Max_(w)(x)are polynomials determined by D(w).Fink et al.(2018)found that■w_(x)equals the lower bound Min_(w)(x)if and only if w avoids twelve permutation patterns.In this paper,we show that■w_(x)reaches the upper bound Max_(w)(x)if and only if w avoids two permutation patterns 1432 and 1423.Similarly,for any given compositionα∈Z^(n)≥0,one can define a lower bound Min_(α)(x)and an upper bound Max_(α)(x)for the key polynomialκ_(α)(x).Hodges and Yong(2020)established thatκ_(α)(x)equals Min_(α)(x)if and only ifαavoids five composition patterns.We show thatκ_(α)(x)equals Max_(α)(x)if and only ifαavoids a single composition pattern(0,2).As an application,we obtain that whenαavoids(0,2),the key polynomialκ_(α)(x)is Lorentzian,partially verifying a conjecture of Huh et al.(2019). 展开更多
关键词 Schubert polynomial key polynomial flagged Weyl module upper bound Lorentzian polynomial
原文传递
Can the Polynomial Based Key Predistribution Scheme Be Used Many Times in One Wireless Sensor Network Key Establishment Protocol?
3
作者 许丽卿 陈豪 《Journal of Shanghai Jiaotong university(Science)》 EI 2013年第3期376-384,共9页
Key establishment is the basic step for the wireless sensor network (WSN) security. The polynomial based key predistribution scheme of Blom and Blundo et al. has been the basic ingredient for the key establishment f... Key establishment is the basic step for the wireless sensor network (WSN) security. The polynomial based key predistribution scheme of Blom and Blundo et al. has been the basic ingredient for the key establishment for WSNs. It is tempting to use many random and different instances of polynomial based key predistribution scheme for various parts of the WSN to enhance the efficiency of WSN key establishment protocols. This paper indicates that it is not secured in general to use many instances of Blom-Blundo et al. polynomial based key predistribution scheme in a WSN key establishment protocol. Thus the previously constructed group-based type WSN key predistribution schemes using polynomial based key predistribution scheme are insecure. We propose new generalized Bloin-Blundo et al. key predistribution schemes. These new generalized Blom-Blundo et al. key predistribution schemes can be used many times in one WSN key establishment protocol with only a small increase of cost. The application to group-based WSN key predistribution schemes is given. 展开更多
关键词 polynomial based key predistribution scheme generalized Blom-Blundo et al. key predistribution scheme clustered wireless sensor network (WSN)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部