期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
PERFORMANCE EVALUATION OF CHINESE NEW FUNDS
1
作者 倪苏云 翁轶丛 吴冲锋 《Journal of Shanghai Jiaotong university(Science)》 EI 2001年第1期89-94,共6页
The performance of Chinese investment funds was empirically analyzed using the following models, i.e. Jensen model, Treynor Mazuy (T M) model amd Merton Henriksson model. The results show that T M model is fitted to C... The performance of Chinese investment funds was empirically analyzed using the following models, i.e. Jensen model, Treynor Mazuy (T M) model amd Merton Henriksson model. The results show that T M model is fitted to Chinese investment funds best among these three. But none of them can perfectly interpret the new funds’ performance. So, the idea suggested by Jagannathan, Korajczyk (J K) to extend the test was adopted in this paper, and the results show that J K model augmented from the M H can explain the source of excess return of fund Anxin. 展开更多
关键词 fund performance evaluation security selectivity market timing ability
下载PDF
Ciphertext-Policy Attribute-Based Encryption for General Circuits from Bilinear Maps 被引量:2
2
作者 HU Peng GAO Haiying 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第2期171-177,共7页
In this paper, we present the first ciphertext-policy attribute-based encryption (CP-ABE) scheme for polynomial-size general circuits based on bilinear maps which is more suitable for practical use and more efficien... In this paper, we present the first ciphertext-policy attribute-based encryption (CP-ABE) scheme for polynomial-size general circuits based on bilinear maps which is more suitable for practical use and more efficient than multilinear maps. Our scheme uses a top-down secret sharing and FANOUT gate to resist the "backtracking attack" which is the main barrier expending access tree to general circuit. In the standard model, selective security of our scheme is proved. Comparing with current scheme for general circuits from bilinear maps, our work is more efficient. 展开更多
关键词 ciphertext-policy attribute-based encryption general circuits bilinear maps selective security
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部