Diophantine equations have always fascinated mathematicians about existence, finitude, and the calculation of possible solutions. Among these equations, one of them will be the object of our research. This is the Pyth...Diophantine equations have always fascinated mathematicians about existence, finitude, and the calculation of possible solutions. Among these equations, one of them will be the object of our research. This is the Pythagoras’- Fermat’s equation defined as follows. (1) when , it is well known that this equation has an infinity of solutions but has none (non-trivial) when . We also know that the last result, named Fermat-Wiles theorem (or FLT) was obtained at great expense and its understanding remains out of reach even for a good fringe of professional mathematicians. The aim of this research is to set up new simple but effective tools in the treatment of Diophantine equations and that of Pythagoras-Fermat. The tools put forward in this research are the properties of the quotients and the Diophantine remainders which we define as follows. Let a non-trivial triplet () solution of Equation (1) such that . and are called the Diophantine quotients and remainders of solution . We compute the remainder and the quotient of b and c by a using the division algorithm. Hence, we have: and et with . We prove the following important results. if and only if and if and only if . Also, we deduce that or for any hypothetical solution . We illustrate these results by effectively computing the Diophantine quotients and remainders in the case of Pythagorean triplets using a Python program. In the end, we apply the previous properties to directly prove a partial result of FLT. .展开更多
We analyse the Diophantine equation of Fermat xp yp = zp with p > 2 a prime, x, y, z positive nonzero integers. We consider the hypothetical solution (a, b, c) of previous equation. We use Fermat main divisors, Dio...We analyse the Diophantine equation of Fermat xp yp = zp with p > 2 a prime, x, y, z positive nonzero integers. We consider the hypothetical solution (a, b, c) of previous equation. We use Fermat main divisors, Diophantine remainders of (a, b, c), an asymptotic approach based on Balzano Weierstrass Analysis Theorem as tools. We construct convergent infinite sequences and establish asymptotic results including the following surprising one. If z y = 1 then there exists a tight bound N such that, for all prime exponents p > N , we have xp yp zp.展开更多
We propose an unbounded fully homomorphic encryption scheme, i.e. a scheme that allows one to compute on encrypted data for any desired functions without needing to decrypt the data or knowing the decryption keys. Thi...We propose an unbounded fully homomorphic encryption scheme, i.e. a scheme that allows one to compute on encrypted data for any desired functions without needing to decrypt the data or knowing the decryption keys. This is a rational solution to an old problem proposed by Rivest, Adleman, and Dertouzos [1] in 1978, and to some new problems that appeared in Peikert [2] as open questions 10 and open questions 11 a few years ago. Our scheme is completely different from the breakthrough work [3] of Gentry in 2009. Gentry’s bootstrapping technique constructs a fully homomorphic encryption (FHE) scheme from a somewhat homomorphic one that is powerful enough to evaluate its own decryption function. To date, it remains the only known way of obtaining unbounded FHE. Our construction of an unbounded FHE scheme is straightforward and can handle unbounded homomorphic computation on any refreshed ciphertexts without bootstrapping transformation technique.展开更多
In this paper, we present a fast and fraction free procedure for computing the inertia of Bezout matrix and we can determine the numbers of different real roots and different pairs of conjugate complex roots of a pol...In this paper, we present a fast and fraction free procedure for computing the inertia of Bezout matrix and we can determine the numbers of different real roots and different pairs of conjugate complex roots of a polynomial equation with integer coefficients quickly based on this result.展开更多
Aim To study the Lie symmetries and the consered quantities of the holonomic systems with remainder coordinates. Methods Using the invariance of the ordinary differential equations under the infinitesimal transformati...Aim To study the Lie symmetries and the consered quantities of the holonomic systems with remainder coordinates. Methods Using the invariance of the ordinary differential equations under the infinitesimal transformations to establish the determining equations and the restriction equations of the Lie symmetries of the systems. Results and Conclusion the structure equation and the form of conserved quantities were obtained. An example was given to illustrate the application of the result.展开更多
Aerospace relay is one kind of electronic components which is used widely in national defense system and aerospace system. The existence of remainder particles induces the reliability declining, which has become a sev...Aerospace relay is one kind of electronic components which is used widely in national defense system and aerospace system. The existence of remainder particles induces the reliability declining, which has become a severe problem in the development of aerospace relay. Traditional particle impact noise detection (PIND) method for remainder detection is ineffective for small particles, due to its low precision and involvement of subjective factors. An auto-detection method for PIND output signals is proposed in this paper, which is based on direct wavelet de-noising (DWD), cross-correlation analysis (CCA) and homo-filtering (HF), the method enhances the affectivity of PIND test about the small particles. In the end, some practical PIND output signals are analysed, and the validity of this new method is proved.展开更多
A novel quantum secret sharing (QSS) scheme is proposed on the basis of Chinese Remainder Theorem (CRT). In the scheme, the classical messages are mapped to secret sequences according to CRT equations, and distrib...A novel quantum secret sharing (QSS) scheme is proposed on the basis of Chinese Remainder Theorem (CRT). In the scheme, the classical messages are mapped to secret sequences according to CRT equations, and distributed to different receivers by different dimensional superdense-coding respectively. CRT's secret sharing function, together with high-dimensional superdense-eoding, provide convenience, security, and large capability quantum channel for secret distribution and recovering. Analysis shows the security of the scheme.展开更多
This paper focuses on studying the relation between a velocity-dependent symmetry and a generalized Lutzky conserved quantity for a holonomic system with remainder coordinates subjected to unilateral constraints. The ...This paper focuses on studying the relation between a velocity-dependent symmetry and a generalized Lutzky conserved quantity for a holonomic system with remainder coordinates subjected to unilateral constraints. The differential equations of motion of the system are established, and the definition of Lie symmetry for the system is given. The conditions under which a Lie symmetry can directly lead up to a generalized Lutzky conserved quantity and the form of the new conserved quantity are obtained, and an example is given to illustrate the application of the results.展开更多
In this paper, firstly, the p order and pz order of Dirichlet series which converges in the whole plane are studied. Secondly, the equivalence relation between remainder logarithm In En-1 (f, α), In Rn(f, α) and...In this paper, firstly, the p order and pz order of Dirichlet series which converges in the whole plane are studied. Secondly, the equivalence relation between remainder logarithm In En-1 (f, α), In Rn(f, α) and coefficients logarithm In |an| is discussed respectively. Finally, the theory of applying remainder to estimate ρorder and ρβ order can be obtained by using the equivalence relation.展开更多
Secret sharing and digital signature is an important research area in information security and has wide applications in such fields as safeguarding and legal use of confidential information, secure multiparty computat...Secret sharing and digital signature is an important research area in information security and has wide applications in such fields as safeguarding and legal use of confidential information, secure multiparty computation and electronic commerce. But up to now, study of signature based on general vector space secret sharing is very weak. Aiming at this drawback, the authors did some research on vector space secret sharing against cheaters, and proposed an efficient but secure vector space secret sharing based multi-signature scheme, which is implemented in two channels. In this scheme, the group signature can be easily produced if an authorized subset of participants pool their secret shadows and it is impossible for them to generate a group signature if an unauthorized subset of participants pool their secret shadows. The validity of the group signature can be verified by means of verification equations. A group signature of authorized subset of participants cannot be impersonated by any other set of partici- pants. Moreover, the suspected forgery can be traced, and the malicious participants can be detected in the scheme. None of several possible attacks can successfully break this scheme.展开更多
Mersenne primes are a special kind of primes, which are an important content in number theory. The study of Mersenne primes becomes one of hot topics of the nowadays science. Searching for Mersenne primes is very chal...Mersenne primes are a special kind of primes, which are an important content in number theory. The study of Mersenne primes becomes one of hot topics of the nowadays science. Searching for Mersenne primes is very challenging in scientific researches. In this paper, the numbers of thousand place of Mersenne primes are studied, and the conclusion is presented by using the Chinese remainder theorem.展开更多
By app(?)ing function minimization calculation method, two function expressions are used to simulate the magnetic field measured for cyclotron Cyclone 10 in azimuth and radius The numerical fitting curves are consiste...By app(?)ing function minimization calculation method, two function expressions are used to simulate the magnetic field measured for cyclotron Cyclone 10 in azimuth and radius The numerical fitting curves are consistent with magnetic field measured. In most pl(?)es, the accuracies are several thousandth, except those errors to be pointed out in paper.展开更多
The conventional ring signature schemes cannot address the scenario where the rank of members of the ring needs to be distinguished, for example, in electronically commerce application. To solve this problem, we prese...The conventional ring signature schemes cannot address the scenario where the rank of members of the ring needs to be distinguished, for example, in electronically commerce application. To solve this problem, we presented a Trusted Platform Module (TPM)-based threshold ring signature schen. Employing a reliable secret Share Distribution Center (SDC), the proposed approach can authenticate the TPM-based identity rank of members of the ring but not track a specific member's identity. A subset including t members with the same identity rank is built. With the signing cooperation of t members of the subset, the ring signature based on Chinese remainder theorem is generated. We proved the anonymity and unforgeability of the proposed scheme and compared it with the threshold ring signature based on Lagrange interpolation polynomial. Our scheme is relatively simpler to calculate.展开更多
Asian carp are expanding their range throughout the Mississippi River; however, abundance is thought to be highest in reaches within close proximity to the Illinois River. In the Mississippi River, Lock and Dam 19(L&a...Asian carp are expanding their range throughout the Mississippi River; however, abundance is thought to be highest in reaches within close proximity to the Illinois River. In the Mississippi River, Lock and Dam 19(L&D 19) at Keokuk, Iowa is the primary barrier to slow the expansion upstream. As Asian carp abundance increases below L&D 19, it is important to investigate potential means of control(i.e., reduction through harvest and barriers) that will prevent complete invasion of the Mississippi River above L&D 19. Silver Carp and Bighead Carp were collected below L&D 19, a subsample were implanted with ultrasonic transmitters to evaluate passage through the lock chamber and the remainder were used to determine population dynamics at the leading edge of invasion. Although the dam portion of the structure poses a complete barrier to upstream expansion, we documented lock chamber passage demonstrating the lock chamber has the capability to provide passage upstream. Based on the results of the population assessment, in order to induce recruitment overfishing at this leading edge of invasion, Asian carp will need to be intensively harvested at 300 mm and larger. The combination of commercial fishing efforts and research investigating ways to prevent passage upstream must be employed.展开更多
In this paper,some issues concerning the Chinese remaindering representation are discussed.A new converting method is described. An efficient refinement of the division algorithm of Chiu,Davida and Litow is given.
User profile matching can establish social relationships between different users in the social network.If the user profile is matched in plaintext,the user's privacy might face a security challenge.Although there ...User profile matching can establish social relationships between different users in the social network.If the user profile is matched in plaintext,the user's privacy might face a security challenge.Although there exist some schemes realizing privacypreserving user profile matching,the resource-limited users or social service providers in these schemes need to take higher computational complexity to ensure the privacy or matching of the data.To overcome the problems,a novel privacy-preserving user profile matching protocol in social networks is proposed by using t-out-of n servers and the bloom filter technique,in which the computational complexity of a user is reduced by applying the Chinese Remainder Theorem,the matching users can be found with the help of any t matching servers,and the privacy of the user profile is not compromised.Furthermore,if at most t-1 servers are allowed to collude,our scheme can still fulfill user profile privacy and user query privacy.Finally,the performance of the proposed scheme is compared with the other two schemes,and the results show that our scheme is superior to them.展开更多
Some new conclusions on asymptotic properties and inverse problems of numerical differentiation formulae have been drawn in this paper.In the first place,several asymptotic properties of intermediate points of numeric...Some new conclusions on asymptotic properties and inverse problems of numerical differentiation formulae have been drawn in this paper.In the first place,several asymptotic properties of intermediate points of numerical differentiation formulae are presented by using Taylor's formula.And then,based on the ideas of algebraic accuracy,several inverse problems of numerical differentiation formulae are given.展开更多
A new method of embedding and detecting a joint watermarking is proposed. Itapplies the asmuth-bloom secret sharing scheme, which is based on CRT (Chinese remainder theorem)theorem, to the digital watermarking technol...A new method of embedding and detecting a joint watermarking is proposed. Itapplies the asmuth-bloom secret sharing scheme, which is based on CRT (Chinese remainder theorem)theorem, to the digital watermarking technology. On the base of describing the watermarkingembedding proceeding and analyzing the watermarking detection proceeding, a series of experiments isdone. The experiments emphasize on the method's robust proving and security analysis. And theexperiments show that the method can resistthe attacks of JPEG compress, geometry, noise and grayadjusting. The results of the experiments show that the method has a nice recognition of copyrightfor joint ownership.展开更多
In this paper,the forecasting equations of a 2nd-order space-time differential remainder are deduced from the Navier-Stokes primitive equations and Eulerian operator by Taylor-series expansion.Here we introduce a cubi...In this paper,the forecasting equations of a 2nd-order space-time differential remainder are deduced from the Navier-Stokes primitive equations and Eulerian operator by Taylor-series expansion.Here we introduce a cubic spline numerical model(Spline Model for short),which is with a quasi-Lagrangian time-split integration scheme of fitting cubic spline/bicubic surface to all physical variable fields in the atmospheric equations on spherical discrete latitude-longitude mesh.A new algorithm of"fitting cubic spline—time step integration—fitting cubic spline—……"is developed to determine their first-and2nd-order derivatives and their upstream points for time discrete integral to the governing equations in Spline Model.And the cubic spline function and its mathematical polarities are also discussed to understand the Spline Model’s mathematical foundation of numerical analysis.It is pointed out that the Spline Model has mathematical laws of"convergence"of the cubic spline functions contracting to the original functions as well as its 1st-order and 2nd-order derivatives.The"optimality"of the 2nd-order derivative of the cubic spline functions is optimal approximation to that of the original functions.In addition,a Hermite bicubic patch is equivalent to operate on a grid for a 2nd-order derivative variable field.Besides,the slopes and curvatures of a central difference are identified respectively,with a smoothing coefficient of 1/3,three-point smoothing of that of a cubic spline.Then the slopes and curvatures of a central difference are calculated from the smoothing coefficient 1/3 and three-point smoothing of that of a cubic spline,respectively.Furthermore,a global simulation case of adiabatic,non-frictional and"incompressible"model atmosphere is shown with the quasi-Lagrangian time integration by using a global Spline Model,whose initial condition comes from the NCEP reanalysis data,along with quasi-uniform latitude-longitude grids and the so-called"shallow atmosphere"Navier-Stokes primitive equations in the spherical coordinates.The Spline Model,which adopted the Navier-Stokes primitive equations and quasi-Lagrangian time-split integration scheme,provides an initial ideal case of global atmospheric circulation.In addition,considering the essentially non-linear atmospheric motions,the Spline Model could judge reasonably well simple points of any smoothed variable field according to its fitting spline curvatures that must conform to its physical interpretation.展开更多
文摘Diophantine equations have always fascinated mathematicians about existence, finitude, and the calculation of possible solutions. Among these equations, one of them will be the object of our research. This is the Pythagoras’- Fermat’s equation defined as follows. (1) when , it is well known that this equation has an infinity of solutions but has none (non-trivial) when . We also know that the last result, named Fermat-Wiles theorem (or FLT) was obtained at great expense and its understanding remains out of reach even for a good fringe of professional mathematicians. The aim of this research is to set up new simple but effective tools in the treatment of Diophantine equations and that of Pythagoras-Fermat. The tools put forward in this research are the properties of the quotients and the Diophantine remainders which we define as follows. Let a non-trivial triplet () solution of Equation (1) such that . and are called the Diophantine quotients and remainders of solution . We compute the remainder and the quotient of b and c by a using the division algorithm. Hence, we have: and et with . We prove the following important results. if and only if and if and only if . Also, we deduce that or for any hypothetical solution . We illustrate these results by effectively computing the Diophantine quotients and remainders in the case of Pythagorean triplets using a Python program. In the end, we apply the previous properties to directly prove a partial result of FLT. .
文摘We analyse the Diophantine equation of Fermat xp yp = zp with p > 2 a prime, x, y, z positive nonzero integers. We consider the hypothetical solution (a, b, c) of previous equation. We use Fermat main divisors, Diophantine remainders of (a, b, c), an asymptotic approach based on Balzano Weierstrass Analysis Theorem as tools. We construct convergent infinite sequences and establish asymptotic results including the following surprising one. If z y = 1 then there exists a tight bound N such that, for all prime exponents p > N , we have xp yp zp.
文摘We propose an unbounded fully homomorphic encryption scheme, i.e. a scheme that allows one to compute on encrypted data for any desired functions without needing to decrypt the data or knowing the decryption keys. This is a rational solution to an old problem proposed by Rivest, Adleman, and Dertouzos [1] in 1978, and to some new problems that appeared in Peikert [2] as open questions 10 and open questions 11 a few years ago. Our scheme is completely different from the breakthrough work [3] of Gentry in 2009. Gentry’s bootstrapping technique constructs a fully homomorphic encryption (FHE) scheme from a somewhat homomorphic one that is powerful enough to evaluate its own decryption function. To date, it remains the only known way of obtaining unbounded FHE. Our construction of an unbounded FHE scheme is straightforward and can handle unbounded homomorphic computation on any refreshed ciphertexts without bootstrapping transformation technique.
文摘In this paper, we present a fast and fraction free procedure for computing the inertia of Bezout matrix and we can determine the numbers of different real roots and different pairs of conjugate complex roots of a polynomial equation with integer coefficients quickly based on this result.
文摘Aim To study the Lie symmetries and the consered quantities of the holonomic systems with remainder coordinates. Methods Using the invariance of the ordinary differential equations under the infinitesimal transformations to establish the determining equations and the restriction equations of the Lie symmetries of the systems. Results and Conclusion the structure equation and the form of conserved quantities were obtained. An example was given to illustrate the application of the result.
基金Chinese Science Technology and Industry Foundation for National Defense(FEBG27100001)
文摘Aerospace relay is one kind of electronic components which is used widely in national defense system and aerospace system. The existence of remainder particles induces the reliability declining, which has become a severe problem in the development of aerospace relay. Traditional particle impact noise detection (PIND) method for remainder detection is ineffective for small particles, due to its low precision and involvement of subjective factors. An auto-detection method for PIND output signals is proposed in this paper, which is based on direct wavelet de-noising (DWD), cross-correlation analysis (CCA) and homo-filtering (HF), the method enhances the affectivity of PIND test about the small particles. In the end, some practical PIND output signals are analysed, and the validity of this new method is proved.
基金Supported by the National Natural Science Foundation of China under Grant No.60902044Ph.D.Programs Foundation of Ministry of Education of China under Grant No.20090162120070+2 种基金Postdoctoral Science Foundation of China under Grant No.200801341State Key Laboratory of Advanced Optical Communication Systems and Networks under Grant No.2008SH01in part by the Second stage of Brain Korea 21 programs,Chonbuk National University,Korea
文摘A novel quantum secret sharing (QSS) scheme is proposed on the basis of Chinese Remainder Theorem (CRT). In the scheme, the classical messages are mapped to secret sequences according to CRT equations, and distributed to different receivers by different dimensional superdense-coding respectively. CRT's secret sharing function, together with high-dimensional superdense-eoding, provide convenience, security, and large capability quantum channel for secret distribution and recovering. Analysis shows the security of the scheme.
基金The project supported by National Natural Science Foundation of China under Grant No. 10272021 and the Natural Science Foundation of High Education Department of Jiangsu Province under Grant No. 04KJA130135
文摘This paper focuses on studying the relation between a velocity-dependent symmetry and a generalized Lutzky conserved quantity for a holonomic system with remainder coordinates subjected to unilateral constraints. The differential equations of motion of the system are established, and the definition of Lie symmetry for the system is given. The conditions under which a Lie symmetry can directly lead up to a generalized Lutzky conserved quantity and the form of the new conserved quantity are obtained, and an example is given to illustrate the application of the results.
基金Supported by the National Natural Science Foundation of China(11171119)Supported by the National Science Foundation of Jiangxi Province(20122BAB211005,2010GQS0103)
文摘In this paper, firstly, the p order and pz order of Dirichlet series which converges in the whole plane are studied. Secondly, the equivalence relation between remainder logarithm In En-1 (f, α), In Rn(f, α) and coefficients logarithm In |an| is discussed respectively. Finally, the theory of applying remainder to estimate ρorder and ρβ order can be obtained by using the equivalence relation.
文摘Secret sharing and digital signature is an important research area in information security and has wide applications in such fields as safeguarding and legal use of confidential information, secure multiparty computation and electronic commerce. But up to now, study of signature based on general vector space secret sharing is very weak. Aiming at this drawback, the authors did some research on vector space secret sharing against cheaters, and proposed an efficient but secure vector space secret sharing based multi-signature scheme, which is implemented in two channels. In this scheme, the group signature can be easily produced if an authorized subset of participants pool their secret shadows and it is impossible for them to generate a group signature if an unauthorized subset of participants pool their secret shadows. The validity of the group signature can be verified by means of verification equations. A group signature of authorized subset of participants cannot be impersonated by any other set of partici- pants. Moreover, the suspected forgery can be traced, and the malicious participants can be detected in the scheme. None of several possible attacks can successfully break this scheme.
文摘Mersenne primes are a special kind of primes, which are an important content in number theory. The study of Mersenne primes becomes one of hot topics of the nowadays science. Searching for Mersenne primes is very challenging in scientific researches. In this paper, the numbers of thousand place of Mersenne primes are studied, and the conclusion is presented by using the Chinese remainder theorem.
文摘By app(?)ing function minimization calculation method, two function expressions are used to simulate the magnetic field measured for cyclotron Cyclone 10 in azimuth and radius The numerical fitting curves are consistent with magnetic field measured. In most pl(?)es, the accuracies are several thousandth, except those errors to be pointed out in paper.
基金Acknowledgements This work was supported by the National Basic Research Program of China under Crant No. 2007CB311100, Core Electronic Devices, High-end General Purpose Chips and Basic Software Products in China under Oant No. 2010ZX01037-001-001 Ph.D. Start-up Fund of Beijing University of Technology under Grants No. X0007211201101 and No. X00700054R1764, National Soft Science Research Program under Crant No. 2010GXQ5D317 and the National Natural Science Foundation of China underGrant No. 91018008 ,Opening Project of Key Lab of Information Network Security, Ministry of Public Security under Crant No. C11610, Opening Project of State Key Laboratory of Information Security (Institute of Sottware, Chinese Academy of Sciences) under Cxant No. 04-04-1.
文摘The conventional ring signature schemes cannot address the scenario where the rank of members of the ring needs to be distinguished, for example, in electronically commerce application. To solve this problem, we presented a Trusted Platform Module (TPM)-based threshold ring signature schen. Employing a reliable secret Share Distribution Center (SDC), the proposed approach can authenticate the TPM-based identity rank of members of the ring but not track a specific member's identity. A subset including t members with the same identity rank is built. With the signing cooperation of t members of the subset, the ring signature based on Chinese remainder theorem is generated. We proved the anonymity and unforgeability of the proposed scheme and compared it with the threshold ring signature based on Lagrange interpolation polynomial. Our scheme is relatively simpler to calculate.
文摘Asian carp are expanding their range throughout the Mississippi River; however, abundance is thought to be highest in reaches within close proximity to the Illinois River. In the Mississippi River, Lock and Dam 19(L&D 19) at Keokuk, Iowa is the primary barrier to slow the expansion upstream. As Asian carp abundance increases below L&D 19, it is important to investigate potential means of control(i.e., reduction through harvest and barriers) that will prevent complete invasion of the Mississippi River above L&D 19. Silver Carp and Bighead Carp were collected below L&D 19, a subsample were implanted with ultrasonic transmitters to evaluate passage through the lock chamber and the remainder were used to determine population dynamics at the leading edge of invasion. Although the dam portion of the structure poses a complete barrier to upstream expansion, we documented lock chamber passage demonstrating the lock chamber has the capability to provide passage upstream. Based on the results of the population assessment, in order to induce recruitment overfishing at this leading edge of invasion, Asian carp will need to be intensively harvested at 300 mm and larger. The combination of commercial fishing efforts and research investigating ways to prevent passage upstream must be employed.
文摘In this paper,some issues concerning the Chinese remaindering representation are discussed.A new converting method is described. An efficient refinement of the division algorithm of Chiu,Davida and Litow is given.
基金supported in part by the Natural Science Foundation of Beijing(no.4212019,M22002)the National Natural Science Foundation of China(no.62172005)+1 种基金the Open Research Fund of Key Laboratory of Cryptography of Zhejiang Province(No.ZCL21014)the Foundation of Guizhou Provincial Key Laboratory of Public Big Data(no.2019BDKF JJ012)。
文摘User profile matching can establish social relationships between different users in the social network.If the user profile is matched in plaintext,the user's privacy might face a security challenge.Although there exist some schemes realizing privacypreserving user profile matching,the resource-limited users or social service providers in these schemes need to take higher computational complexity to ensure the privacy or matching of the data.To overcome the problems,a novel privacy-preserving user profile matching protocol in social networks is proposed by using t-out-of n servers and the bloom filter technique,in which the computational complexity of a user is reduced by applying the Chinese Remainder Theorem,the matching users can be found with the help of any t matching servers,and the privacy of the user profile is not compromised.Furthermore,if at most t-1 servers are allowed to collude,our scheme can still fulfill user profile privacy and user query privacy.Finally,the performance of the proposed scheme is compared with the other two schemes,and the results show that our scheme is superior to them.
基金Supported by the Science and Technology Project of the Education Department of Jiangxi Province(GJJ08224 )Supported by the Transformation of Education Project of the Education Department of Jiangxi Province(JxJG-09-7-28)
文摘Some new conclusions on asymptotic properties and inverse problems of numerical differentiation formulae have been drawn in this paper.In the first place,several asymptotic properties of intermediate points of numerical differentiation formulae are presented by using Taylor's formula.And then,based on the ideas of algebraic accuracy,several inverse problems of numerical differentiation formulae are given.
文摘A new method of embedding and detecting a joint watermarking is proposed. Itapplies the asmuth-bloom secret sharing scheme, which is based on CRT (Chinese remainder theorem)theorem, to the digital watermarking technology. On the base of describing the watermarkingembedding proceeding and analyzing the watermarking detection proceeding, a series of experiments isdone. The experiments emphasize on the method's robust proving and security analysis. And theexperiments show that the method can resistthe attacks of JPEG compress, geometry, noise and grayadjusting. The results of the experiments show that the method has a nice recognition of copyrightfor joint ownership.
文摘In this paper,the forecasting equations of a 2nd-order space-time differential remainder are deduced from the Navier-Stokes primitive equations and Eulerian operator by Taylor-series expansion.Here we introduce a cubic spline numerical model(Spline Model for short),which is with a quasi-Lagrangian time-split integration scheme of fitting cubic spline/bicubic surface to all physical variable fields in the atmospheric equations on spherical discrete latitude-longitude mesh.A new algorithm of"fitting cubic spline—time step integration—fitting cubic spline—……"is developed to determine their first-and2nd-order derivatives and their upstream points for time discrete integral to the governing equations in Spline Model.And the cubic spline function and its mathematical polarities are also discussed to understand the Spline Model’s mathematical foundation of numerical analysis.It is pointed out that the Spline Model has mathematical laws of"convergence"of the cubic spline functions contracting to the original functions as well as its 1st-order and 2nd-order derivatives.The"optimality"of the 2nd-order derivative of the cubic spline functions is optimal approximation to that of the original functions.In addition,a Hermite bicubic patch is equivalent to operate on a grid for a 2nd-order derivative variable field.Besides,the slopes and curvatures of a central difference are identified respectively,with a smoothing coefficient of 1/3,three-point smoothing of that of a cubic spline.Then the slopes and curvatures of a central difference are calculated from the smoothing coefficient 1/3 and three-point smoothing of that of a cubic spline,respectively.Furthermore,a global simulation case of adiabatic,non-frictional and"incompressible"model atmosphere is shown with the quasi-Lagrangian time integration by using a global Spline Model,whose initial condition comes from the NCEP reanalysis data,along with quasi-uniform latitude-longitude grids and the so-called"shallow atmosphere"Navier-Stokes primitive equations in the spherical coordinates.The Spline Model,which adopted the Navier-Stokes primitive equations and quasi-Lagrangian time-split integration scheme,provides an initial ideal case of global atmospheric circulation.In addition,considering the essentially non-linear atmospheric motions,the Spline Model could judge reasonably well simple points of any smoothed variable field according to its fitting spline curvatures that must conform to its physical interpretation.