Suppose that D is a division ring in which there is defined an anti-automorphism α→(?)is involutorial,R is a left vector space over D.Using the given anti-automorphism α→(?),it is easy to turn R into a right vecto...Suppose that D is a division ring in which there is defined an anti-automorphism α→(?)is involutorial,R is a left vector space over D.Using the given anti-automorphism α→(?),it is easy to turn R into a right vector space over D by seting x(?)=ax.Bilinear form g(x,y)connecting the left vector space R and the right vector space R is a Hermitian scalar.展开更多
Numerous privacy-preserving issues have emerged along with the fast development of the Internet of Things. In addressing privacy protection problems in Wireless Sensor Networks (WSN), secure multi-party computation ...Numerous privacy-preserving issues have emerged along with the fast development of the Internet of Things. In addressing privacy protection problems in Wireless Sensor Networks (WSN), secure multi-party computation is considered vital, where obtaining the Euclidian distance between two nodes with no disclosure of either side's secrets has become the focus of location-privacy-related applications. This paper proposes a novel Privacy-Preserving Scalar Product Protocol (PPSPP) for wireless sensor networks. Based on PPSPP, we then propose a Homomorphic-Encryption-based Euclidean Distance Protocol (HEEDP) without third parties. This protocol can achieve secure distance computation between two sensor nodes. Correctness proofs of PPSPP and HEEDP are provided, followed by security validation and analysis. Performance evaluations via comparisons among similar protocols demonstrate that HEEDP is superior; it is most efficient in terms of both communication and computation on a wide range of data types, especially in wireless sensor networks.展开更多
A secure scalar product protocol is a type of specific secure multi-party computation problem. Using this kind of protocol, two involved parties are able to jointly compute the scalar product of their private vectors...A secure scalar product protocol is a type of specific secure multi-party computation problem. Using this kind of protocol, two involved parties are able to jointly compute the scalar product of their private vectors:, but no party will reveal any information about his/her private vector to another one. The secure scalar product protocol is of great importance in many privacy-preserving applications such as privacy-preserving data mining, privacy-preserving cooperative statistical analysis, and privacy-preserving geometry computation. In this paper, we give an efficient and secure scalar product protocol in the presence of malicious adversaries based on two important tools: the proof of knowledge of a discrete logarithm and the verifiable encryption. The security of the new protocol is proved under the standard simulation-based definitions. Compared with the existing schemes, our scheme offers higher efficiency because of avoiding inefficient cut-and-choose proofs.展开更多
After constructing the Bethe state of the XXZ Gaudin model with generic non-diagonal boundary terms,we analyze the properties of this state and obtain the determinant representations of the scalar products for this XX...After constructing the Bethe state of the XXZ Gaudin model with generic non-diagonal boundary terms,we analyze the properties of this state and obtain the determinant representations of the scalar products for this XXZ Gaudin model.展开更多
This article originates from the observation that field lines are drawn using distinctive rules in magnetic field and electrostatic fields. It aims at reconciliating the definitions of these fields and thus reaching a...This article originates from the observation that field lines are drawn using distinctive rules in magnetic field and electrostatic fields. It aims at reconciliating the definitions of these fields and thus reaching a consensus on the interpretation of field lines. Our unified field definition combines three orthogonal vectors and a unique scalar value. Field lines are then defined as isovalue lines of the scalar value, rendering it simpler to interpret in both field types. Specific to our field definition is the use of square root of vector’s cross product so that all vectors have the same physical unit. This enhanced field definition also enables a more efficient calculation of Biot-Savart law. This article is the first of a series allowing the drawing of isovalue contour lines.展开更多
文摘Suppose that D is a division ring in which there is defined an anti-automorphism α→(?)is involutorial,R is a left vector space over D.Using the given anti-automorphism α→(?),it is easy to turn R into a right vector space over D by seting x(?)=ax.Bilinear form g(x,y)connecting the left vector space R and the right vector space R is a Hermitian scalar.
基金sponsored by the National Natural Science Foundation of China(No.61373138)the Natural Science Key Fund for Colleges and Universities in Jiangsu Province(No.12KJA520002)+4 种基金the Key Research and Development Program of Jiangsu Province(Social Development Program)(No.BE2015702)the Postdoctoral Foundation(Nos.2015M570468 and2016T90485)the Sixth Talent Peaks Project of Jiangsu Province(No.DZXX-017)the Fund of Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks(WSNLBZY201516)the Science and Technology Innovation Fund for Postgraduate Education of Jiangsu Province(No.KYLX15 0853)
文摘Numerous privacy-preserving issues have emerged along with the fast development of the Internet of Things. In addressing privacy protection problems in Wireless Sensor Networks (WSN), secure multi-party computation is considered vital, where obtaining the Euclidian distance between two nodes with no disclosure of either side's secrets has become the focus of location-privacy-related applications. This paper proposes a novel Privacy-Preserving Scalar Product Protocol (PPSPP) for wireless sensor networks. Based on PPSPP, we then propose a Homomorphic-Encryption-based Euclidean Distance Protocol (HEEDP) without third parties. This protocol can achieve secure distance computation between two sensor nodes. Correctness proofs of PPSPP and HEEDP are provided, followed by security validation and analysis. Performance evaluations via comparisons among similar protocols demonstrate that HEEDP is superior; it is most efficient in terms of both communication and computation on a wide range of data types, especially in wireless sensor networks.
基金This work was supported by the National Natural Science Foundation of China under Grant Nos. 60973134, 61173164, 61003232, and the Natural Science Foundation of Guangdong Province of China under Grant No. 10351806001000000.
文摘A secure scalar product protocol is a type of specific secure multi-party computation problem. Using this kind of protocol, two involved parties are able to jointly compute the scalar product of their private vectors:, but no party will reveal any information about his/her private vector to another one. The secure scalar product protocol is of great importance in many privacy-preserving applications such as privacy-preserving data mining, privacy-preserving cooperative statistical analysis, and privacy-preserving geometry computation. In this paper, we give an efficient and secure scalar product protocol in the presence of malicious adversaries based on two important tools: the proof of knowledge of a discrete logarithm and the verifiable encryption. The security of the new protocol is proved under the standard simulation-based definitions. Compared with the existing schemes, our scheme offers higher efficiency because of avoiding inefficient cut-and-choose proofs.
基金Supported by the National Natural Science Foundation of China under Grant Nos.11075126,11031005,11375141the State Education Ministry of China under Grant No.20116101110017 and SRF for ROCS
文摘After constructing the Bethe state of the XXZ Gaudin model with generic non-diagonal boundary terms,we analyze the properties of this state and obtain the determinant representations of the scalar products for this XXZ Gaudin model.
文摘This article originates from the observation that field lines are drawn using distinctive rules in magnetic field and electrostatic fields. It aims at reconciliating the definitions of these fields and thus reaching a consensus on the interpretation of field lines. Our unified field definition combines three orthogonal vectors and a unique scalar value. Field lines are then defined as isovalue lines of the scalar value, rendering it simpler to interpret in both field types. Specific to our field definition is the use of square root of vector’s cross product so that all vectors have the same physical unit. This enhanced field definition also enables a more efficient calculation of Biot-Savart law. This article is the first of a series allowing the drawing of isovalue contour lines.