期刊文献+
共找到2,881篇文章
< 1 2 145 >
每页显示 20 50 100
Research on θ -Intuitionistic Fuzzy Homomorphism Theory
1
作者 Yue Wang Yan Yan Xinru Shang 《Journal of Applied Mathematics and Physics》 2024年第10期3579-3589,共11页
Fuzzy homomorphism is an important research content of fuzzy group theory, different fuzzy mappings will produce different fuzzy homomorphisms. In this paper, the fuzzy homomorphism of groups is generalized. Firstly, ... Fuzzy homomorphism is an important research content of fuzzy group theory, different fuzzy mappings will produce different fuzzy homomorphisms. In this paper, the fuzzy homomorphism of groups is generalized. Firstly, the θ-intuitionistic fuzzy mapping is defined, and the θ-intuitionistic fuzzy homomorphism of groups is obtained. The properties of intuitionistic fuzzy subgroups and intuitionistic fuzzy normal subgroups are studied under the θ-intuitionistic fuzzy homomorphism of groups, and the fundamental theorem of θ-intuitionistic fuzzy homomorphism is proved. 展开更多
关键词 -Intuitionistic Fuzzy homomorphism Intuitionistic Fuzzy Subgroup Intuitionistic Fuzzy Normal Subgroup
下载PDF
Enhancing IoT Data Security with Lightweight Blockchain and Okamoto Uchiyama Homomorphic Encryption 被引量:1
2
作者 Mohanad A.Mohammed Hala B.Abdul Wahab 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1731-1748,共18页
Blockchain technology has garnered significant attention from global organizations and researchers due to its potential as a solution for centralized system challenges.Concurrently,the Internet of Things(IoT)has revol... Blockchain technology has garnered significant attention from global organizations and researchers due to its potential as a solution for centralized system challenges.Concurrently,the Internet of Things(IoT)has revolutionized the Fourth Industrial Revolution by enabling interconnected devices to offer innovative services,ultimately enhancing human lives.This paper presents a new approach utilizing lightweight blockchain technology,effectively reducing the computational burden typically associated with conventional blockchain systems.By integrating this lightweight blockchain with IoT systems,substantial reductions in implementation time and computational complexity can be achieved.Moreover,the paper proposes the utilization of the Okamoto Uchiyama encryption algorithm,renowned for its homomorphic characteristics,to reinforce the privacy and security of IoT-generated data.The integration of homomorphic encryption and blockchain technology establishes a secure and decentralized platformfor storing and analyzing sensitive data of the supply chain data.This platformfacilitates the development of some business models and empowers decentralized applications to perform computations on encrypted data while maintaining data privacy.The results validate the robust security of the proposed system,comparable to standard blockchain implementations,leveraging the distinctive homomorphic attributes of the Okamoto Uchiyama algorithm and the lightweight blockchain paradigm. 展开更多
关键词 Blockchain IOT integration of IoT and blockchain consensus algorithm Okamoto Uchiyama homomorphic encryption lightweight blockchain
下载PDF
Complexity of Injective Homomorphisms to Small Tournaments, and of Injective Oriented Colourings
3
作者 Russell J. Campbell Nancy E. Clarke Gary MacGillivray 《Open Journal of Discrete Mathematics》 2023年第1期1-15,共15页
Several possible definitions of local injectivity for a homomorphism of an oriented graph G to an oriented graph H are considered. In each case, we determine the complexity of deciding whether there exists such a homo... Several possible definitions of local injectivity for a homomorphism of an oriented graph G to an oriented graph H are considered. In each case, we determine the complexity of deciding whether there exists such a homomorphism when G is given and H is a fixed tournament on three or fewer vertices. Each possible definition leads to a locally-injective oriented colouring problem. A dichotomy theorem is proved in each case. 展开更多
关键词 Injective Graph homomorphism Oriented Colouring COMPLEXITY
下载PDF
FL-EASGD:Federated Learning Privacy Security Method Based on Homomorphic Encryption
4
作者 Hao Sun Xiubo Chen Kaiguo Yuan 《Computers, Materials & Continua》 SCIE EI 2024年第5期2361-2373,共13页
Federated learning ensures data privacy and security by sharing models among multiple computing nodes instead of plaintext data.However,there is still a potential risk of privacy leakage,for example,attackers can obta... Federated learning ensures data privacy and security by sharing models among multiple computing nodes instead of plaintext data.However,there is still a potential risk of privacy leakage,for example,attackers can obtain the original data through model inference attacks.Therefore,safeguarding the privacy of model parameters becomes crucial.One proposed solution involves incorporating homomorphic encryption algorithms into the federated learning process.However,the existing federated learning privacy protection scheme based on homomorphic encryption will greatly reduce the efficiency and robustness when there are performance differences between parties or abnormal nodes.To solve the above problems,this paper proposes a privacy protection scheme named Federated Learning-Elastic Averaging Stochastic Gradient Descent(FL-EASGD)based on a fully homomorphic encryption algorithm.First,this paper introduces the homomorphic encryption algorithm into the FL-EASGD scheme to preventmodel plaintext leakage and realize privacy security in the process ofmodel aggregation.Second,this paper designs a robust model aggregation algorithm by adding time variables and constraint coefficients,which ensures the accuracy of model prediction while solving performance differences such as computation speed and node anomalies such as downtime of each participant.In addition,the scheme in this paper preserves the independent exploration of the local model by the nodes of each party,making the model more applicable to the local data distribution.Finally,experimental analysis shows that when there are abnormalities in the participants,the efficiency and accuracy of the whole protocol are not significantly affected. 展开更多
关键词 Federated learning homomorphic encryption privacy security stochastic gradient descent
下载PDF
An Introduction to the Theory of C~*-modules
5
作者 邓宏钧 刘德权 《Chinese Quarterly Journal of Mathematics》 CSCD 1992年第2期72-77,共6页
This paper,combined algebraical structure with analytical system,has studied the part of theory of C~*-modules over A by using the homolgical methods, where A is a commutative C~*-algebra over complex number field C. ... This paper,combined algebraical structure with analytical system,has studied the part of theory of C~*-modules over A by using the homolgical methods, where A is a commutative C~*-algebra over complex number field C. That is to say we have not only defined some relevant new concept,but also obtained some results about them. 展开更多
关键词 commutative C~*-algebra C~*-module C~*-homomorphism
下载PDF
Research on Data Privacy Protection Algorithm with Homomorphism Mechanism Based on Redundant Slice Technology in Wireless Sensor Networks 被引量:6
6
作者 Peng Li Chao Xu +2 位作者 He Xu Lu Dong Ruchuan Wang 《China Communications》 SCIE CSCD 2019年第5期158-170,共13页
Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice techn... Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice technology, this paper proposes the data private protection algorithm with redundancy mechanism, which ensures privacy by privacy homomorphism mechanism and guarantees redundancy by carrying hidden data. Moreover,it selects the routing tree generated by CTP(Collection Tree Protocol) as routing path for data transmission. By dividing at the source node, it adds the hidden information and also the privacy homomorphism. At the same time,the information feedback tree is established between the destination node and the source node. In addition, the destination node immediately sends the packet loss information and the encryption key via the information feedback tree to the source node. As a result,it improves the reliability and privacy of data transmission and ensures the data redundancy. 展开更多
关键词 wireless sensor network PRIVACY PROTECTION SLICE TECHNOLOGY PRIVACY homomorphism collection tree protocol
下载PDF
A generalization of co-*~n-modules
7
作者 姚玲玲 陈建龙 《Journal of Southeast University(English Edition)》 EI CAS 2010年第3期505-508,共4页
A module is called a co-*∞-module if it is co-selfsmall and ∞-quasi-injective. The properties and characterizations are investigated. When a module U is a co-*∞-module, the functor Hom RU(-,U)is exact in Copre... A module is called a co-*∞-module if it is co-selfsmall and ∞-quasi-injective. The properties and characterizations are investigated. When a module U is a co-*∞-module, the functor Hom RU(-,U)is exact in Copres∞(U). A module U is a co-*∞-module if and only if U is co-selfsmall and for any exact sequence 0→M→UI→N→0 with M∈Copres∞(U) and I is a set, N∈Copres∞(U) is equivalent to Ext1R(N,U)→Ext1R(UI,U) is a monomorphism if and only if U is co-selfsmall and for any exact sequence 0→L→M→N→0 with L, N∈Copres∞(U), N∈Copres∞(U) is equivalent to the induced sequence 0→Δ(N)→Δ(M)→Δ(L)→0 which is exact if and only if U induces a duality ΔUS:⊥USCopres∞(U):ΔRU. Moreover, U is a co-*n-module if and only if U is a co-*∞-module and Copres∞(U)=Copresn(U). 展开更多
关键词 co-*∞-module ∞-quasi-injective co-selfsmall co-*n-module
下载PDF
The Homomorphism and Isomorphism on Hypergroup 被引量:4
8
作者 钟育彬 《Chinese Quarterly Journal of Mathematics》 CSCD 1997年第3期7-14, ,共8页
Basing on the papers from [1] to [4], this paper gives some further research,mainly solves the following problems:(1) It proved that several theorems of subgroup which have been raised to the hypergroup are still true... Basing on the papers from [1] to [4], this paper gives some further research,mainly solves the following problems:(1) It proved that several theorems of subgroup which have been raised to the hypergroup are still true.(2) It proved that the isomorphous relationship of the bottomgroups which guid to the hypergroup can still keep such relationship.(3) It proved that the basic isomorphous Theorem and the homogenous Theorem of the bottomgroup which raise to the hypergroup are still true.(4) It point out that when the isomorphous bottomgroups have been raised to the hypergroup,the conditions which form the isomorphism should be lessened. 展开更多
关键词 HYPERGROUP homomorphism ISOMORPHISM regular hypergroup uniform hypergroup
下载PDF
STABILITY OF GENERALIZED DERIVATIONS ON HILBERT C*-MODULES ASSOCIATED WITH A PEXIDERIZED CAUCHY-JENSEN TYPE FUNCTIONAL EQUATION 被引量:2
9
作者 Ali Ebadian Ismail Nikoufar +1 位作者 Themistocles M.Rassias Norouz Ghobadipour 《Acta Mathematica Scientia》 SCIE CSCD 2012年第3期1226-1238,共13页
In this article, we introduce the notion of generalized derivations on Hilbert C*-modules. We use a fixed-point method to prove the generalized Hyers-Ulam-Rassias stability associated to the Pexiderized Cauchy-Jensen... In this article, we introduce the notion of generalized derivations on Hilbert C*-modules. We use a fixed-point method to prove the generalized Hyers-Ulam-Rassias stability associated to the Pexiderized Cauchy-Jensen type functional equationrf(x+y/r)+sg(x-y/s)=2h(x)for r, s ∈ R / {0} on Hilbert C*-modules, where f, g, and h are mappings from a Hilbert C*-module M to M. 展开更多
关键词 Hyers-Ulam-Rassias stability Hilbert C*-module generalized derivation fixed point
下载PDF
A New Characterization on g-frames in Hilbert C^*-Modules 被引量:1
10
作者 Xiang Zhong-qi 《Communications in Mathematical Research》 CSCD 2017年第2期129-134,共6页
In this note, we establish a new characterization on g-frames in Hilbert C;-modules from the operator-theoretic point of view, with which we provide a correction to one result recently obtained by Yao(Yao X Y. Some pr... In this note, we establish a new characterization on g-frames in Hilbert C;-modules from the operator-theoretic point of view, with which we provide a correction to one result recently obtained by Yao(Yao X Y. Some properties of g-frames in Hilbert C;-modules(in Chinese). Acta Math. Sinica, 2011, 54(1): 1–8.). 展开更多
关键词 Hilbert C*-module G-FRAME characterization
下载PDF
Exact Sequence and Commutative Diagrams of Semimodule Homomorphism 被引量:1
11
作者 肖泽昌 《Chinese Quarterly Journal of Mathematics》 CSCD 1997年第2期108-110, ,共3页
Throught the introduction of the concept * exact sequence,we set up several satisfied results of commutative diagrams of semimodule homomorphism.
关键词 SEMIMODULE homomorphism * exact sequence commutative diagrams
下载PDF
The characterization of Γ-modules in terms of fuzzy soft Γ-submodules 被引量:1
12
作者 ZHOU Min XIANG Da-jing ZHAN Jian-ming 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2013年第2期217-239,共23页
In this paper,we focus on combining the theories of fuzzy soft sets with Γ-modules,and establishing a new framework for fuzzy soft Γ-submodules.The main contributions of the paper are 3-fold.First,we present the con... In this paper,we focus on combining the theories of fuzzy soft sets with Γ-modules,and establishing a new framework for fuzzy soft Γ-submodules.The main contributions of the paper are 3-fold.First,we present the concepts of(R,S)-bi-Γ-submodules,quasi-Γ-submodules and regular Γ-modules.Meanwhile,some illustrative examples are given to show the rationality of the definitions introduced in this paper.Second,several new kinds of generalized fuzzy soft Γ-submodules are proposed,and related properties and mutual relationships are also investigated.Third,we discover some intrinsic connections between the generalized fuzzy soft Γ-submodules presented in this paper and crisp Γ-submodules,and describe the relationships between regular Γ-modules and the generalized fuzzy soft Γ-submodules presented in this paper. 展开更多
关键词 Fuzzy soft set Γ-module (∈ γ γ q δ)(resp. (■ γ γ δ))-fuzzy soft left R-Γ-submodule(right R-Γ-submodules (R S)-bi-Γ-submodule quasi-Γ-submodule) regular Γ-module
下载PDF
CHAIN CONDITIONS FOR C*-ALGEBRAS COMING FROM HILBERT C*-MODULES 被引量:1
13
作者 Mahmood POURGHOLAMHOSSEIN Mohammad ROUZBEHANI Massoud AMINI 《Acta Mathematica Scientia》 SCIE CSCD 2018年第4期1163-1173,共11页
In this paper we define and study chain conditions for Hilbert C*-modules through their C*-algebras of compact operators and discuss their perseverance under Morita equivalence and tensor products. We show that thes... In this paper we define and study chain conditions for Hilbert C*-modules through their C*-algebras of compact operators and discuss their perseverance under Morita equivalence and tensor products. We show that these chain conditions are passed from the C*-algebra to its Hilbert module under certain conditions. We also study chain conditions for Hilbert modules coming from inclusion of C*-algebra with a faithful conditional expectation. 展开更多
关键词 Hilbert C*-module Noetherian and Artinian C*-algebras purely infinite C*-algebras Morita equivalence
下载PDF
ON INDUCED GROUP HOMOMORPHISMS
14
作者 武同锁 《Journal of Shanghai Jiaotong university(Science)》 EI 1999年第1期67-69,共3页
In this paper, the induced group homomorphism was studied. It is proved that for any ideal I of a ring R contained in J(R), K 0(π):K 0(R)→K 0(R/I) is isomorphic if and only if K 0(π) + is a sem... In this paper, the induced group homomorphism was studied. It is proved that for any ideal I of a ring R contained in J(R), K 0(π):K 0(R)→K 0(R/I) is isomorphic if and only if K 0(π) + is a semigroup isomorphism; characterizations are given for the semilocal rings being semiperfect. 展开更多
关键词 INDUCED GROUP homomorphism semiperfect ring ISOMORPHISM LIFTING
下载PDF
HOMOMORPHISMS BETWEEN MULTIPLICATIVE SEMIGROUPS OF MATRICES OVER FIELDS
15
作者 张显 曹重光 《Acta Mathematica Scientia》 SCIE CSCD 2008年第2期301-306,共6页
Suppose F is a field, and n, p are integers with 1 ≤ p 〈 n. Let Mn(F) be the multiplicative semigroup of all n × n matrices over F, and let M^Pn(F) be its subsemigroup consisting of all matrices with rank p... Suppose F is a field, and n, p are integers with 1 ≤ p 〈 n. Let Mn(F) be the multiplicative semigroup of all n × n matrices over F, and let M^Pn(F) be its subsemigroup consisting of all matrices with rank p at most. Assume that F and R are subsemigroups of Mn(F) such that F M^Pn(F). A map f : F→R is called a homomorphism if f(AB) = f(A)f(B) for any A, B ∈F. In particular, f is called an endomorphism if F = R. The structure of all homomorphisms from F to R (respectively, all endomorphisms of Mn(F)) is described. 展开更多
关键词 homomorphism ENDOMORPHISM multiplicative semigroup of matrices
下载PDF
ALMOST HOMOMORPHISMS BETWEEN UNITAL C^*-ALGEBRAS: A FIXED POINT APPROACH 被引量:1
16
作者 M.Eshaghi Gordji S.Kaboli Gharetapeh +2 位作者 M.Bidkham T.Karimi M.Aghaei 《Analysis in Theory and Applications》 2011年第4期320-331,共12页
Let A, B be two unital C^*-algebras. By using fixed pint methods, we prove that every almost unital almost linear mapping h : A →B which satisfies h(2^nuy) = h(2^nu)h(y) for all u ∈ U(A), all y ∈ A, and a... Let A, B be two unital C^*-algebras. By using fixed pint methods, we prove that every almost unital almost linear mapping h : A →B which satisfies h(2^nuy) = h(2^nu)h(y) for all u ∈ U(A), all y ∈ A, and all n = 0,1,2,..., is a homomorphism. Also, we establish the generalized Hyers-Ulam-Rassias stability of ,-homomorphisms on unital C^*-algebras. 展开更多
关键词 alternative fixed point Jordan -homomorphism
下载PDF
On Homomorphism of Valuation Algebras
17
作者 GUAN XUE-CHONG LI YONG-MING 《Communications in Mathematical Research》 CSCD 2011年第1期69-80,共12页
In this paper, firstly, a necessary condition and a sufficient condition for an isomorphism between two semiring-induced valuation algebras to exist are presented respectively. Then a general valuation homomorphism ba... In this paper, firstly, a necessary condition and a sufficient condition for an isomorphism between two semiring-induced valuation algebras to exist are presented respectively. Then a general valuation homomorphism based on different domains is defined, and the corresponding homomorphism theorem of valuation algebra is proved. 展开更多
关键词 homomorphism valuation algebra SEMIRING
下载PDF
Homomorphism Key Agreement Based on RSA
18
作者 XIANG Guangli ZHU Ping +1 位作者 ZHANG Junhong MA Jie 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1609-1612,共4页
This paper reviews the basic content of key management, points out the limitation of the existing key agreement protocols. It introduces RSA public key cryptosystems in detail and homomorphie encryption scheme in the ... This paper reviews the basic content of key management, points out the limitation of the existing key agreement protocols. It introduces RSA public key cryptosystems in detail and homomorphie encryption scheme in the integer ring. The homomorphism key agreement based on RSA is presented. Compared with Diffie-Hellman protocol, its operation speed is more quickly; Compared with key agreement protocol based on password, it has better security. The protocol can use the public key of RSA to create the contributory, forward secrecy the session key. Finally, the security of the protocol is proved by BAN logic. 展开更多
关键词 homomorphic encryption key agreement BAN logic
下载PDF
Quantum homomorphic broadcast multi-signature based on homomorphic aggregation 被引量:1
19
作者 徐鑫 殷爱菡 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第7期254-261,共8页
Quantum multi-signature has attracted extensive attention since it was put forward.Beside its own improvement,related research is often combined with other quantum signature.However,this type of quantum signature has ... Quantum multi-signature has attracted extensive attention since it was put forward.Beside its own improvement,related research is often combined with other quantum signature.However,this type of quantum signature has one thing in common,that is,the generation and verification of signature depend heavily on the shared classical secret key.In order to increase the reliability of signature,the homomorphic aggregation technique is applied to quantum multi-signature,and then we propose a quantum homomorphic multi-signature protocol.Unlike previous quantum multi-signature protocols,this protocol utilizes homomorphic properties to complete signature generation and verification.In the signature generation phase,entanglement swapping is introduced,so that the individual signatures of multiple users are aggregated into a new multi-signature.The original quantum state is signed by the shared secret key to realize the verification of the signature in the verification phase.The signature process satisfies the homomorphic property,which can improve the reliability of the signature. 展开更多
关键词 quantum signature homomorphic aggregation homomorphic multi-signature Bell state
下载PDF
Multi-Source Data Privacy Protection Method Based on Homomorphic Encryption and Blockchain 被引量:3
20
作者 Ze Xu Sanxing Cao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第7期861-881,共21页
Multi-Source data plays an important role in the evolution of media convergence.Its fusion processing enables the further mining of data and utilization of data value and broadens the path for the sharing and dissemin... Multi-Source data plays an important role in the evolution of media convergence.Its fusion processing enables the further mining of data and utilization of data value and broadens the path for the sharing and dissemination of media data.However,it also faces serious problems in terms of protecting user and data privacy.Many privacy protectionmethods have been proposed to solve the problemof privacy leakage during the process of data sharing,but they suffer fromtwo flaws:1)the lack of algorithmic frameworks for specific scenarios such as dynamic datasets in the media domain;2)the inability to solve the problem of the high computational complexity of ciphertext in multi-source data privacy protection,resulting in long encryption and decryption times.In this paper,we propose a multi-source data privacy protection method based on homomorphic encryption and blockchain technology,which solves the privacy protection problem ofmulti-source heterogeneous data in the dissemination ofmedia and reduces ciphertext processing time.We deployed the proposedmethod on theHyperledger platformfor testing and compared it with the privacy protection schemes based on k-anonymity and differential privacy.The experimental results showthat the key generation,encryption,and decryption times of the proposedmethod are lower than those in data privacy protection methods based on k-anonymity technology and differential privacy technology.This significantly reduces the processing time ofmulti-source data,which gives it potential for use in many applications. 展开更多
关键词 homomorphic encryption blockchain technology multi-source data data privacy protection privacy data processing
下载PDF
上一页 1 2 145 下一页 到第
使用帮助 返回顶部