期刊文献+
共找到40篇文章
< 1 2 >
每页显示 20 50 100
“名理”格义:亚里士多德逻辑学早期汉译探源
1
作者 张逸婧 《国际汉学》 CSSCI 2024年第2期98-104,158,159,共9页
“名理”一词是西方逻辑的最早中文译名,出自17世纪来华耶稣会士所翻译的亚里士多德逻辑学。本文从历史、思想和语言三个角度来考察这一翻译,追溯其原因,研究其方法,评价其得失。沿着耶稣会来华的历史脉络,揭示译介逻辑学与利玛窦“补... “名理”一词是西方逻辑的最早中文译名,出自17世纪来华耶稣会士所翻译的亚里士多德逻辑学。本文从历史、思想和语言三个角度来考察这一翻译,追溯其原因,研究其方法,评价其得失。沿着耶稣会来华的历史脉络,揭示译介逻辑学与利玛窦“补儒”策略的关系。在此基础上辨析耶稣会所使用的拉丁文评注对逻辑的定义,比较其与亚里士多德本人的定义之间的区别。重点探讨“名理”在中国思想传统中的含义,以及格义所牵涉的中西哲学在思维方式和语言表达方面的差异。 展开更多
关键词 名理 耶稣会 亚里士多德
下载PDF
在“实理”与“精微”之间: 晚明《名理探》的译介与中国逻辑教育的开端(上)
2
作者 张亮 《中国天主教》 2024年第3期30-34,共5页
《名理探》是晚明西学东渐时期傅況际和李之藻合作译介的中国第一本亚里士多德逻辑学译著。其底本《亚里士多德辩证法大全疏解》,原本是17世纪初葡萄牙科英布拉大学为适应课堂教学对《工具论》进行系统化改编的逻辑学教科书,所以也是中... 《名理探》是晚明西学东渐时期傅況际和李之藻合作译介的中国第一本亚里士多德逻辑学译著。其底本《亚里士多德辩证法大全疏解》,原本是17世纪初葡萄牙科英布拉大学为适应课堂教学对《工具论》进行系统化改编的逻辑学教科书,所以也是中国输入的第一本逻辑学教科书。本文结合《名理探》译介过程,通过对底本与译本在文本元素、教学方法等.方面的阐述、对比与分析,认为《名理探》虽然准确把握住了这套往返于.“实理”与“精微”之间的关于概念分析和推理通则的知识系统,但是当时的中国士大夫还没有充分理解并开始重视逻辑这门学科,对逻辑作为一种思维工具的重要性没有清晰和完整的认识;个别学者虽然知其“精微”,但也还不知使用“精微”来探索“实理”。中国近代逻辑教育的开端尽管不起眼,但并不是完全失败的,今天重新审视这个开端,仍然有着非比寻常的意义。 展开更多
关键词 《名理探》 逻辑学 教科书 科英布拉 问题辩论
下载PDF
从《名理探》看西方科学理性思想与儒学的早期会通
3
作者 刘星 吕晓钰 《甘肃社会科学》 CSSCI 北大核心 2014年第5期53-55,共3页
明末清初,东传科学过程中西方传教士出于抬高西方宗教、传播宗教福音的政治考量,翻译、出版了大量西方的科学著作。正是在这样的背景下,《名理探》等一批东传科学书籍被译介到中国,西方科学理性思想在国内展现了它的勃勃生机。这些译注... 明末清初,东传科学过程中西方传教士出于抬高西方宗教、传播宗教福音的政治考量,翻译、出版了大量西方的科学著作。正是在这样的背景下,《名理探》等一批东传科学书籍被译介到中国,西方科学理性思想在国内展现了它的勃勃生机。这些译注虽然无一例外地带有浓厚的宗教色彩,但客观上促成了国人对西方科学理性思想的接触;带动了国内学界对挖掘以"名辩学"为基础的中国本土逻辑史研究的热潮;对当时传统儒者的思维起到了训练作用,增加了另一种新的思考问题的模式,并且丰富了中国儒学的内涵。从更广阔的领域来为"格物穷理之学"的发展提供思维的认识工具。客观上推动了清末民初以康有为为中心的向西方学习自然科学知识,向西方寻求治国良方的热潮,促进了以经世致用之学的"今文经学"的发展。 展开更多
关键词 东传科学 西方科学理性思想 中国儒学 《名理探》
下载PDF
《名理探》中对逻辑作为一门科学的讨论
4
作者 江璐 《逻辑学研究》 CSSCI 2019年第1期92-106,共15页
本文以《名理探》之《五公卷之一》中对逻辑之名称、内容、地位、内部划分等的讨论为对象,对照了其蓝本科因布拉亚里士多德逻辑注疏,结合当时文艺复兴的知识和教育背景,分析了《名理探》中关于逻辑作为一门科学的论述,由此而发也指出关... 本文以《名理探》之《五公卷之一》中对逻辑之名称、内容、地位、内部划分等的讨论为对象,对照了其蓝本科因布拉亚里士多德逻辑注疏,结合当时文艺复兴的知识和教育背景,分析了《名理探》中关于逻辑作为一门科学的论述,由此而发也指出关于逻辑学之界定的思索也是一个省思中国古代逻辑是否能与西方逻辑汇通的这个基础问题的出发点。 展开更多
关键词 逻辑史 辩证学 《名理探》 科因布拉注疏系列
下载PDF
《名理探》:中国第一次传播西方逻辑思想 被引量:2
5
作者 周琦 《科技创新导报》 2009年第7期207-207,共1页
本文介绍了在377年前《名理探》这本著作就已被介绍到中国,是中国最早的传播西方逻辑思想的著作,翻译语言出色,对传播逻辑思想有巨大贡献。
关键词 《名理探》 西方逻辑 西方文学 内容介绍
下载PDF
説帛書《經法》等四篇“物乃下生”與“刑法不人”
6
作者 杜新宇 《简帛研究》 2024年第1期206-211,共6页
馬王堆漢墓帛書《經法·名理》“物乃下生”之“物”爲逆物,即不合乎道的事物,“下生”意爲下降出生。《十六經·兵容》“刑法不人”意爲刑天法地而不法人,“刑法”是上文“刑天”“法地”的省略,屬俞樾所説的“蒙上文而省”,... 馬王堆漢墓帛書《經法·名理》“物乃下生”之“物”爲逆物,即不合乎道的事物,“下生”意爲下降出生。《十六經·兵容》“刑法不人”意爲刑天法地而不法人,“刑法”是上文“刑天”“法地”的省略,屬俞樾所説的“蒙上文而省”,此句實際上主張用兵當法天地人三者,法天法地而不法人,兵亦不能成。 展开更多
关键词 《名理》 物乃下生 《兵容》 刑法不人
下载PDF
明末晚清Logic的汉译历程
7
作者 聂长顺 熊展钊 《人文论丛》 CSSCI 2016年第1期276-287,共12页
与西方相比,专门的逻辑之学,可谓中国传统学术的一大弱项。所谓中国古代逻辑学,实是在西方Logic的映照下被'发现'的。西方Logic概念的传入,无疑是中国学术现代化历程中的一个重要事件。关于这一事件,迄今学界尚欠着实、明晰的... 与西方相比,专门的逻辑之学,可谓中国传统学术的一大弱项。所谓中国古代逻辑学,实是在西方Logic的映照下被'发现'的。西方Logic概念的传入,无疑是中国学术现代化历程中的一个重要事件。关于这一事件,迄今学界尚欠着实、明晰的描述。 展开更多
关键词 逻辑学家 LOGIC 辨学启蒙 名理 《名理探》
下载PDF
Proxy signature scheme for ID-based original signers and certificate-based proxy signers
8
作者 辛向军 孙垒 《Journal of Southeast University(English Edition)》 EI CAS 2008年第3期318-321,共4页
To realize delegation between different users in a mixed cryptosystem,a proxy signature scheme for ID-based original signers and certificated-based proxy signers(PSS-ID-CER)is defined.Using the bilinear properties o... To realize delegation between different users in a mixed cryptosystem,a proxy signature scheme for ID-based original signers and certificated-based proxy signers(PSS-ID-CER)is defined.Using the bilinear properties of the pairings and the characters of key generations of certificate-based cryptosystems and ID-based cryptosystems,a construction for such a scheme is also presented.To prove the security of the proposed scheme,a general security model for this scheme under adaptive chosen-PKG,chosen-ID,chosen-delegation,chosen-ProxySigner-public-key,chosen-proxy-key and chosen-message attack is defined.The proposed scheme is provably secure under the random oracle model and the hardness assumption of computational Diffie-Hellman problem. 展开更多
关键词 proxy signature ID-based cryptosystem bilinear pairings
下载PDF
明末著名数学家李之藻
9
作者 杨泽忠 《中学数学研究(华南师范大学)(上半月)》 2004年第10期46-47,共2页
李之藻(1565-1630),字振之,号我存,浙江杭州人,明末著名官员、天主教人物和乐律专家.同时,他和徐光启一样,也是那个时期著名的数学家和科学家.
关键词 明朝 数学家 李之藻 《同文算指》 《名理探》
下载PDF
Metafunctions and stylistic features of nominalization
10
作者 丛迎旭 《Sino-US English Teaching》 2007年第5期54-58,共5页
As an important feature of written language, nominalization is frequently used in formal texts. Using the approach of systemic functional grammar, the paper presents a detailed analysis of the three metafunctions of n... As an important feature of written language, nominalization is frequently used in formal texts. Using the approach of systemic functional grammar, the paper presents a detailed analysis of the three metafunctions of nominalization, which entails the positive and negative stylistic effects. The paper also discusses the relationship between form, function and stylistic features. 展开更多
关键词 NOMINALIZATION meta-functions grammatical metaphor stylistic features
下载PDF
A NEW EFFICIENT ID-BASED PROXY BLIND SIGNATURE SCHEME 被引量:2
11
作者 Ming Yang Wang Yumin 《Journal of Electronics(China)》 2008年第2期226-231,共6页
In a proxy blind signature scheme,the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting,e-payme... In a proxy blind signature scheme,the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting,e-payment,etc. Recently,Zheng,et al. presented an IDentity(ID) -based proxy blind sig-nature. In this paper,a new efficient ID-based proxy blind signature scheme from bilinear pairings is proposed,which can satisfy the security properties of both the proxy signatures and the blind signature schemes. Analysis of the scheme efficiency shows that the new scheme is more efficient than Zheng,et al.'s scheme. The proposed scheme is more practical in the real world. 展开更多
关键词 Blind signature Proxy signature Bilinear pairing
下载PDF
Convertible Proxy Signcryption Scheme 被引量:1
12
作者 李继国 李建中 +1 位作者 曹珍富 张亦辰 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2004年第2期209-213,共5页
In 1996, Mambo et al introduced the concept of proxy signature. However, proxy signature can only provide the delegated authenticity and cannot provide confidentiality. Recently, Gamage et al and Chan and Wei proposed... In 1996, Mambo et al introduced the concept of proxy signature. However, proxy signature can only provide the delegated authenticity and cannot provide confidentiality. Recently, Gamage et al and Chan and Wei proposed different proxy signcryption schemes respectively, which extended the concept of proxy signature. However, only the specified receiver can decrypt and verify the validity of proxy signcryption in their schemes. To protect the receiver's benefit in case of a later dispute, Wu and Hsu proposed a convertible authenticated encryption scheme, which can enable the receiver to convert signature into an ordinary one that can be verified by anyone. Based on Wu and Hsu' s scheme and improved Kim's scheme, we propose a convertible proxy signcryption scheme. The security of the proposed scheme is based on the intractability of reversing the one-way hash function and solving the discrete logarithm problem. The proposed scheme can satisfy all properties of strong proxy signature and withstand the public key substitution attack and does not use secure channel. In addition, the proposed scheme can be extended to convertible threshold proxy signcryption scheme. 展开更多
关键词 proxy signcryption nonrepudiation digital signature proxy signature
下载PDF
Identity-Based Proxy Verifiably Encrypted Signature Scheme 被引量:2
13
作者 Liu Jianhua Liu Jianwei Qiu Xiufeng 《China Communications》 SCIE CSCD 2012年第11期137-149,共13页
A Verifiably Encrypted Signature (VES) plays an essential role in the construction of a fair data exchange. The paper proposes an Identity-based Proxy Verifiably Encrypted Signature (IPVES) to combine the advantages o... A Verifiably Encrypted Signature (VES) plays an essential role in the construction of a fair data exchange. The paper proposes an Identity-based Proxy Verifiably Encrypted Signature (IPVES) to combine the advantages of a proxy signature and a VES in order to delegate the signing capability of the VES of an entity called the original signer to another entity, called the proxy signer. In this IPVES scheme, the original signer delegates his/her signing capability to the proxy signer. The proxy signer issues a signature by using a proxy signing key, encrypts the signature under a designated public key, and subsequently convinces a verifier that the resulting ciphertext contains such a signature. We prove that the proposed IPVES scheme is secure in a random oracle model under the computational Diffie-Hellman assumption. 展开更多
关键词 digital signature proxy signature random oracle model information security
下载PDF
RING PROXY SIGNATURES 被引量:1
14
作者 Wei Baodian Zhang Fangguo Chen Xiaofeng 《Journal of Electronics(China)》 2008年第1期108-114,共7页
Proxy signatures have been used to enable the transfer of digital signing power within some context and ring signatures can be used to provide the anonymity of a signer. By combining the functionalities of proxy signa... Proxy signatures have been used to enable the transfer of digital signing power within some context and ring signatures can be used to provide the anonymity of a signer. By combining the functionalities of proxy signatures and ring signatures, this paper introduces a new concept, named ring proxy signature, which is a proxy signature generated by an anonymous member from a set of potential signers. The paper also constructs the first concrete ring proxy signature scheme based on the provably secure Schnorr's signatures and two ID-based ring proxy signature schemes. The security analysis is provided as well. 展开更多
关键词 Proxy signature Ring signature Ring proxy signature ID-based cryptography Bilinear parings
下载PDF
A kind of signature scheme based on class groups of quadratic fields 被引量:1
15
作者 董晓蕾 曹珍富 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2004年第6期583-587,共5页
Quadratic-field cryptosystem is a cryptosystem built from discrete logarithm problem in ideal class groups of quadratic fields(CL-DLP). The problem on digital signature scheme based on ideal class groups of quadratic ... Quadratic-field cryptosystem is a cryptosystem built from discrete logarithm problem in ideal class groups of quadratic fields(CL-DLP). The problem on digital signature scheme based on ideal class groups of quadratic fields remained open, because of the difficulty of computing class numbers of quadratic fields. In this paper, according to our researches on quadratic fields, we construct the first digital signature scheme in ideal class groups of quadratic fields, using q as modulus, which denotes the prime divisors of ideal class numbers of quadratic fields. Security of the new signature scheme is based fully on CL-DLP. This paper also investigates realization of the scheme, and proposes the concrete technique. In addition, the technique introduced in the paper can be utilized to realize signature schemes of other kinds. 展开更多
关键词 quadratic-field cryptosystem digital signature ideal class groups discrete logarithm problem
下载PDF
IDENTITY-BASED KEY-INSULATED PROXY SIGNATURE 被引量:4
16
作者 Wan Zhongmei Lai Xuejia +2 位作者 Weng Jian Liu Shengli Hong Xuan 《Journal of Electronics(China)》 2009年第6期853-858,共6页
In proxy signature schemes,the proxy signer B is permitted to produce a signature on behalf of the original signer A. However,exposure of proxy signing keys can be the most devastating attack on a proxy signature sche... In proxy signature schemes,the proxy signer B is permitted to produce a signature on behalf of the original signer A. However,exposure of proxy signing keys can be the most devastating attack on a proxy signature scheme since any adversary can sign messages on behalf of the proxy signer. In this paper,we applied Dodis,et al.’s key-insulation mechanism and proposed an Identity-Based (ID-based) Key-Insulated Proxy Signature (IBKIPS) scheme with secure key-updates. The proposed scheme is strong key-insulated and perfectly key-insulated. Our scheme also supports unbounded period numbers and random-access key-updates. 展开更多
关键词 KEY-INSULATED Proxy signature Identity-based signature Key-exposure Bilinear pairings
下载PDF
A NEW MULTI-PROXY SIGNATURE FROM BILINEAR PAIRING 被引量:1
17
作者 Li Sujuan Zhang Futai 《Journal of Electronics(China)》 2007年第1期90-94,共5页
Proxy signatures are very useful tools when one needs to delegate his/her signing capability to other parties. In this paper,a new multi-proxy signature scheme is proposed. The new scheme is constructed from bilinear ... Proxy signatures are very useful tools when one needs to delegate his/her signing capability to other parties. In this paper,a new multi-proxy signature scheme is proposed. The new scheme is constructed from bilinear pairings using Boneh,Lynn,and Shacham’s (BLS) short signatures. The proxy key for the proxy group is just a short signature on the proxy warrant generated by the original signer. Due to the use of short signatures,our scheme is not only efficient,but also satisfies all the security requirements of the strong proxy signature. 展开更多
关键词 Multi-proxy signature Short signature Bilinear pairings
下载PDF
Identity-based proxy multi-signature applicable to secure E-transaction delegations
18
作者 刘建华 Wu Qianhong +1 位作者 Liu Jianwei Shang Tao 《High Technology Letters》 EI CAS 2016年第2期199-206,共8页
To enhance the robustness of a proxy multi-signature scheme and improve its efficiency, a novel proxy signature paradigm is proposed referred to as In this paradigm, multiple proxy signer candidates identity-based pro... To enhance the robustness of a proxy multi-signature scheme and improve its efficiency, a novel proxy signature paradigm is proposed referred to as In this paradigm, multiple proxy signer candidates identity-based proxy multi-signature (IBPMS). are employed to play a role of the single proxy signer in the existing model. A provably secure IBPMS scheme is presented which requires only one round broadcast operation. Performance analysis demonstrates that the new scheme outperforms the existing multi-signature schemes in robustness and communication. These properties are rendered to our IBPMS scheme as a more practical solution to secure e-transaction delegation applications of proxy signatures. 展开更多
关键词 MULTI-SIGNATURE E-transaction DELEGATION provable security information security
下载PDF
Anharmonic Vibrational Signatures of DNA Bases and Watson-Crick Base Pairs 被引量:3
19
作者 Gui-xiu Wang Xiao-yan Ma Jian-ping Wang 《Chinese Journal of Chemical Physics》 SCIE CAS CSCD 2009年第6期563-570,J0001,共9页
Changes of molecular structure and associated charge distributions, and changes of anharmonic vibrational parameters from DNA base monomers to the Watson-Crick base pairs, have been investigated at the density functio... Changes of molecular structure and associated charge distributions, and changes of anharmonic vibrational parameters from DNA base monomers to the Watson-Crick base pairs, have been investigated at the density functional theory level. Through examination of the NH2, N H, and C=O stretching vibrational modes that are involved in the multiple H-bonds in the base pairs, sensitivity of their diagonal and off-diagonal anharmonicities, as well as anharmonic vibrational couplings, to the structure change are predicted. Our results reveal the intrinsic connection between the anharmonic vibrational potentials, H-bonding, and electrostatic interactions in DNA bases. 展开更多
关键词 Anharmonic vibration ANHARMONICITY COUPLING Two-dimensional infrared spectroscopy DNA base
下载PDF
Cryptanalysis of Threshold-proxy Threshold-signature Schemes 被引量:1
20
作者 HAN Jin-guang KANG Bao-yuan 《Chinese Quarterly Journal of Mathematics》 CSCD 2010年第3期459-463,共5页
Recently,Hwang et al.proposed a (t,n) threshold-proxy (c,m) thresholdsignature schemes,in which only any t or more original signers of n original signers can authorize a proxy group of m proxy signers and then onl... Recently,Hwang et al.proposed a (t,n) threshold-proxy (c,m) thresholdsignature schemes,in which only any t or more original signers of n original signers can authorize a proxy group of m proxy signers and then only c or more proxy signers can cooperatively generate threshold-proxy threshold-signature.In this scheme,they claimed that original signers cannot forge the proxy signature and the proxy signers cannot forge signature on behalf of the original signers.However,in this paper,we will give a attack to show that their scheme can not resist impersonation attacks. 展开更多
关键词 CRYPTANALYSIS impersonate attacks threshold-proxy threshold-signature
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部