The objective of Autoregressive Distributed Lag (ARDL) investigation of macroeconomic mechanisms on ASEAN-5 stock earnings equation can contribute to analyzing and demonstrating macroeconomic forces acting a statist...The objective of Autoregressive Distributed Lag (ARDL) investigation of macroeconomic mechanisms on ASEAN-5 stock earnings equation can contribute to analyzing and demonstrating macroeconomic forces acting a statistically and economically significant effect on rate of return of securities for a given time through the application of the ARDL approach to cointegration when the variables are mixed degrees of integration in cointegrated time series, i.e. I(0) and I(1). This results in a long-run or a short-run relationship between macroeconomic force acting for a given time affecting 24 quarterly rates of return for listed companies in Information and Communication Technologies OCT) sector of Stock Exchange of Thailand (SET), the Kuala Lumpur Composite Index (KLSE) index (Malaysia), Financial Times Share Index (FTSI), Philippine Stock Exchange (PSE), and Jakarta Composite Index (JKSE) (Indonesia). The impulses of three ASEAN macroeconomic forces---GDPt, EXt, and INTt acting for a given time influence the earnings of selected 23 1CT returns for listed companies on both domestic investments and outsider investments in the same period. This paper has investigated how other-concerning macroeconomic force acting might interrelate with rate of return of securities in the ICT sector, debt and financial innovations, in line with some significant formalized facts. The funding of capital inflow in part of ICT securities was statistically globally significant to recognize significant achievement in ICT specific pathways to distinction as the science of accomplishment. The public sector performing as a key purchaser of ICT security solutions related to integrate the ASEAN exchange members into modern capitalization can lead to adverse effects, such as risky investment-hub interventions due to the mixing financial systems in three ASEAN regional integrations through investments.展开更多
The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant qua...The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant quantum cryptography very urgent. This motivate us to design a new key exchange protocol and eneryption scheme in this paper. Firstly, some acknowledged mathematical problems was introduced, such as ergodic matrix problem and tensor decomposition problem, the two problems have been proved to NPC hard. From the computational complexity prospective, NPC problems have been considered that there is no polynomial-time quantum algorithm to solve them. From the algebraic structures prospective, non-commutative cryptography has been considered to resist quantum. The matrix and tensor operator we adopted also satisfied with this non-commutative algebraic structures, so they can be used as candidate problems for resisting quantum from perspective of computational complexity theory and algebraic structures. Secondly, a new problem was constructed based on the introduced problems in this paper, then a key exchange protocol and a public key encryption scheme were proposed based on it. Finally the security analysis, efficiency, recommended parameters, performance evaluation and etc. were also been given. The two schemes has the following characteristics, provable security,security bits can be scalable, to achieve high efficiency, quantum resistance, and etc.展开更多
Certificate Authority (CA) is the core of public key infrastructure. However, the traditional structure of CA is either hierarchical or reticular, and none of them is suitable for security require-nients come from the...Certificate Authority (CA) is the core of public key infrastructure. However, the traditional structure of CA is either hierarchical or reticular, and none of them is suitable for security require-nients come from the new trend in enterprise cooperation, namely virtual enterprise (VE). In this paper a new idea - virtual certificate authority (VCA), is proposed, as well as its implemen-tation. The goal of VCA is to provide global certificate service over vital enterprise while keeping CA of each participant intact as much as possible. Unlike PEM, PGP, and BCA, by using secret sharing scheme, virtual CA avoids the need for TTP and supports virtual enterprise's feature of dynamical construction and destruction.展开更多
文摘The objective of Autoregressive Distributed Lag (ARDL) investigation of macroeconomic mechanisms on ASEAN-5 stock earnings equation can contribute to analyzing and demonstrating macroeconomic forces acting a statistically and economically significant effect on rate of return of securities for a given time through the application of the ARDL approach to cointegration when the variables are mixed degrees of integration in cointegrated time series, i.e. I(0) and I(1). This results in a long-run or a short-run relationship between macroeconomic force acting for a given time affecting 24 quarterly rates of return for listed companies in Information and Communication Technologies OCT) sector of Stock Exchange of Thailand (SET), the Kuala Lumpur Composite Index (KLSE) index (Malaysia), Financial Times Share Index (FTSI), Philippine Stock Exchange (PSE), and Jakarta Composite Index (JKSE) (Indonesia). The impulses of three ASEAN macroeconomic forces---GDPt, EXt, and INTt acting for a given time influence the earnings of selected 23 1CT returns for listed companies on both domestic investments and outsider investments in the same period. This paper has investigated how other-concerning macroeconomic force acting might interrelate with rate of return of securities in the ICT sector, debt and financial innovations, in line with some significant formalized facts. The funding of capital inflow in part of ICT securities was statistically globally significant to recognize significant achievement in ICT specific pathways to distinction as the science of accomplishment. The public sector performing as a key purchaser of ICT security solutions related to integrate the ASEAN exchange members into modern capitalization can lead to adverse effects, such as risky investment-hub interventions due to the mixing financial systems in three ASEAN regional integrations through investments.
基金the National Natural Science Foundation of China,the State Key Program of National Natural Science of China,the Major Research Plan of the National Natural Science Foundation of China,Major State Basic Research Development Program of China (973 Program),the Hubei Natural Science Foundation of China
文摘The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant quantum cryptography very urgent. This motivate us to design a new key exchange protocol and eneryption scheme in this paper. Firstly, some acknowledged mathematical problems was introduced, such as ergodic matrix problem and tensor decomposition problem, the two problems have been proved to NPC hard. From the computational complexity prospective, NPC problems have been considered that there is no polynomial-time quantum algorithm to solve them. From the algebraic structures prospective, non-commutative cryptography has been considered to resist quantum. The matrix and tensor operator we adopted also satisfied with this non-commutative algebraic structures, so they can be used as candidate problems for resisting quantum from perspective of computational complexity theory and algebraic structures. Secondly, a new problem was constructed based on the introduced problems in this paper, then a key exchange protocol and a public key encryption scheme were proposed based on it. Finally the security analysis, efficiency, recommended parameters, performance evaluation and etc. were also been given. The two schemes has the following characteristics, provable security,security bits can be scalable, to achieve high efficiency, quantum resistance, and etc.
基金the High Technoeogy Research and Debelopment Program of China
文摘Certificate Authority (CA) is the core of public key infrastructure. However, the traditional structure of CA is either hierarchical or reticular, and none of them is suitable for security require-nients come from the new trend in enterprise cooperation, namely virtual enterprise (VE). In this paper a new idea - virtual certificate authority (VCA), is proposed, as well as its implemen-tation. The goal of VCA is to provide global certificate service over vital enterprise while keeping CA of each participant intact as much as possible. Unlike PEM, PGP, and BCA, by using secret sharing scheme, virtual CA avoids the need for TTP and supports virtual enterprise's feature of dynamical construction and destruction.