Based on the entangled Fresnel operator (EFO) proposed in [Commun. Theor. Phys. 46 (2006) 559], the optical operator method studied by the IWOP technique (Ma et al., Commun. Theor. Phys. 49 (2008) 1295) is ext...Based on the entangled Fresnel operator (EFO) proposed in [Commun. Theor. Phys. 46 (2006) 559], the optical operator method studied by the IWOP technique (Ma et al., Commun. Theor. Phys. 49 (2008) 1295) is extended to the two-mode case, which gives the decomposition of the entangled Fresnel operator, corresponding to the decomposition of ray transfer matrix [A, B, C, D]. The EFO can unify those optical operators in two-mode case. Various decompositions of EFO into the exponential canonical operators are obtained. The entangled state representation is useful in the research.展开更多
An identity-based verifiably committed signature scheme (IB-VCS) was proposed, which is proved secure in the standard model (i.e., without random oracles). It enjoys the setup-free property and stand-alone property, b...An identity-based verifiably committed signature scheme (IB-VCS) was proposed, which is proved secure in the standard model (i.e., without random oracles). It enjoys the setup-free property and stand-alone property, both of which make an exchange protocol more practical. The scheme is unconditionally secure against the cheating signer, its security against the cheating verifier is reduced to the computational Diffie-Hellman (CDH) problem in the underlying group, it is secure against the cheating trusted third party if the underlying Paterson Schuldt's identity based signature (IBS) scheme is secure, which is proven true based on the CDH assumption in the standard model.展开更多
基金Supported by the National Natural Science Foundation of China under Grant No. 10775097the Research Foundation of the Education Department of Jiangxi Province of China under Grant No. GJJ10097
文摘Based on the entangled Fresnel operator (EFO) proposed in [Commun. Theor. Phys. 46 (2006) 559], the optical operator method studied by the IWOP technique (Ma et al., Commun. Theor. Phys. 49 (2008) 1295) is extended to the two-mode case, which gives the decomposition of the entangled Fresnel operator, corresponding to the decomposition of ray transfer matrix [A, B, C, D]. The EFO can unify those optical operators in two-mode case. Various decompositions of EFO into the exponential canonical operators are obtained. The entangled state representation is useful in the research.
基金The National Hi-Tech Research and Development Program (863) of China (No. 2005AA145110)The Pudong New Area Technology Innovation Public Service Platform of China (No. PDP2005-04)
文摘An identity-based verifiably committed signature scheme (IB-VCS) was proposed, which is proved secure in the standard model (i.e., without random oracles). It enjoys the setup-free property and stand-alone property, both of which make an exchange protocol more practical. The scheme is unconditionally secure against the cheating signer, its security against the cheating verifier is reduced to the computational Diffie-Hellman (CDH) problem in the underlying group, it is secure against the cheating trusted third party if the underlying Paterson Schuldt's identity based signature (IBS) scheme is secure, which is proven true based on the CDH assumption in the standard model.