Based on the procedure of dynamic programming,this paper investigates the military spending,trade and wealth accumulation in a stochastic endogenous economic growth model.For the Cobb-Dauglas utility function,explicit...Based on the procedure of dynamic programming,this paper investigates the military spending,trade and wealth accumulation in a stochastic endogenous economic growth model.For the Cobb-Dauglas utility function,explicit solutions of the optimal problem of the home country are obtained.Meanwhile,the optimal consumptions of domestic goods and foreign goods,the share of domestic capital stock and foreign bond holdings are derived explicitly.The comparative dynamic analysis shows that when intertemporal substitution in consumption is relative elastic,economic growth has a positive correlation with foreign military spending,has a negative correlation with variance of foreign military spending,and has a positive correlation with variance of capital or bonds if capital and bonds yields the same benefits.However,in the case of inelasticity,variance of foreign military spending may stimulate or weaken economic development.展开更多
In this paper, we first review the existing proofs of the Boneh-Franklin identity-based encryption scheme (BF-IBE for short), and show how to admit a new proof by slightly modifying the specifications of the hash func...In this paper, we first review the existing proofs of the Boneh-Franklin identity-based encryption scheme (BF-IBE for short), and show how to admit a new proof by slightly modifying the specifications of the hash functions of the original BF-IBE. Compared with prior proofs, our new proof provides a tighter security reduction and minimizes the use of random oracles, thus indicates BF-IBE has better provable security with our new choices of hash functions. The techniques developed in our proof can also be applied to improving security analysis of some other IBE schemes. As an independent technical contribution, we also give a rigorous proof of the Fujisaki-Okamoto (FO) transformation in the case of CPA-to-CCA, which demonstrates the efficiency of the FO-transformation (CPA-to-CCA), in terms of the tightness of security reduction, has long been underestimated. This result can remarkably benefit the security proofs of encryption schemes using the FO-transformation for CPA-to-CCA enhancement.展开更多
基金supported by Training Program for the Major Fundamental Research of Central University of Finance and Economics under Grant No.14ZZD001Beijing Nova Program under Grant No.Z131109000413029Beijing Finance Funds of Natural Science Program for Excellent Talents under Grant No.2014000026833ZK19
文摘Based on the procedure of dynamic programming,this paper investigates the military spending,trade and wealth accumulation in a stochastic endogenous economic growth model.For the Cobb-Dauglas utility function,explicit solutions of the optimal problem of the home country are obtained.Meanwhile,the optimal consumptions of domestic goods and foreign goods,the share of domestic capital stock and foreign bond holdings are derived explicitly.The comparative dynamic analysis shows that when intertemporal substitution in consumption is relative elastic,economic growth has a positive correlation with foreign military spending,has a negative correlation with variance of foreign military spending,and has a positive correlation with variance of capital or bonds if capital and bonds yields the same benefits.However,in the case of inelasticity,variance of foreign military spending may stimulate or weaken economic development.
基金supported by National Natural Science Foundation of China(Grant No.60970152)IIE's Research Project on Cryptography(Grant No.Y3Z0011102)+1 种基金the Strategic Priority Research Program of Chinese Academy of Sciences(Grant No.XDA06010701)National Key Basic Research Program of China(973 Program)(Grant No.2011CB302400)
文摘In this paper, we first review the existing proofs of the Boneh-Franklin identity-based encryption scheme (BF-IBE for short), and show how to admit a new proof by slightly modifying the specifications of the hash functions of the original BF-IBE. Compared with prior proofs, our new proof provides a tighter security reduction and minimizes the use of random oracles, thus indicates BF-IBE has better provable security with our new choices of hash functions. The techniques developed in our proof can also be applied to improving security analysis of some other IBE schemes. As an independent technical contribution, we also give a rigorous proof of the Fujisaki-Okamoto (FO) transformation in the case of CPA-to-CCA, which demonstrates the efficiency of the FO-transformation (CPA-to-CCA), in terms of the tightness of security reduction, has long been underestimated. This result can remarkably benefit the security proofs of encryption schemes using the FO-transformation for CPA-to-CCA enhancement.