期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
中国债券拍卖市场的非对称性研究——基于结构方法的拍卖计量分析 被引量:1
1
作者 夏晓华 李进一 王美今 《经济评论》 CSSCI 北大核心 2010年第4期98-108,共11页
本文通过扩展Armantier和Sba提出的约束策略均衡,弥补了现有文献不能利用混合式拍卖数据的不足;基于拍卖计量分析方法,本文对中国债券拍卖市场的非对称性和投资者需求策略差异做了实证研究。我们发现:中国债券投资者存在明显的非对称性... 本文通过扩展Armantier和Sba提出的约束策略均衡,弥补了现有文献不能利用混合式拍卖数据的不足;基于拍卖计量分析方法,本文对中国债券拍卖市场的非对称性和投资者需求策略差异做了实证研究。我们发现:中国债券投资者存在明显的非对称性,小投资者的需求策略可以用线性均衡来近似,中等投资者和大投资者的需求策略与价格之间存在显著的非线性关系,大投资者是债券拍卖市场势力的主要来源。反事实分析表明,荷兰式拍卖有最高的理论收益,拍卖方式对不同投资者头寸的影响存在差异。数值模拟研究建议债券发行方引入更多小投资者;而此时投资者则应该适度调低报价,以减少"赢者诅咒"。 展开更多
关键词 债券拍卖 结构计量方法 模拟矩
原文传递
The rough representation and measurement of quotient structure in algebraic quotient space model 被引量:5
2
作者 陈林书 Wang Jiayang 《High Technology Letters》 EI CAS 2017年第3期293-297,共5页
Granular computing is a very hot research field in recent years. In our previous work an algebraic quotient space model was proposed,where the quotient structure could not be deduced if the granulation was based on an... Granular computing is a very hot research field in recent years. In our previous work an algebraic quotient space model was proposed,where the quotient structure could not be deduced if the granulation was based on an equivalence relation. In this paper,definitions were given and formulas of the lower quotient congruence and upper quotient congruence were calculated to roughly represent the quotient structure. Then the accuracy and roughness were defined to measure the quotient structure in quantification. Finally,a numerical example was given to demonstrate that the rough representation and measuring methods are efficient and applicable. The work has greatly enriched the algebraic quotient space model and granular computing theory. 展开更多
关键词 granular computing algebraic quotient space model quotient structure upper(lower) congruence relation
下载PDF
Cryptanalysis of Cryptosystems Based on General Linear Group 被引量:1
3
作者 Jianwei Jia Jinhui Liu Huanguo Zhang 《China Communications》 SCIE CSCD 2016年第6期217-224,共8页
Advances in quantum computers threaten to break public key cryptosystems such as RSA, ECC, and EIGamal on the hardness of factoring or taking a discrete logarithm, while no quantum algorithms are found to solve certai... Advances in quantum computers threaten to break public key cryptosystems such as RSA, ECC, and EIGamal on the hardness of factoring or taking a discrete logarithm, while no quantum algorithms are found to solve certain mathematical problems on non-commutative algebraic structures until now. In this background, Majid Khan et al.proposed two novel public-key encryption schemes based on large abelian subgroup of general linear group over a residue ring. In this paper we show that the two schemes are not secure. We present that they are vulnerable to a structural attack and that, it only requires polynomial time complexity to retrieve the message from associated public keys respectively. Then we conduct a detailed analysis on attack methods and show corresponding algorithmic description and efficiency analysis respectively. After that, we propose an improvement assisted to enhance Majid Khan's scheme. In addition, we discuss possible lines of future work. 展开更多
关键词 CRYPTOGRAPHY post quantum computational cryptography CRYPTANALYSIS non-abelian algebraic structures linear equations
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部