期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
Small Solutions of Quadratic Equations with Prime Variables in Arithmetic Progressions
1
作者 Tian Ze WANG 《Acta Mathematica Sinica,English Series》 SCIE CSCD 2009年第2期299-320,共22页
A necessary and sufficient solvable condition for diagonal quadratic equation with prime variables in arithmetic progressions is given, and the best qualitative bound for small solutions of the equation is obtained,
关键词 quadratic equation prime variable small solution arithmetic progression
原文传递
THE SOLUTION OF RANDOM EIGENVALUE PROBLEM WITH SMALL STOCHASTIC PROCESSES
2
作者 夏宁茂 《Acta Mathematica Scientia》 SCIE CSCD 1992年第4期381-391,共11页
This paper considers an eigenvalue problem containing small stochastic processes. For every fixed is, we can use the Prufer substitution to prove the existence of the random solutions lambda(n) and u(n) in the meaning... This paper considers an eigenvalue problem containing small stochastic processes. For every fixed is, we can use the Prufer substitution to prove the existence of the random solutions lambda(n) and u(n) in the meaning of large probability. These solutions can be expanded in epsilon regularly, and their correction terms can be obtained by solving some random linear differential equations. 展开更多
关键词 THE solution OF RANDOM EIGENVALUE PROBLEM WITH small STOCHASTIC PROCESSES der
下载PDF
基于小震定位与震源机制解信息的阿尔金断裂带东段构造转换研究 被引量:5
3
作者 刘亢 李海兵 +4 位作者 王长在 张辉 肖根如 李红光 张凌 《地球物理学报》 SCIE EI CAS CSCD 北大核心 2018年第11期4459-4474,共16页
阿尔金断裂带东段地区的造转换及其动力学机制研究一直是地学工作者关注的焦点.本文利用双差定位法获取研究区域2008—2017年间6013次地震事件的精确定位数据;整理筛选前人震源机制解36个,并采用P/S波振幅比方法计算获得221个以及CAP方... 阿尔金断裂带东段地区的造转换及其动力学机制研究一直是地学工作者关注的焦点.本文利用双差定位法获取研究区域2008—2017年间6013次地震事件的精确定位数据;整理筛选前人震源机制解36个,并采用P/S波振幅比方法计算获得221个以及CAP方法获得25个震源机制解信息.选择野马河—大雪山断裂作为研究区构造转换研究的突破口,综合小震定位数据与震源机制解信息,并开展野外地质调查进行验证,清晰刻画出该断裂的深部构造形态以及现今的运动特征:由阿尔金断裂带向祁连山方向过渡,断层产状由近直立逐渐转变为倾向南,倾角变缓,震源机制解由走滑性质为主转变为逆冲性质为主,是一个连续渐变的过程,为研究区的构造转换研究提供了直接证据. 展开更多
关键词 阿尔金断裂带 祁连山断裂带 小震重新定位 震源机制解 构造转换
下载PDF
A lattice-based signcryption scheme without random oracles 被引量:5
4
作者 Xiuhua LU Qiaoyan WEN +2 位作者 Zhengping JIN Licheng WANG Chunli YANG 《Frontiers of Computer Science》 SCIE EI CSCD 2014年第4期667-675,共9页
In order to achieve secure signcryption schemes in the quantum era, Li Fagen et al. [Concurrency and Computation: Practice and Experience, 2012, 25(4): 2112-2122] and Wang Fenghe et al. [Applied Mathematics & Inf... In order to achieve secure signcryption schemes in the quantum era, Li Fagen et al. [Concurrency and Computation: Practice and Experience, 2012, 25(4): 2112-2122] and Wang Fenghe et al. [Applied Mathematics & Information Sciences, 2012, 6(1): 23-28] have independently extended the concept of signcryption to lattice-based cryptography. However, their schemes are only secure under the random or- acle model. In this paper, we present a lattice-based signcryp- tion scheme which is secure under the standard model. We prove that our scheme achieves indistinguishability against adaptive chosen-ciphertext attacks (IND-CCA2) under the learning with errors (LWE) assumption and existential unforgeability against adaptive chosen-message attacks (EUF- CMA) under the small integer solution (SIS) assumption. 展开更多
关键词 SIGNCRYPTION standard model lattice-based cryptography learning with errors problem small integer solution problem
原文传递
Lattice-based sequential aggregate signatures with lazy verification 被引量:4
5
作者 Zhang Yanhua Hu Yupu +1 位作者 Jiang Mingming Xue Lili 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2015年第6期36-44,共9页
This paper proposes the first lattice-based sequential aggregate signature (SAS) scheme with lazy verification that is provably secure in the random oracle model. As opposed to large integer factoring and discrete l... This paper proposes the first lattice-based sequential aggregate signature (SAS) scheme with lazy verification that is provably secure in the random oracle model. As opposed to large integer factoring and discrete logarithm based systems, the security of the construction relies on worst-case lattice problem, namely, under the small integer solution (SIS) assumption. Generally speaking, SAS schemes enable any group of signers ordered in a chain to sequentially combine their signatures such that the size of the aggregate signature is much smaller than the total size of all individual signatures. Unlike prior such proposals, the new scheme does not require a signer to retrieve the keys of other signers and verify the aggregate-so-far before adding its own signature, and the signer can add its own signature to an unverified aggregate and forward it along immediately, postponing verification until load permits or the necessary public keys are obtained. Indeed, the new scheme does not even require a signer to know the public keys of other signers. 展开更多
关键词 sequential aggregate signatures lattice-based cryptography lazy verification small integer solution
原文传递
Attribute-Based Signature on Lattices 被引量:3
6
作者 毛贤平 陈克非 +1 位作者 龙宇 王亮亮 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期406-411,共6页
Attribute-based signature is a versatile class of digital signatures. In attribute-based signature, a signer obtains his private key corresponding to the set of his attributes from a trusted authority, and then he can... Attribute-based signature is a versatile class of digital signatures. In attribute-based signature, a signer obtains his private key corresponding to the set of his attributes from a trusted authority, and then he can sign a message with any predicate that is satisfied by his attributes set. Unfortunately, there does not exist an attributebased signature which is resistance to the quantum attacks. This means we do not have secure attribute-based signature schemes in a post-quantum world. Based on this consideration, an attribute-based signature on lattices,which could resist quantum attacks, is proposed. This scheme employs "bonsai tree" techniques, and could be proved secure under the hardness assumption of small integer solution problem. 展开更多
关键词 attribute-based signature LATTICE small integer solution problem
原文传递
Post-quantum blind signcryption scheme from lattice 被引量:2
7
作者 Huifang YU Lu BAI 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2021年第6期891-901,共11页
Blind signcryption(BSC) can guarantee the blindness and untrackability of signcrypted messages, and moreover, it provides simultaneous unforgeability and confidentiality. Most traditional BSC schemes are based on the ... Blind signcryption(BSC) can guarantee the blindness and untrackability of signcrypted messages, and moreover, it provides simultaneous unforgeability and confidentiality. Most traditional BSC schemes are based on the number theory. However, with the rapid development of quantum computing, traditional BSC systems are faced with severe security threats. As promising candidate cryptosystems with the ability to resist attacks from quantum computing, lattice-based cryptosystems have attracted increasing attention in academic fields. In this paper, a post-quantum blind signcryption scheme from lattice(PQ-LBSCS) is devised by applying BSC to lattice-based cryptosystems. PQ-LBSCS inherits the advantages of the lattice-based cryptosystem and blind signcryption technique. PQ-LBSCS is provably secure under the hard assumptions of the learning with error problem and small integer solution problem in the standard model. Simulations are carried out using the Matlab tool to analyze the computational efficiency, and the simulation results show that PQ-LBSCS is more efficient than previous schemes. PQ-LBSCS has extensive application prospects in e-commerce, mobile communication, and smart cards. 展开更多
关键词 Lattice-based cryptosystem Blind signcryption Post-quantum computing Learning with error assumption small integer solution assumption
原文传递
An Attribute-Based Signature Scheme from Lattice Assumption 被引量:4
8
作者 ZHANG Yanhua HU Yupu JIANG Mingming 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2015年第3期207-213,共7页
Inspired by the framework of Boyen, in this paper, an attribute-based signature(ABS) scheme from lattice assumption is proposed. In this attribute-based signature scheme, an entity's attributes set corresponds to t... Inspired by the framework of Boyen, in this paper, an attribute-based signature(ABS) scheme from lattice assumption is proposed. In this attribute-based signature scheme, an entity's attributes set corresponds to the concatenation of a lattice matrix with the sum of some random matrices, and the signature vector is generated by using the Preimage Sampling algorithm. Compared with current attribute-based signature schemes, this scheme can resist quantum attacks and enjoy shorter public-key, smaller signature size and higher efficiency. 展开更多
关键词 attribute-based signature lattice assumption small integer solution post-quantum cryptography high efficiency
原文传递
Improved authenticated key agreement protocol based on Bi-ISIS problem 被引量:1
9
作者 Yang Yatao Zhang Juanmei +1 位作者 Huang Jierun Zhang Yaze 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2020年第3期93-102,共10页
In the post quantum era,public key cryptographic scheme based on lattice is considered to be the most promising cryptosystem that can resist quantum computer attacks.However,there are still few efficient key agreement... In the post quantum era,public key cryptographic scheme based on lattice is considered to be the most promising cryptosystem that can resist quantum computer attacks.However,there are still few efficient key agreement protocols based on lattice up to now.To solve this issue,an improved key agreement protocol with post quantum security is proposed.Firstly,by analyzing the Wess-Zumino model+(WZM+)key agreement protocol based on small integer solution(SIS)hard problem,it is found that there are fatal defects in the protocol that cannot resist man-in-the-middle attack.Then based on the bilateral inhomogeneous small integer solution(Bi-ISIS)problem,a mutual authenticated key agreement(AKA)protocol with key confirmation is proposed and designed.Compared with Diffie-Hellman(DH)protocol,WZM+key agreement protocol,and the AKA agreement based on the ideal lattice protocol,the improved protocol satisfies the provable security under the extend Canetti-Krawczyk(eCK)model and can resist man-in-the-middle attack,replay attack and quantum computing attack. 展开更多
关键词 LATTICE small integer solution problem key agreement protocol provable security eCK model
原文传递
Semi-Linear Fractionalσ-Evolution Equations with Nonlinear Memory
10
作者 KAINANE MEZADEK Abdelatif 《Journal of Partial Differential Equations》 CSCD 2020年第4期291-312,共22页
In this paper we study the local or global(in time)existence of small data solutions to semi-linear fractionalσ-evolution equations with nonlinear memory.Our main goals is to explain on the one hand the influence of ... In this paper we study the local or global(in time)existence of small data solutions to semi-linear fractionalσ-evolution equations with nonlinear memory.Our main goals is to explain on the one hand the influence of the memory term and on the other hand the influence of higher regularity of the data on qualitative properties of solutions. 展开更多
关键词 Fractional equations σ-evolution equations global in time existence small data solutions nonlinear memory
原文传递
An Algorithm Substitution Attack on Fiat-Shamir Signatures Based on Lattice
11
作者 LIU Jinhui YU Yong +2 位作者 WU Fusheng CHENG Yuehua ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2022年第1期17-25,共9页
Many evidences have showed that some intelligence agencies(often called big brother)attempt to monitor citizens’communication by providing coerced citizens a lot of subverted cryptographic algorithms and coercing the... Many evidences have showed that some intelligence agencies(often called big brother)attempt to monitor citizens’communication by providing coerced citizens a lot of subverted cryptographic algorithms and coercing them to adopt these algorithms.Since legalized services on large number of various applications and system architectures depend on digital signature techniques,in the context some coerced users who use double authentication preventing signatures to design some novel digital signature techniques,have some convincing dissertations to defuse requests from authorities and big brothers creating some corresponding subverted signatures.As rapid progress in quantum computers,National Security Agency advisory memorandum and announcement of National Institute of Standards and Technology procedures from standardization focus on some cryptographic algorithms which are post quantum secure.Motivated by these issues,we design an algorithm substitution attack against Fiat-Shamir family based on lattices(e.g.,BLISS,BG,Ring-TESLA,PASSSign and GLP)that are proven post-quantum computational secure.We also show an efficient deterable way to eliminate big brother’s threat by leaking signing keys from signatures on two messages to be public.Security proof shows that our schemes satisfy key extraction,undetectability and deterability.Through parameters analysis and performance evaluation,we demonstrate that our deterring subverted Fiat-Shamir signature is practical,which means that it can be applied to privacy and protection in some system architectures. 展开更多
关键词 algorithm substitution attack double authentication preventing signatures LATTICE ring-SIS(small integer solution)problem
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部