Properties of third-order recurrence sequences were investigated and a new variant of the GH public-key cryptosystem,which was further improved to be a probabil-istic public-key cryptosystem,was proposed.Then security...Properties of third-order recurrence sequences were investigated and a new variant of the GH public-key cryptosystem,which was further improved to be a probabil-istic public-key cryptosystem,was proposed.Then security analysis of the proposed scheme was provided and it was proved that the one-wayness of the proposed scheme is equivalent to partial discrete logarithm and its semantic se-curity is equivalent to decisional Diffie-Hellman problem in ring extension.Finally,efficiency analysis of the proposed scheme was provided,and that these two encryption schemes need to transfer 2log N and 4log N bits data re-spectively.展开更多
The purpose of this paper is to give the extensions of some identities involving generalized Fibonacci and Lucas numbers with binomial coefficients.These results generalize the identities by Gulec,Taskara and Uslu in ...The purpose of this paper is to give the extensions of some identities involving generalized Fibonacci and Lucas numbers with binomial coefficients.These results generalize the identities by Gulec,Taskara and Uslu in Appl.Math.Lett.23(2010)68-72 and Appl.Math.Comput.220(2013)482-486.展开更多
基金supported by the National Natural Science Foundation of China(No.90412011)the Hi-Tech Research and Development Program of China(No.2002AA143021)。
文摘Properties of third-order recurrence sequences were investigated and a new variant of the GH public-key cryptosystem,which was further improved to be a probabil-istic public-key cryptosystem,was proposed.Then security analysis of the proposed scheme was provided and it was proved that the one-wayness of the proposed scheme is equivalent to partial discrete logarithm and its semantic se-curity is equivalent to decisional Diffie-Hellman problem in ring extension.Finally,efficiency analysis of the proposed scheme was provided,and that these two encryption schemes need to transfer 2log N and 4log N bits data re-spectively.
基金Supported by the Youth Backbone Teacher Foundation of Henan's University(Grant No.2016GGJS-117)Supported by the National Natural Science Foundation of China(Grant No.11871258)。
文摘The purpose of this paper is to give the extensions of some identities involving generalized Fibonacci and Lucas numbers with binomial coefficients.These results generalize the identities by Gulec,Taskara and Uslu in Appl.Math.Lett.23(2010)68-72 and Appl.Math.Comput.220(2013)482-486.