期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
SOME EQUAL DIVISIONS ON ORDERED TREE SET
1
作者 王振宇 《Acta Mathematica Scientia》 SCIE CSCD 1992年第4期392-399,共8页
We say a divisien (S = SA or SB, g) is equal if it divides set S into two subsets SA and SB satisfying f (SA) = f (SB), where f is som attribute function on these sets and SA or SB need not be empty. In the present pa... We say a divisien (S = SA or SB, g) is equal if it divides set S into two subsets SA and SB satisfying f (SA) = f (SB), where f is som attribute function on these sets and SA or SB need not be empty. In the present paper, we have obtained some equal divisions on set of ordered tree with n modes: two equal divisions on tree set; two equal divisions on node set; two divisions on leaf set, one is equal, another one is ''asymptotically'' equal. We conclude that, ordered tree set is on its good behavior in equal dividing. 展开更多
关键词 NODE SOME equal DIVISIONS ON ORDERED TREE SET TREE 日主 IT
下载PDF
Comparing two sets without disclosing them 被引量:3
2
作者 LI ShunDong DAI YiQi +1 位作者 WANG DaoShun LUO Ping 《Science in China(Series F)》 2008年第9期1231-1238,共8页
Secure multiparty computation has become a central research focus in the international cryptographic community. Secure comparing two sets is an important problem in secure multiparty computation. The research on priva... Secure multiparty computation has become a central research focus in the international cryptographic community. Secure comparing two sets is an important problem in secure multiparty computation. The research on privately determining whether two sets are equal has not been investigated. This study solves the problem by mapping these sets into natural numbers and then comparing correspond- ing numbers, We propose two secure multiparty computation protocols for comparing two sets. It is proved by well-accepted simulation paradigm that these solutions are private in semi-honest model. These solutions have important significance in constructing other secure multiparty computation protocols. 展开更多
关键词 CRYPTOGRAPHY secure multiparty computation set equality problem solution SECURITY
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部