期刊文献+
共找到8,269篇文章
< 1 2 250 >
每页显示 20 50 100
Evolutionary dynamics of tax-based strong altruistic reward andpunishment in a public goods game
1
作者 Zhi-Hao Yang Yan-Long Yang 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第9期247-257,共11页
In public goods games, punishments and rewards have been shown to be effective mechanisms for maintaining individualcooperation. However, punishments and rewards are costly to incentivize cooperation. Therefore, the g... In public goods games, punishments and rewards have been shown to be effective mechanisms for maintaining individualcooperation. However, punishments and rewards are costly to incentivize cooperation. Therefore, the generation ofcostly penalties and rewards has been a complex problem in promoting the development of cooperation. In real society,specialized institutions exist to punish evil people or reward good people by collecting taxes. We propose a strong altruisticpunishment or reward strategy in the public goods game through this phenomenon. Through theoretical analysis and numericalcalculation, we can get that tax-based strong altruistic punishment (reward) has more evolutionary advantages thantraditional strong altruistic punishment (reward) in maintaining cooperation and tax-based strong altruistic reward leads toa higher level of cooperation than tax-based strong altruistic punishment. 展开更多
关键词 evolutionary game theory strong altruism punishment REWARD
下载PDF
Evolutionary analysis of green credit and automobile enterprises under the mechanism of dynamic reward and punishment based on government regulation
2
作者 Yu Dong Xiaoyu Huang +1 位作者 Hongan Gan Xuyang Liu 《中国科学技术大学学报》 CAS CSCD 北大核心 2024年第5期49-62,I0007,共15页
To explore the green development of automobile enterprises and promote the achievement of the“dual carbon”target,based on the bounded rationality assumptions,this study constructed a tripartite evolutionary game mod... To explore the green development of automobile enterprises and promote the achievement of the“dual carbon”target,based on the bounded rationality assumptions,this study constructed a tripartite evolutionary game model of gov-ernment,commercial banks,and automobile enterprises;introduced a dynamic reward and punishment mechanism;and analyzed the development process of the three parties’strategic behavior under the static and dynamic reward and punish-ment mechanism.Vensim PLE was used for numerical simulation analysis.Our results indicate that the system could not reach a stable state under the static reward and punishment mechanism.A dynamic reward and punishment mechanism can effectively improve the system stability and better fit real situations.Under the dynamic reward and punishment mechan-ism,an increase in the initial probabilities of the three parties can promote the system stability,and the government can im-plement effective supervision by adjusting the upper limit of the reward and punishment intensity.Finally,the implementa-tion of green credit by commercial banks plays a significant role in promoting the green development of automobile enter-prises. 展开更多
关键词 automobile enterprises green credit system dynamics reward and punishment mechanism
下载PDF
Combined Optimal Dispatch of Thermal Power Generators and Energy Storage Considering Thermal Power Deep Peak Clipping and Wind Energy Emission Grading Punishment
3
作者 Junhui Li Xuanzhong Luo +2 位作者 Changxing Ge Cuiping Li Changrong Wang 《Energy Engineering》 EI 2024年第4期869-893,共25页
Peak load and wind energy emission pressure rise more as wind energy penetration keeps growing,which affects the stabilization of the PS(power system).This paper suggests integrated optimal dispatching of thermal powe... Peak load and wind energy emission pressure rise more as wind energy penetration keeps growing,which affects the stabilization of the PS(power system).This paper suggests integrated optimal dispatching of thermal power generators and BESS(battery energy storage system)taking wind energy emission grading punishment and deep peak clipping into consideration.Firstly,in order to minimize wind abandonment,a hierarchical wind abandonment penalty strategy based on fuzzy control is designed and introduced,and the optimal grid-connected power of wind energy is determined as a result of minimizing the peak cutting cost of the system.Secondly,considering BESS and thermal power,the management approach of BESS-assisted virtual peak clipping of thermal power generators is aimed at reducing the degree of deep peak clipping of thermal power generators and optimizing the output of thermal power generators and the charging and discharging power of BESS.Finally,Give an example of how this strategy has been effective in reducing abandonment rates by 0.66% and 7.46% individually for different wind penetration programs,and the daily average can reduce the peak clipping power output of thermal power generators by 42.97 and 72.31 MWh and enhances the effect and economy of system peak clipping. 展开更多
关键词 BESS wind energy deep peak clipping virtual peak clipping wind energy emission grading punishment
下载PDF
Some Remarks on Cocks'Identity-Based Encryption Scheme
4
作者 ZHAO Xiaopeng 《Journal of Donghua University(English Edition)》 CAS 2024年第4期447-450,共4页
The theory of quadratic residues plays an important role in cryptography.In 2001,Cocks developed an identity-based encryption(IBE)scheme based on quadratic residues,resolving Shamir’s 17-year-old open problem.However... The theory of quadratic residues plays an important role in cryptography.In 2001,Cocks developed an identity-based encryption(IBE)scheme based on quadratic residues,resolving Shamir’s 17-year-old open problem.However,a notable drawback of Cocks’scheme is the significant expansion of the ciphertext,and some of its limitations have been addressed in subsequent research.Recently,Cotan and Teşeleanu highlighted that previous studies on Cocks’scheme relied on a trial-and-error method based on Jacobi symbols to generate the necessary parameters for the encryption process.They enhanced the encryption speed of Cocks’scheme by eliminating this trialand-error method.Based on security analysis,this study concludes that the security of Cotan-Teşeleanu’s proposal cannot be directly derived from the security of the original Cocks’scheme.Furthermore,by adopting the Cotan-Teşeleanu method and introducing an additional variable as a public element,this study develops a similar enhancement scheme that not only accelerates the encryption speed but also provides security equivalent to the original Cocks’scheme. 展开更多
关键词 identity-based encryption(IBE) quadratic residue SECURITY Cocks’IBE scheme
下载PDF
Construction and Implementation of a Privacy-Preserving Identity-Based Encryption Architecture
5
作者 David Bissessar Carlisle Adams 《Journal of Information Security》 2023年第4期304-329,共26页
A recent proposal by Adams integrates the digital credentials (DC) technology of Brands with the identity-based encryption (IBE) technology of Boneh and Franklin to create an IBE scheme that demonstrably enhances priv... A recent proposal by Adams integrates the digital credentials (DC) technology of Brands with the identity-based encryption (IBE) technology of Boneh and Franklin to create an IBE scheme that demonstrably enhances privacy for users. We refer to this scheme as a privacy-preserving identity-based encryption (PP-IBE) construction. In this paper, we discuss the concrete implementation considerations for PP-IBE and provide a detailed instantiation (based on q-torsion groups in supersingular elliptic curves) that may be useful both for proof-of-concept purposes and for pedagogical purposes. 展开更多
关键词 identity-based Encryption (IBE) Digital Credentials (DC) PRIVACY Pairing-Based Cryptography Supersingular Elliptic Curve q-Torsion Group
下载PDF
Power,punishment,patriarchy in Shakespeare’s Othello
6
作者 王湘锦 《海外英语》 2012年第20期209-210,共2页
An informal survey revealed that graduate students presented with Shakespeare's works felt academically unfit and powerless.These student-teacher-text power relationships parallel the power relationships between t... An informal survey revealed that graduate students presented with Shakespeare's works felt academically unfit and powerless.These student-teacher-text power relationships parallel the power relationships between the dominant patriarchy and female characters in'Othello'-Desdemona,Emilia,and Bianca.Both main characters contribute to the creation of the new or der.The writer wants to look briefly at a Shakespearean couple outside Othello as an attempt at alternative model for distributing power. 展开更多
关键词 OTHELLO POWER punishment PATRIARCHY
下载PDF
An Unusual Punishment
7
作者 姜红伟 《疯狂英语(初中天地)》 2002年第38期12-12,共1页
One day Jack broke his mother's glass. When shesaw the broken glass, she cried, "Jack, your father isgoing to punish(惩罚)you." "I'm too upset(沮丧)to punish you now." said Jack'sfather... One day Jack broke his mother's glass. When shesaw the broken glass, she cried, "Jack, your father isgoing to punish(惩罚)you." "I'm too upset(沮丧)to punish you now." said Jack'sfather."I'll do it after supper." 展开更多
关键词 An Unusual punishment
下载PDF
Maintenance of cooperation induced by punishment in public goods games 被引量:3
8
作者 Wang Zhen Xu Zhao-Jin +1 位作者 Huang Jian-Hua Zhang Lian-Zhong 《Chinese Physics B》 SCIE EI CAS CSCD 2010年第10期20-24,共5页
In this paper, we study the public goods games with punishment by adopting the well-known approximate best response dynamics. It shows that the evolution of cooperation is affected by two aspects when other parameters... In this paper, we study the public goods games with punishment by adopting the well-known approximate best response dynamics. It shows that the evolution of cooperation is affected by two aspects when other parameters are fixed. One is the punishment mechanism which can avoid the dilemma of lacking investment, and the other is the degree of rationality. Theoretical analysis and numerical results indicate that the existence of punishment mechanism and distribution of rationality are the keys to the enhancement of cooperation level. We also testify that they can heavily influence the payoffs of system as well. The findings in this paper may provide a deeper understanding of some social dilemmas. 展开更多
关键词 public goods games punishment degree of rationality EVOLUTION
下载PDF
IDENTITY-BASED MULTISIGNATURE AND AGGREGATE SIGNATURE SCHEMES FROM M-TORSION GROUPS 被引量:11
9
作者 Cheng Xiangguo Liu Jingmei +1 位作者 Guo Lifeng Wang Xinmei 《Journal of Electronics(China)》 2006年第4期569-573,共5页
An identity-based multisignature scheme and an identity-based aggregate signature scheme are proposed in this paper. They are both from m-torsion groups on super-singular elliptic curves or hyper-elliptic curves and b... An identity-based multisignature scheme and an identity-based aggregate signature scheme are proposed in this paper. They are both from m-torsion groups on super-singular elliptic curves or hyper-elliptic curves and based on the recently proposed identity-based signature scheme of Cha and Cheon. Due to the sound properties of m-torsion groups and the base scheme, it turns out that our schemes are very simple and efficient. Both schemes are proven to be secure against adaptive chosen message attack in the random oracle model under the normal security notions with the assumption that the Computational Diffie-Hellman problem is hard in the m-torsion groups. 展开更多
关键词 identity-based multisignature identity-based aggregate signature Weil pairing Gap Diffie-Hellman group m-torsion group
下载PDF
Stochastic evolutionary public goods game with first and second order costly punishments in finite populations 被引量:2
10
作者 Ji Quan Yu-Qing Chu +2 位作者 Wei Liu Xian-Jia Wang Xiu-Kang Yang 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第6期119-126,共8页
We study the stochastic evolutionary public goods game with punishment in a finite size population. Two kinds of costly punishments are considered, i.e., first-order punishment in which only the defectors are punished... We study the stochastic evolutionary public goods game with punishment in a finite size population. Two kinds of costly punishments are considered, i.e., first-order punishment in which only the defectors are punished, and second-order punishment in which both the defectors and the cooperators who do not punish the defective behaviors are punished. We focus on the stochastic stable equilibrium of the system. In the population, the evolutionary process of strategies is described as a finite state Markov process. The evolutionary equilibrium of the system and its stochastic stability are analyzed by the limit distribution of the Markov process. By numerical experiments, our findings are as follows.(i) The first-order costly punishment can change the evolutionary dynamics and equilibrium of the public goods game, and it can promote cooperation only when both the intensity of punishment and the return on investment parameters are large enough.(ii)Under the first-order punishment, the further imposition of the second-order punishment cannot change the evolutionary dynamics of the system dramatically, but can only change the probability of the system to select the equilibrium points in the "C+P" states, which refer to the co-existence states of cooperation and punishment. The second-order punishment has limited roles in promoting cooperation, except for some critical combinations of parameters.(iii) When the system chooses"C+P" states with probability one, the increase of the punishment probability under second-order punishment will further increase the proportion of the "P" strategy in the "C+P" states. 展开更多
关键词 public goods games stochastic stable equilibrium punishment finite population
下载PDF
A Provably Secure Identity-based Authentication Multiple Key Agreement Protocol 被引量:2
11
作者 谭作文 《China Communications》 SCIE CSCD 2011年第2期26-33,共8页
An authentication multiple key agreement protocol allows the users to compute more than one session keys in an authentication way. In the paper,an identity-based authentication multiple key agreement protocol is propo... An authentication multiple key agreement protocol allows the users to compute more than one session keys in an authentication way. In the paper,an identity-based authentication multiple key agreement protocol is proposed. Its authentication part is proven secure against existential forgery on adaptively chosen message and ID attacks under the random oracle model upon the CDH assumptions. The session keys are proven secure in a formal CK security model under the random oracle model upon the CBDH assumptions. Compared with the previous multiple key agreement protocols,it requires less communication cost. 展开更多
关键词 AUTHENTICATION identity-based KEY AGREEMENT
下载PDF
IDENTITY-BASED KEY-INSULATED PROXY SIGNATURE 被引量:4
12
作者 Wan Zhongmei Lai Xuejia +2 位作者 Weng Jian Liu Shengli Hong Xuan 《Journal of Electronics(China)》 2009年第6期853-858,共6页
In proxy signature schemes,the proxy signer B is permitted to produce a signature on behalf of the original signer A. However,exposure of proxy signing keys can be the most devastating attack on a proxy signature sche... In proxy signature schemes,the proxy signer B is permitted to produce a signature on behalf of the original signer A. However,exposure of proxy signing keys can be the most devastating attack on a proxy signature scheme since any adversary can sign messages on behalf of the proxy signer. In this paper,we applied Dodis,et al.’s key-insulation mechanism and proposed an Identity-Based (ID-based) Key-Insulated Proxy Signature (IBKIPS) scheme with secure key-updates. The proposed scheme is strong key-insulated and perfectly key-insulated. Our scheme also supports unbounded period numbers and random-access key-updates. 展开更多
关键词 KEY-INSULATED Proxy signature identity-based signature Key-exposure Bilinear pairings
下载PDF
An Identity-Based Strong Designated Verifier Proxy Signature Scheme 被引量:3
13
作者 WANG Qin CAO Zhenfu 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1633-1635,共3页
In a strong designated verifier proxy signature scheme, a proxy signer can generate proxy signature on behalf of an original signer, but only the designated verifier can verify the validity of the proxy signature. In ... In a strong designated verifier proxy signature scheme, a proxy signer can generate proxy signature on behalf of an original signer, but only the designated verifier can verify the validity of the proxy signature. In this paper, we first define the security requirements for strong designated verifier proxy signature schemes. And then we construct an identity-based strong designated verifier proxy signature scheme. We argue that the proposed scheme satisfies all of the security requirements. 展开更多
关键词 strong designated verifier signature proxy signature identity-based cryptosystem bilinear pairing
下载PDF
Identity-based ring signature scheme based on quadratic residues 被引量:3
14
作者 熊虎 《High Technology Letters》 EI CAS 2009年第1期94-100,共7页
Identity-based (ID-based) ring signature has drawn great concerns in recent years and many ID-based ring signature schemes have been proposed until now. Unfortunately, all of these ID-based ring signatures are const... Identity-based (ID-based) ring signature has drawn great concerns in recent years and many ID-based ring signature schemes have been proposed until now. Unfortunately, all of these ID-based ring signatures are constructed from bilinear pairings, a powerful but computationally expensive primitive. Hence, ID-based ring signature without pairing is of great interest in the field of cryptography. In this paper, the authors firstly propose an ID-based ring signature scheme based on quadratic residues. The proposed scheme is proved to be existentially unforgeable against adaptive chosen message-and-identity attack under the random oracle model, assuming the hardness of factoring. The proposed scheme is more efficient than those which are constructed from bilinear pairings. 展开更多
关键词 identity-based signature ring signature quadratic residue random oracle provable security
下载PDF
Trusted Routing Based on Identity-Based Threshold Signature for Opportunistic Networks 被引量:1
15
作者 陈曦 田有亮 +1 位作者 李兴华 马建峰 《China Communications》 SCIE CSCD 2011年第4期132-140,共9页
In opportunistic Networks,compromised nodes can attack social context-based routing protocols by publishing false social attributes information.To solve this problem,we propose a security scheme based on the identity-... In opportunistic Networks,compromised nodes can attack social context-based routing protocols by publishing false social attributes information.To solve this problem,we propose a security scheme based on the identity-based threshold signature which allows mobile nodes to jointly generate and distribute the secrets for social attributes in a totally self-organized way without the need of any centralized authority.New joining nodes can reconstruct their own social attribute signatures by getting enough partial signature services from encounter opportunities with the initial nodes.Mobile nodes need to testify whether the neighbors can provide valid attribute signatures for their routing advertisements in order to resist potential routing attacks.Simulation results show that:by implementing our security scheme,the network delivery probability of the social context-based routing protocol can be effectively improved when there are large numbers of compromised nodes in opportunistic networks. 展开更多
关键词 opportunistic networks social context-based routing identity-based signature threshold cryptography
下载PDF
Sharing of Encrypted Lock Keys in the Blockchain-Based Renting House System from Time- and Identity-Based Proxy Reencryption 被引量:1
16
作者 Zhiwei Wang Liping Qian +1 位作者 Danwei Chen Guozi sun 《China Communications》 SCIE CSCD 2022年第5期164-177,共14页
To design an efficient protocol for sharing the encrypted lock keys in the renting house system,we introduce a new notion called time-and identitybased proxy reencryption(TIPRE)and the blockchain platform.Our CPA secu... To design an efficient protocol for sharing the encrypted lock keys in the renting house system,we introduce a new notion called time-and identitybased proxy reencryption(TIPRE)and the blockchain platform.Our CPA secure TIPRE scheme is constructed from Green et al.’s identity-based proxy reencryption scheme by adding the time property.In every time period,a time stamp authority generates a public key embedded with the current time stamp for each user.In our protocol for the renting house system,the TIPRE scheme is the primary building block,and the blockchain platform serves instead of a trusted third party,such as a real estate agency between landlords and tenants.The TIPRE scheme allows the landlord to change the lock key at each time period for safety.The blockchain platform allows the landlords and tenants to directly interact,and all of the interactions are recorded in the blockchain database to provide the desired security requirements,such as nonrepudiation and unforgeability.Finally,we provide the secure analysis of our protocol and test its performance by implementing it in the MacBook Pro and the Intel Edison development platforms. 展开更多
关键词 identity-based proxy reencryption time stamp renting houses system blockchain
下载PDF
Key-Private Identity-Based Proxy Re-Encryption 被引量:1
17
作者 Chunpeng Ge Jinyue Xia Liming Fang 《Computers, Materials & Continua》 SCIE EI 2020年第5期633-647,共15页
An identity-based proxy re-encryption scheme(IB-PRE)allows a semi-trusted proxy to convert an encryption under one identity to another without revealing the underlying message.Due to the fact that the proxy was semi-t... An identity-based proxy re-encryption scheme(IB-PRE)allows a semi-trusted proxy to convert an encryption under one identity to another without revealing the underlying message.Due to the fact that the proxy was semi-trusted,it should place as little trust as necessary to allow it to perform the translations.In some applications such as distributed file system,it demands the adversary cannot identify the sender and recipient’s identities.However,none of the exiting IB-PRE schemes satisfy this requirement.In this work,we first define the security model of key-private IB-PRE.Finally,we propose the first key-private IB-PRE scheme.Our scheme is chosen plaintext secure(CPA)and collusion resistant in the standard model. 展开更多
关键词 Proxy re-encryption identity-based proxy re-encryption key-private collusion resistant
下载PDF
Non-interactive identity-based threshold signature scheme without random oracles 被引量:1
18
作者 Xun SUN Jian-hua LI +1 位作者 Shu-tang YANG Gong-liang CHEN 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第6期727-736,共10页
A (t, n) threshold signature scheme distributes the secret key and hence the signing ability to n players in a way that any set of t+1 or more honest players can collaborate to sign, while any set of t players cannot.... A (t, n) threshold signature scheme distributes the secret key and hence the signing ability to n players in a way that any set of t+1 or more honest players can collaborate to sign, while any set of t players cannot. In this paper we propose an iden- tity-based threshold signature (IBTHS) scheme from bilinear pairings. The signing phase of our scheme is non-interactive, meaning that the signing players do not need to talk to each other. We prove our scheme secure (i.e., unforgeable and robust) in the standard model (i.e., without random oracles). No earlier proposed IBTHS scheme achieved even one of the features of being non-interactive (in the signing phase) and secure in the standard model. 展开更多
关键词 Bilinear pairings identity-based threshold signature (IBTHS) Standard model
下载PDF
Fully Secure Identity-based Broadcast Encryption in the Subgroups 被引量:1
19
作者 张乐友 胡予濮 吴青 《China Communications》 SCIE CSCD 2011年第2期152-158,共7页
In this paper,we show how to use the dual techniques in the subgroups to give a secure identity-based broadcast encryption(IBBE) scheme with constant-size ciphertexts. Our scheme achieves the full security(adaptive se... In this paper,we show how to use the dual techniques in the subgroups to give a secure identity-based broadcast encryption(IBBE) scheme with constant-size ciphertexts. Our scheme achieves the full security(adaptive security) under three static(i.e. non q-based) assumptions. It is worth noting that only recently Waters gives a short ciphertext broadcast encryption system that is even adaptively secure under the simple assumptions. One feature of our methodology is that it is relatively simple to leverage our techniques to get adaptive security. 展开更多
关键词 identity-based broadcast encryption dual system encryption full security static assumption SUBGROUP provable security
下载PDF
Mathematical Neurolaw of Crime and Punishment: The <i>q</i>-Exponential Punishment Function
20
作者 Taku Yokoyama Taiki Takahashi 《Applied Mathematics》 2013年第10期1371-1375,共5页
Whether people tend to punish criminals in a socially-optimal manner (i.e., hyperbolic punishment) or not is unknown. By adopting mathematical models of probabilistic punishment behavior (i.e., exponential, hyperbolic... Whether people tend to punish criminals in a socially-optimal manner (i.e., hyperbolic punishment) or not is unknown. By adopting mathematical models of probabilistic punishment behavior (i.e., exponential, hyperbolic, and q-exponential probability discounting model based on Tsallis thermodynamics and neuroeconomics, Takahashi, 2007, Physica A;Takahashi et al., 2012, Applied Mathematics), we examined 1) fitness of the models to behavioral data of uncertain punishment, and 2) deviation from the socially optimal hyperbolic punishment function. Our results demonstrated that, the q-exponential punishment function best fits the behavioral data, and people overweigh the severity of punishment at small punishing probabilities and underweigh the severity of punishment at large punishing probabilities. In other words, people tend to punish crimes too severely and mildly with high and low arrest rate (e.g., homicide vs. excess of speed limit), respectively. Implications for neuroeconomics and neurolaw of crime and punishment (Takahashi, 2012, NeuroEndocrinology Letters) are discussed. 展开更多
关键词 Neurolaw NEUROECONOMICS ECONOPHYSICS Tsallis’ Statistics Hyperbolic punishment Function
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部