This paper is on fuzzy decision theory and information security theory which are mutually independent and engrafted. This paper presents both-branch fuzzy decision and problems on decision encryption-authentication, p...This paper is on fuzzy decision theory and information security theory which are mutually independent and engrafted. This paper presents both-branch fuzzy decision and problems on decision encryption-authentication, puts forward two kinds of both-branch fuzzy decision on X: both-branch fuzzy decision on X having bounded domains X = X+∩X- ={x0}, both-branch fuzzy decision on X havingoverlapping domains X* = X+∩X- = {x_1~*,x_2~*,…,x_1~*}. It presents single branch separate-separate out theoremof both-branch fuzzy decision on X, single branch superposition theorem of both-branch fuzzy decision, exclusive-decompose principle of both-branch fuzzy decision. This paper presents encryption-authentication theorem of decision by engrafting information security theory and technique with both-branch fuzzy decision, and provides encryption-decryption and signature-authentication of both-branch fuzzy decision.展开更多
基金This work was supported by the National Natural Science Foundation of China (Grant No. 70271048) the Natural Science Foundation of Shandong Province (Y2001G07).
文摘This paper is on fuzzy decision theory and information security theory which are mutually independent and engrafted. This paper presents both-branch fuzzy decision and problems on decision encryption-authentication, puts forward two kinds of both-branch fuzzy decision on X: both-branch fuzzy decision on X having bounded domains X = X+∩X- ={x0}, both-branch fuzzy decision on X havingoverlapping domains X* = X+∩X- = {x_1~*,x_2~*,…,x_1~*}. It presents single branch separate-separate out theoremof both-branch fuzzy decision on X, single branch superposition theorem of both-branch fuzzy decision, exclusive-decompose principle of both-branch fuzzy decision. This paper presents encryption-authentication theorem of decision by engrafting information security theory and technique with both-branch fuzzy decision, and provides encryption-decryption and signature-authentication of both-branch fuzzy decision.