Threshold blind signature is playing an important role in cryptography as well as in practical applications such as e-cash and e-voting systems, etc. In this paper, we present an efficient and practical threshold bind...Threshold blind signature is playing an important role in cryptography as well as in practical applications such as e-cash and e-voting systems, etc. In this paper, we present an efficient and practical threshold bind signature from Weil pairing on super-singular elliptic curves or hyper-elliptic curves over finite field and prove that our scheme is provably secure in the random oracle model.展开更多
The wave equation for two electrons in an external Coulomb field (helium-like atoms) has been shown to be a problem in a three-dimensional half-space. The wave-equation becomes quasi-separable in inertial coordinates....The wave equation for two electrons in an external Coulomb field (helium-like atoms) has been shown to be a problem in a three-dimensional half-space. The wave-equation becomes quasi-separable in inertial coordinates. This allows to work out the electron motion in the frame of principal inertia axes. We find that non-adiabatic coupling terms constitute a fictitious force and lead to a deformation of the static potential surface. Incoming and outgoing modes of electron pairs are studied in detail, and applied to the threshold ionization of hydrogen-like atoms by electrons. Our analysis confirms the classical work by Wannier. However, we go beyond Wannier and present bending and stretch vibrations of electron pairs. The bending vibration has no influence onto the total ionization cross-section. The pair formation below threshold destroys the existence of high double Rydberg resonances. Finally, we describe the propagation of an electron pair through a linear chain of Rydberg atoms.展开更多
In 2006, Bao et al proposed an identlty-based threshold proxy signature scheme with known signers. In this paper, we show that Bao et al's scheme is vulnerable to the forgery attack. An adversary can forge a valid th...In 2006, Bao et al proposed an identlty-based threshold proxy signature scheme with known signers. In this paper, we show that Bao et al's scheme is vulnerable to the forgery attack. An adversary can forge a valid threshold proxy signature for any message with knowing a previously valid threshold proxy signature. In addition, their scheme also suffers from the weakness that the proxy signers might change the threshold value. That is, the proxy signers can arbitrarily modify the threshold strategy without being detected by the original signer or verifiers, which might violate the original signer's intent. Furthermore, we propose an improved scheme that remedies the weaknesses of Bao et al's scheme. The improved scheme satisfies all secure requirements for threshold proxy signature.展开更多
文摘Threshold blind signature is playing an important role in cryptography as well as in practical applications such as e-cash and e-voting systems, etc. In this paper, we present an efficient and practical threshold bind signature from Weil pairing on super-singular elliptic curves or hyper-elliptic curves over finite field and prove that our scheme is provably secure in the random oracle model.
文摘The wave equation for two electrons in an external Coulomb field (helium-like atoms) has been shown to be a problem in a three-dimensional half-space. The wave-equation becomes quasi-separable in inertial coordinates. This allows to work out the electron motion in the frame of principal inertia axes. We find that non-adiabatic coupling terms constitute a fictitious force and lead to a deformation of the static potential surface. Incoming and outgoing modes of electron pairs are studied in detail, and applied to the threshold ionization of hydrogen-like atoms by electrons. Our analysis confirms the classical work by Wannier. However, we go beyond Wannier and present bending and stretch vibrations of electron pairs. The bending vibration has no influence onto the total ionization cross-section. The pair formation below threshold destroys the existence of high double Rydberg resonances. Finally, we describe the propagation of an electron pair through a linear chain of Rydberg atoms.
基金Supported by the National Natural Science Foun-dation of China (60473029)
文摘In 2006, Bao et al proposed an identlty-based threshold proxy signature scheme with known signers. In this paper, we show that Bao et al's scheme is vulnerable to the forgery attack. An adversary can forge a valid threshold proxy signature for any message with knowing a previously valid threshold proxy signature. In addition, their scheme also suffers from the weakness that the proxy signers might change the threshold value. That is, the proxy signers can arbitrarily modify the threshold strategy without being detected by the original signer or verifiers, which might violate the original signer's intent. Furthermore, we propose an improved scheme that remedies the weaknesses of Bao et al's scheme. The improved scheme satisfies all secure requirements for threshold proxy signature.