您的位置: 专家智库 > >

国家自然科学基金(61100203)

作品数:7 被引量:28H指数:4
相关作者:杜蛟庞善起王守印温巧燕更多>>
相关机构:河南师范大学新乡学院北京邮电大学更多>>
发文基金:国家自然科学基金北京市自然科学基金国家教育部博士点基金更多>>
相关领域:理学电子电信自动化与计算机技术机械工程更多>>

文献类型

  • 7篇期刊文章
  • 4篇会议论文

领域

  • 6篇自动化与计算...
  • 5篇电子电信
  • 5篇理学
  • 1篇机械工程

主题

  • 2篇SCHEME
  • 2篇WSN
  • 2篇ALGORI...
  • 1篇递归构造
  • 1篇旋转噪声
  • 1篇噪声
  • 1篇正交
  • 1篇正交表
  • 1篇相干噪声
  • 1篇量子
  • 1篇量子比特
  • 1篇古典
  • 1篇PERIOD
  • 1篇PRESER...
  • 1篇PROBLE...
  • 1篇PROXY
  • 1篇PSEUDO
  • 1篇QUANTU...
  • 1篇QUANTU...
  • 1篇SEQUEN...

机构

  • 1篇北京邮电大学
  • 1篇新乡学院
  • 1篇河南师范大学

作者

  • 1篇温巧燕
  • 1篇王守印
  • 1篇庞善起
  • 1篇杜蛟

传媒

  • 2篇Scienc...
  • 1篇应用数学学报
  • 1篇The Jo...
  • 1篇Chines...
  • 1篇Wuhan ...
  • 1篇Fronti...

年份

  • 1篇2016
  • 4篇2014
  • 3篇2013
  • 3篇2012
7 条 记 录,以下是 1-10
排序方式:
An Algorithm for the Spectral Immunity of Binary Sequence with Period 2^n
2016年
To resist the fast algebraic attack and fast selective discrete Fourier transform attacks,spectral immunity of a sequence or a Boolean function was proposed.At the same time,an algorithm to compute the spectral immunity of the binary sequence with odd period N was presented,here N is a factor of 2^n-1,where n is an integer.The case is more complicated when the period is even.In this paper,we compute linear complexity of every orthogonal sequence of a given sequence using Chan-Games algorithm and k-error linear complexity algorithm.Then,an algorithm for spectral immunity of binary sequence with period N=2^n is obtained.Furthermore,the time complexity of this algorithm is proved to be O(n).
LIU Zhenhua
关键词:SEQUENCE
Robust and efficient quantum private comparison of equality with collective detection over collective-noise channels被引量:6
2013年
We present a protocol for quantum private comparison of equality(QPCE) with the help of a semi-honest third party(TP).Instead of employing the entanglement,we use single photons to achieve the comparison in this protocol.By utilizing collective eavesdropping detection strategy,our protocol has the advantage of higher qubit efficiency and lower cost of implementation.In addition to this protocol,we further introduce three robust versions which can be immune to collective dephasing noise,collective-rotation noise and all types of unitary collective noise,respectively.Finally,we show that our protocols can be secure against the attacks from both the outside eavesdroppers and the inside participants by using the theorems on quantum operation discrimination.
HUANG WeiWEN QiaoYanLIU BinGAO FeiSUN Ying
关键词:量子比特相干噪声旋转噪声
Suffix Tree Constructing Algorithm for Datasets with Discrete Contents
The suffix tree is a useful data structure constructed for indexing strings.However,when it comes to large dat...
Zhenzhong JinZheng HuangHua Zhang
文献传递
强度m的对称正交表的递归构造被引量:3
2012年
本文证明了Q^n空间的正交分划的存在性,对2水平正交表的递归构造方法进行了改进,通过对正交分划的构造提出了任意强度的高水平对称正交表的递归构造方法.
杜蛟王守印温巧燕庞善起
关键词:正交表递归构造存在性
Fault tolerant quantum secure direct communication with quantum encryption against collective noise被引量:9
2012年
We present two novel quantum secure direct communication(QSDC) protocols over different collective-noise channels.Different from the previous QSDC schemes over collective-noise channels,which are all source-encrypting protocols,our two protocols are based on channel-encryption.In both schemes,two authorized users first share a sequence of EPR pairs as their reusable quantum key.Then they use their quantum key to encrypt and decrypt the secret message carried by the decoherence-free states over the collective-noise channel.In theory,the intrinsic efficiencies of both protocols are high since there is no need to consume any entangled states including both the quantum key and the information carriers except the ones used for eavesdropping checks.For checking eavesdropping,the two parties only need to perform two-particle measurements on the decoy states during each round.Finally,we make a security analysis of our two protocols and demonstrate that they are secure.
黄伟温巧燕贾恒越秦素娟高飞
PASSIVE RFID-SUPPORTED SOURCE LOCATION PRIVACY PRESERVATION AGAINST GLOBAL EAVESDROPPERS IN WSN
Source location privacy is one of the most challenging issues in WSN applications. Some of existing solutions ...
Wuchen XIAOHua ZHANGQiaoyan WENWenmin LI
A LIGHTWEIGHT SOURCE LOCATION PRIVACY PRESERVING SCHEME FOR WIRELESS SENSOR NETWORKS
While many protocols for sensor network security provide confidentiality for message content, contextual infor...
Liming ZHOUQiaoyan WENHua ZHANGLin CHENG
关键词:WSN
Improved certificateless multi-proxy signature被引量:4
2012年
Multi-proxy signature is a scheme that an original signer delegates his or her signing capability to a proxy group. In the scheme, only the cooperation of all proxy signers in the proxy group can create a signature on behalf of the original signer. Jin and Wen firstly defined the formal security model of certificateless multi-proxy signature (CLMPS) and proposed a concrete CLMPS scheme. However, their construction model is inaccurate, the concrete signature scheme has has three problems: the definition of the strengthened security a security flaw, and the proof of the security is imperfect. With further consideration, a remedial strengthened security model is redefined, and an improved scheme is also proposed, which is existentially unforgeable against adaptively chosen-warrant, chosen-message and chosen-identity attacks in the random oracles. In this condition, the computational Diffie-Hellman (CDH) assumption is used to prove full security for our CLMPS scheme.
XU JieSUN Hong-xiangWEN Qiao-yanZHANG Hua
关键词:CERTIFICATELESS
A New Solution of Data Security Accessing for Hadoop Based on CP-ABE
In cloud computing platform Hadoop,because user data stored in the cloud is not a controllable domain,so how t...
Huixiang ZhouQiaoyan Wen
关键词:HADOOPHDFS
A lattice-based signcryption scheme without random oracles被引量:5
2014年
In order to achieve secure signcryption schemes in the quantum era, Li Fagen et al. [Concurrency and Computation: Practice and Experience, 2012, 25(4): 2112-2122] and Wang Fenghe et al. [Applied Mathematics & Information Sciences, 2012, 6(1): 23-28] have independently extended the concept of signcryption to lattice-based cryptography. However, their schemes are only secure under the random or- acle model. In this paper, we present a lattice-based signcryp- tion scheme which is secure under the standard model. We prove that our scheme achieves indistinguishability against adaptive chosen-ciphertext attacks (IND-CCA2) under the learning with errors (LWE) assumption and existential unforgeability against adaptive chosen-message attacks (EUF- CMA) under the small integer solution (SIS) assumption.
Xiuhua LUQiaoyan WENZhengping JINLicheng WANGChunli YANG
关键词:SIGNCRYPTION
共2页<12>
聚类工具0