您的位置: 专家智库 > >

国家自然科学基金(61170270)

作品数:16 被引量:76H指数:5
相关作者:温巧燕黄梅娟杜红珍杜蛟庞善起更多>>
相关机构:北京邮电大学宝鸡文理学院河南师范大学更多>>
发文基金:国家自然科学基金北京市自然科学基金国家教育部博士点基金更多>>
相关领域:电子电信理学自动化与计算机技术机械工程更多>>

文献类型

  • 15篇期刊文章
  • 3篇会议论文

领域

  • 11篇电子电信
  • 10篇理学
  • 5篇自动化与计算...
  • 2篇机械工程

主题

  • 3篇QUANTU...
  • 2篇QUANTU...
  • 2篇SCHEME
  • 2篇SEQUEN...
  • 2篇WSN
  • 2篇CHANNE...
  • 2篇CONSTR...
  • 2篇LINEAR...
  • 2篇COLLEC...
  • 1篇递归构造
  • 1篇正交
  • 1篇正交表
  • 1篇双线性
  • 1篇双线性对
  • 1篇签名
  • 1篇无证书
  • 1篇无证书公钥密...
  • 1篇密码
  • 1篇密码体制
  • 1篇聚合签名

机构

  • 2篇北京邮电大学
  • 1篇宝鸡文理学院
  • 1篇新乡学院
  • 1篇河南师范大学

作者

  • 2篇温巧燕
  • 1篇杜红珍
  • 1篇黄梅娟
  • 1篇王守印
  • 1篇庞善起
  • 1篇杜蛟

传媒

  • 4篇Chines...
  • 3篇Scienc...
  • 2篇The Jo...
  • 2篇Wuhan ...
  • 1篇电子学报
  • 1篇应用数学学报
  • 1篇Acta M...
  • 1篇Fronti...

年份

  • 2篇2016
  • 4篇2015
  • 3篇2014
  • 6篇2013
  • 3篇2012
16 条 记 录,以下是 1-10
排序方式:
An Algorithm for the Spectral Immunity of Binary Sequence with Period 2^n
2016年
To resist the fast algebraic attack and fast selective discrete Fourier transform attacks,spectral immunity of a sequence or a Boolean function was proposed.At the same time,an algorithm to compute the spectral immunity of the binary sequence with odd period N was presented,here N is a factor of 2^n-1,where n is an integer.The case is more complicated when the period is even.In this paper,we compute linear complexity of every orthogonal sequence of a given sequence using Chan-Games algorithm and k-error linear complexity algorithm.Then,an algorithm for spectral immunity of binary sequence with period N=2^n is obtained.Furthermore,the time complexity of this algorithm is proved to be O(n).
LIU Zhenhua
关键词:SEQUENCE
Some Algorithms for the Error Linear Complexity of Binary 2^n-Periodic Sequences
2013年
Based on the Games-Chan algorithm and StampMartin algorithm, this paper provides some new algorithms to compute the error linear complexity spectrum of binary 2n-periodic se- quences. These new algorithms are clearer and simpler than old algorithms, and they can quickly compute the error linear com- plexity spectrum of sequences according to different situations. We also discuss such algorithms and give some new results about linear complexity and error linear complexity of sequences.
CHANG ZulingWANG XueyuanDUAN Li
关键词:SEQUENCE
On the construction of odd-variable boolean functions with optimal algebraic immunity
2013年
Algebraic immunity is an important cryptographic property of Boolean functions. In this paper, odd-variable balanced Boolean functions with optimal algebraic immunity are obtained by m-sequence and consequently, we get bases with special constructions of vector space. Furthermore, through swapping some vectors of these two bases, we establish all kinds of odd-variable balanced Boolean functions with optimal algebraic immunity.
ZHANG JieWEN Qiao-yan
关键词:ANNIHILATORS
Construction of a Class of Quantum Boolean Functions Based on the Hadamard Matrix
2015年
In this study, a new methodology based on the Hadamard matrix is proposed to construct quantum Boolean functions f such that f : I2n --2P2n, where I2n is an identity matrix of order 2n and P2n is a projective matrix with the same order as I2n. The enumeration of this class of quantum Boolean functions is also presented.
Jiao DUShan-qi PANGQiao-yan WENJie ZHANG
A LIGHTWEIGHT SOURCE LOCATION PRIVACY PRESERVING SCHEME FOR WIRELESS SENSOR NETWORKS
While many protocols for sensor network security provide confidentiality for message content, contextual infor...
Liming ZHOUQiaoyan WENHua ZHANGLin CHENG
关键词:WSN
Improved certificateless multi-proxy signature被引量:4
2012年
Multi-proxy signature is a scheme that an original signer delegates his or her signing capability to a proxy group. In the scheme, only the cooperation of all proxy signers in the proxy group can create a signature on behalf of the original signer. Jin and Wen firstly defined the formal security model of certificateless multi-proxy signature (CLMPS) and proposed a concrete CLMPS scheme. However, their construction model is inaccurate, the concrete signature scheme has has three problems: the definition of the strengthened security a security flaw, and the proof of the security is imperfect. With further consideration, a remedial strengthened security model is redefined, and an improved scheme is also proposed, which is existentially unforgeable against adaptively chosen-warrant, chosen-message and chosen-identity attacks in the random oracles. In this condition, the computational Diffie-Hellman (CDH) assumption is used to prove full security for our CLMPS scheme.
XU JieSUN Hong-xiangWEN Qiao-yanZHANG Hua
关键词:CERTIFICATELESS
A New Solution of Data Security Accessing for Hadoop Based on CP-ABE
In cloud computing platform Hadoop,because user data stored in the cloud is not a controllable domain,so how t...
Huixiang ZhouQiaoyan Wen
关键词:HADOOPHDFS
A lattice-based signcryption scheme without random oracles被引量:5
2014年
In order to achieve secure signcryption schemes in the quantum era, Li Fagen et al. [Concurrency and Computation: Practice and Experience, 2012, 25(4): 2112-2122] and Wang Fenghe et al. [Applied Mathematics & Information Sciences, 2012, 6(1): 23-28] have independently extended the concept of signcryption to lattice-based cryptography. However, their schemes are only secure under the random or- acle model. In this paper, we present a lattice-based signcryp- tion scheme which is secure under the standard model. We prove that our scheme achieves indistinguishability against adaptive chosen-ciphertext attacks (IND-CCA2) under the learning with errors (LWE) assumption and existential unforgeability against adaptive chosen-message attacks (EUF- CMA) under the small integer solution (SIS) assumption.
Xiuhua LUQiaoyan WENZhengping JINLicheng WANGChunli YANG
关键词:SIGNCRYPTION
Cryptanalysis of quantum broadcast communication and authentication protocol with a one-time pad
2016年
Chang et al.[Chin.Phys.623 010305(2014)]have proposed a quantum broadcast communication and authentication protocol.However,we find that an intercept-resend attack can be preformed successfully by a potential eavesdropper,who will be able to destroy the authentication function.Afterwards,he or she can acquire the secret transmitted message or even modify it while escaping detection,by implementing an efficient man-in-the-middle attack.Furthermore,we show a simple scheme to defend this attack,that is,applying non-reusable identity strings.
曹雅高飞
QKD-based quantum private query without a failure probability被引量:6
2015年
In this paper, we present a quantum-key-distribution(QKD)-based quantum private query(QPQ) protocol utilizing single-photon signal of multiple optical pulses. It maintains the advantages of the QKD-based QPQ, i.e., easy to implement and loss tolerant. In addition, different from the situations in the previous QKD-based QPQ protocols, in our protocol, the number of the items an honest user will obtain is always one and the failure probability is always zero. This characteristic not only improves the stability(in the sense that, ignoring the noise and the attack, the protocol would always succeed), but also benefits the privacy of the database(since the database will no more reveal additional secrets to the honest users). Furthermore, for the user's privacy, the proposed protocol is cheat sensitive, and for security of the database, we obtain an upper bound for the leaked information of the database in theory.
LIU BinGAO FeiHUANG WeiWEN QiaoYan
共2页<12>
聚类工具0