您的位置: 专家智库 > >

国家自然科学基金(61170270)

作品数:16 被引量:74H指数:4
相关作者:温巧燕黄梅娟杜红珍杜蛟庞善起更多>>
相关机构:北京邮电大学宝鸡文理学院河南师范大学更多>>
发文基金:国家自然科学基金北京市自然科学基金国家教育部博士点基金更多>>
相关领域:电子电信理学自动化与计算机技术机械工程更多>>

文献类型

  • 15篇期刊文章
  • 4篇会议论文

领域

  • 11篇电子电信
  • 10篇理学
  • 6篇自动化与计算...
  • 2篇机械工程

主题

  • 3篇噪声
  • 3篇子密钥
  • 3篇量子
  • 3篇量子密钥
  • 3篇QUANTU...
  • 2篇信道
  • 2篇噪声信道
  • 2篇签名
  • 2篇量子密钥分配
  • 2篇密钥分配
  • 2篇函数
  • 2篇QUANTU...
  • 2篇SCHEME
  • 2篇WSN
  • 2篇ALGORI...
  • 2篇LINEAR...
  • 2篇布尔函数
  • 2篇COLLEC...
  • 1篇代理
  • 1篇代理签名

机构

  • 2篇北京邮电大学
  • 1篇宝鸡文理学院
  • 1篇新乡学院
  • 1篇河南师范大学

作者

  • 2篇温巧燕
  • 1篇杜红珍
  • 1篇黄梅娟
  • 1篇王守印
  • 1篇庞善起
  • 1篇杜蛟

传媒

  • 4篇Chines...
  • 3篇Scienc...
  • 2篇The Jo...
  • 2篇Wuhan ...
  • 1篇电子学报
  • 1篇应用数学学报
  • 1篇Acta M...
  • 1篇Fronti...

年份

  • 2篇2016
  • 4篇2015
  • 4篇2014
  • 6篇2013
  • 3篇2012
16 条 记 录,以下是 1-10
排序方式:
An Algorithm for the Spectral Immunity of Binary Sequence with Period 2^n
2016年
To resist the fast algebraic attack and fast selective discrete Fourier transform attacks, spectral immunity of a sequence or a Boolean function was proposed. At the same time, an algorithm to compute the spectral immunity of the binary sequence with odd period N was presented, here N is a factor of 2~n-1, where n is an integer. The case is more complicated when the period is even. In this paper, we compute linear complexity of every orthogonal sequence of a given sequence using Chan-Games algorithm and k- error linear complexity algorithm. Then, an algorithm for spectral immunity of binary sequence with period N=2~n is obtained. Furthermore, the time complexity of this algorithm is proved to be O(n).
LIU Zhenhua
关键词:SEQUENCE
Some Algorithms for the Error Linear Complexity of Binary 2^n-Periodic Sequences
2013年
Based on the Games-Chan algorithm and StampMartin algorithm, this paper provides some new algorithms to compute the error linear complexity spectrum of binary 2n-periodic se-quences. These new algorithms are clearer and simpler than old algorithms, and they can quickly compute the error linear complexity spectrum of sequences according to different situations. We also discuss such algorithms and give some new results about linear complexity and error linear complexity of sequences.
CHANG ZulingWANG XueyuanDUAN Li
On the construction of odd-variable boolean functions with optimal algebraic immunity
2013年
Algebraic immunity is an important cryptographic property of Boolean functions. In this paper, odd-variable balanced Boolean functions with optimal algebraic immunity are obtained by m-sequence and consequently, we get bases with special constructions of vector space. Furthermore, through swapping some vectors of these two bases, we establish all kinds of odd-variable balanced Boolean functions with optimal algebraic immunity.
ZHANG JieWEN Qiao-yan
关键词:布尔函数向量空间M序列奇数
Construction of a Class of Quantum Boolean Functions Based on the Hadamard Matrix
2015年
In this study, a new methodology based on the Hadamard matrix is proposed to construct quantum Boolean functions f such that f = I2n-2P2n, where I2n is an identity matrix of order 2n and P2n is a projective matrix with the same order as I2n. The enumeration of this class of quantum Boolean functions is also presented.
Jiao DUShan-qi PANGQiao-yan WENJie ZHANG
关键词:HADAMARD矩阵布尔函数投影矩阵
A LIGHTWEIGHT SOURCE LOCATION PRIVACY PRESERVING SCHEME FOR WIRELESS SENSOR NETWORKS
While many protocols for sensor network security provide confidentiality for message content, contextual infor...
Liming ZHOUQiaoyan WENHua ZHANGLin CHENG
关键词:WSN
Improved certificateless multi-proxy signature被引量:4
2012年
Multi-proxy signature is a scheme that an original signer delegates his or her signing capability to a proxy group.In the scheme,only the cooperation of all proxy signers in the proxy group can create a signature on behalf of the original signer.Jin and Wen firstly defined the formal security model of certificateless multi-proxy signature(CLMPS) and proposed a concrete CLMPS scheme.However,their construction has three problems:the definition of the strengthened security model is inaccurate,the concrete signature scheme has a security flaw,and the proof of the security is imperfect.With further consideration,a remedial strengthened security model is redefined,and an improved scheme is also proposed,which is existentially unforgeable against adaptively chosen-warrant,chosen-message and chosen-identity attacks in the random oracles.In this condition,the computational Diffie-Hellman(CDH) assumption is used to prove full security for our CLMPS scheme.
XU JieSUN Hong-xiangWEN Qiao-yanZHANG Hua
关键词:代理签名DIFFIE-HELLMAN数字签名方案建筑模型安全漏洞
A New Solution of Data Security Accessing for Hadoop Based on CP-ABE
In cloud computing platform Hadoop,because user data stored in the cloud is not a controllable domain,so how t...
Huixiang ZhouQiaoyan Wen
关键词:HADOOPHDFS
A lattice-based signcryption scheme without random oracles被引量:5
2014年
Xiuhua LUQiaoyan WENZhengping JINLicheng WANGChunli YANG
关键词:签密方案选择密文攻击应用数学
Cryptanalysis of quantum broadcast communication and authentication protocol with a one-time pad
2016年
Chang et al.[Chin.Phys.623 010305(2014)]have proposed a quantum broadcast communication and authentication protocol.However,we find that an intercept-resend attack can be preformed successfully by a potential eavesdropper,who will be able to destroy the authentication function.Afterwards,he or she can acquire the secret transmitted message or even modify it while escaping detection,by implementing an efficient man-in-the-middle attack.Furthermore,we show a simple scheme to defend this attack,that is,applying non-reusable identity strings.
曹雅高飞
关键词:AUTHENTICATION
QKD-based quantum private query without a failure probability被引量:4
2015年
In this paper, we present a quantum-key-distribution(QKD)-based quantum private query(QPQ) protocol utilizing single-photon signal of multiple optical pulses. It maintains the advantages of the QKD-based QPQ, i.e., easy to implement and loss tolerant. In addition, different from the situations in the previous QKD-based QPQ protocols, in our protocol, the number of the items an honest user will obtain is always one and the failure probability is always zero. This characteristic not only improves the stability(in the sense that, ignoring the noise and the attack, the protocol would always succeed), but also benefits the privacy of the database(since the database will no more reveal additional secrets to the honest users). Furthermore, for the user's privacy, the proposed protocol is cheat sensitive, and for security of the database, we obtain an upper bound for the leaked information of the database in theory.
LIU BinGAO FeiHUANG WeiWEN QiaoYan
关键词:QKD子查询量子密钥分配QPQ
共2页<12>
聚类工具0