Search scope:
排序: Display mode:
The Generating Lock P<G,X,X'>and Its Central Encrypting System
Shi Kaiquan,Chen Zexiong
Strategic Study of CAE 2000, Volume 2, Issue 2, Pages 41-46
The conception of the generating lock P <G ,X, X´> and the central encrypting system composed of P<G ,X, X´>with data generating technology are proposed in this paper[3〜6]. These systems include the generating lock P<G ,X, X´> and single-tooth central encrypting system, and the generating lock P <G ,X, X´> and multi-tooth central encrypting system. The single-tooth encrypting-decrypting algorithm multi-tooth encrypting-decrypting algorithm, multi-tooth static encrypting-decrypting algorithm, multi-tooth dynamic encrypting-decrypting algorithm as well as the structure character of central encrypting system are provided. The paper points out that arbitrary two persons A and B can choose irregular distributed positive integer sets, XA={x1, x2, …,xn}, XB ={x1,x2,…xm}, m≥4, n≥4, XA≠XB , respectively and complete their secret communication with P < G, X, X´>. The experiment result shows that the method proposed has good application character and security character.
Keywords:
lock
the central encrypting system
multi-tooth encrypting-decrypting algorithm
P
Both-Branch Fuzzy Decision and Problems on Decision Discernment
Shi Kaiquan,Li Qiqiang
Strategic Study of CAE 2001, Volume 3, Issue 1, Pages 71-77
Keywords: both-branch fuzzy decision decision model judgement theorem discernment theorem surplusage-discardingtheorem hole-digging principle
Current Status and Future Development of Quantum Cryptographic Protocols
Zhang Xue, Gao Fei, Qin Sujuan, Zhang Ping
Strategic Study of CAE 2022, Volume 24, Issue 4, Pages 145-155 doi: 10.15302/J-SSCAE-2022.04.015
Keywords: quantum cryptography protocols quantum key distribution quantum digital signature quantum private
Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 99-103 doi: 10.15302/J-SSCAE-2016.06.020
This paper analyzes and sorts out the latest developments and typical applications of network electronic identity management in major countries and regions around the world, and discusses development trends in network identity management technology. It outlines network electronic identity management in China according to the 13th Five-Year Plan, including the development of ideas and constructive suggestions, the strengthening of network space identity management, and the construction of a network space identity management system. Such a system can help to regulate the behavior of Internet users, fight against network crime, build network power, safeguard national security and cyberspace sovereignty, and protect the privacy of network users; thus, it provides a reference for China’s network identity management development during the 13th Five-Year Plan.
Keywords: network electronic identity identity management digital signature
Frontiers of Chemical Science and Engineering 2022, Volume 16, Issue 2, Pages 168-182 doi: 10.1007/s11705-021-2056-8
Keywords: computer-aided molecular design bio-oil additives molecular signature descriptor
Abrar ALLAG,Abdelhamid BENAKCHA,Meriem ALLAG,Ismail ZEIN,Mohamed Yacine AYAD
Frontiers in Energy 2015, Volume 9, Issue 4, Pages 413-425 doi: 10.1007/s11708-015-0379-1
Keywords: sector nonlinearity nonlinear controller linear matrix inequality (LMI) approach differential mean value theorem
The Theorem of the Resistance of Hydraulic Machine's Materials to Cavitation Erosion and Abrasion
Wang Biao,Wang Yudong,Zhang Zihua,Ye Xianguo
Strategic Study of CAE 2003, Volume 5, Issue 7, Pages 58-61
In order to confirm the dependence of the resistance of cavitation erosion and abrasion (CEA) on the common properties of materials, four typical materials (WC coating, NiCr alloy coating, boron stainless steel and titanium) were used to do the experiments of CEA and cavitation erosion (CE), to do corrosive experiment, and to test their hardnesses. The experiments results indicated that all resistance to CEA and resistance to CE depend on the hardness and the corrosive resistance of materials. The high hardness is the first factor of good resistance to CEA, strong corrosive resistance is the second factor. Meanwhile, the strong corrosive resistance is the first factor of good resistance to CE, high hardness is the second factor.
Keywords: hydraulic machine´ s materials cavitation erosion and abrasion theorem
Iman FATTAHI, Hamid Reza MIRDAMADI, Hamid ABDOLLAHI
Frontiers of Structural and Civil Engineering 2020, Volume 14, Issue 3, Pages 675-689 doi: 10.1007/s11709-020-0625-4
Keywords: composite beam dynamic finite element degrees of freedom coupling experimental validation numerical validation
Fei LI, Wei GAO, Gui-lin WANG, Ke-fei CHEN, Chun-ming TANG
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 2, Pages 176-186 doi: 10.1631/FITEE.1700005
Double-authentication-preventing signature (DAPS) is a novel signature notion proposed at ESORICSsignatures on two different messages with the same subject will result in an immediate collapse of the signature
Keywords: Double-authentication-preventing signatures Chameleon hash function Digital signature Provable security
Efficient identity-based signature over NTRU lattice
Jia XIE,Yu-pu HU,Jun-tao GAO,Wen GAO
Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 2, Pages 135-142 doi: 10.1631/FITEE.1500197
Identity-based signature has become an important technique for lightweight authentication as soonThereafter, identity-based signature schemes based on the integer factorization problem and discreteIn this study, an efficient identity-based signature scheme is presented over the number theory researchThe new scheme is more efficient than other lattice- and identity-based signature schemes.
Keywords: Identity Signature Lattice Number theory research unit (NTRU)
Certificateless broadcast multi-signature for network coding Research Article
Huifang YU, Zhewei QI
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 9, Pages 1369-1377 doi: 10.1631/FITEE.2200271
Keywords: Network coding Certificateless multi-signature Linear combination Homomorphic hash function
Platform governance in the era of AI and the digital economy
Frontiers of Engineering Management 2023, Volume 10, Issue 1, Pages 177-182 doi: 10.1007/s42524-022-0241-1
Revisiting digital twins: Origins, fundamentals, and practices
Frontiers of Engineering Management Pages 668-676 doi: 10.1007/s42524-022-0216-2
Keywords: virtual manufacturing digital twins modeling and simulation digitization computational engineering
Development trend of urban design in “digital age”: Pan-dimensionality and individual-ubiquity
Frontiers of Structural and Civil Engineering 2021, Volume 15, Issue 3, Pages 569-575 doi: 10.1007/s11709-021-0735-7
Keywords: digital age urban design multiple objectives human-computer interaction pan-dimensionality individual-ubiquity
Machine learning modeling identifies hypertrophic cardiomyopathy subtypes with genetic signature
Frontiers of Medicine 2023, Volume 17, Issue 4, Pages 768-780 doi: 10.1007/s11684-023-0982-1
Keywords: machine learning methods hypertrophic cardiomyopathy genetic risk
Title Author Date Type Operation
The Generating Lock P<G,X,X'>and Its Central Encrypting System
Shi Kaiquan,Chen Zexiong
Journal Article
Both-Branch Fuzzy Decision and Problems on Decision Discernment
Shi Kaiquan,Li Qiqiang
Journal Article
Current Status and Future Development of Quantum Cryptographic Protocols
Zhang Xue, Gao Fei, Qin Sujuan, Zhang Ping
Journal Article
Development and Application of Network Electronic Identity Management in Major Countries and Regions around the World
Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang
Journal Article
Design of bio-oil additives via molecular signature descriptors using a multi-stage computer-aided molecular
Journal Article
Classical state feedback controller for nonlinear systems using mean value theorem: closed loop-FOC of
Abrar ALLAG,Abdelhamid BENAKCHA,Meriem ALLAG,Ismail ZEIN,Mohamed Yacine AYAD
Journal Article
The Theorem of the Resistance of Hydraulic Machine's Materials to Cavitation Erosion and Abrasion
Wang Biao,Wang Yudong,Zhang Zihua,Ye Xianguo
Journal Article
Application of consistent geometric decomposition theorem to dynamic finite element of 3D composite beam
Iman FATTAHI, Hamid Reza MIRDAMADI, Hamid ABDOLLAHI
Journal Article
Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash
Fei LI, Wei GAO, Gui-lin WANG, Ke-fei CHEN, Chun-ming TANG
Journal Article
Efficient identity-based signature over NTRU lattice
Jia XIE,Yu-pu HU,Jun-tao GAO,Wen GAO
Journal Article
Development trend of urban design in “digital age”: Pan-dimensionality and individual-ubiquity
Journal Article