首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到17条相似文献,搜索用时 171 毫秒
1.
多陷门承诺方案是指一个陷门承诺族,对于整个族有一个主陷门,族中的每一个承诺方案有各自对应的具体陷门.水银承诺方案是通常意义下承诺方案的一种变形,对承诺方案要求的绑定性质有显著的放松.应用上述2个传统承诺方案的变形给出多陷门水银承诺方案的定义,并构造出基于强Diffie-Hellman假设的多陷门水银承诺方案.  相似文献   

2.
在STOC2003上,提出了一个公共参考串模型(CRS)下的非交互的可重用的统计绑定的非延展承诺方案.该方案的CRS由4部分构成:承诺的公钥、签名方案的公钥、广义单向哈希函数和一个对串0的承诺.我们使用2个签名方案构造了一个此类方案,方案中CRS只有2部分:模糊承诺的公开参数和签名方案的公钥.因此,新方案的CRS更短些.  相似文献   

3.
将抵抗选择解承诺攻击的承诺方案简称为选择解承诺方案,这种方案是通常意义下 承诺方案复合的例子.本文给出选择解承诺方案在安全多方计算模型下基于模拟的安全性定 义,并证明了新定义与原始定义是等价的.本文证明二义性承诺方案能够满足我们定义的安全性,进而可以构成安全的选择解承诺方案.  相似文献   

4.
量子动态口令认证方案   总被引:1,自引:0,他引:1  
提出一个量子动态口令方案.方案将敌手攻击时间有效地压缩,以抗重放攻击.方案是一个单向通信和统计安全的口令认证协议,在保证一定的统计安全性条件下,相比经典动态口令方案显著提高了种子可重用次数.  相似文献   

5.
定义∑-保密的隐秘信息检索(PIR)协议,并利用基于一般存取结构的可验证秘密分享给出了∑-保密PIR协议的构造.然后,基于鲁棒的乘法协议,构造了数据库安全的∑-保密PIR协议,使得对于(∑,△)-敌手而言,数据库内容也是保密的.所得协议的通信复杂度均与存取结构大小有关,对于服务器较少的情形是有效的.  相似文献   

6.
给出一个基于Holevo定理的量子单向函数,并根据它构造了一个基于对称密码体制的量子身份识别方案.该方案通过一次性的随机数隐藏了双方共享的密钥,且验证算法不依赖于所使用的随机数,从而保护了密钥,使该方案的安全性不局限于敌手的计算能力.  相似文献   

7.
通过实验模拟方法,以66个3人小组在决策任务中的交流中断为情景,对突变情景下团队状态目标取向和互动过程对适应性的多重影响作用进行了探讨。根据Lewin的变革三阶段模型,运用多层数据模型(HLM)和层次回归技术对数据进行了分析。结果表明:在突变情景下,学习和绩效取向对团队适应性有积极的作用,团队成员的变革承诺在学习取向与团队适应性的作用关系中有调节效应,高变革承诺水平强化了团队学习取向对适应性的影响。在不同的变革阶段,状态目标取向对团队适应性的影响不同,而互动过程对团队适应的作用也存在差异性,随着时间的延展,团队出现高水平适应的概率增加。  相似文献   

8.
姜春林  王文苑 《科研管理》2012,33(11):116-121
以我国CSSCI收录的管理学期刊为调查对象,通过总结开放存取的概念来设定相关评定标准,对这些期刊的网站建设及免费存取情况进行调研,结果显示我国管理学期刊仍处于开放存取出版模式的初期阶段,并针对实际情况提出了适合我国管理学期刊开放存取的三种模式。  相似文献   

9.
国内外普遍采用回弹弯沉值来表示路基路面的承载能力,回弹弯沉值越大,承载能力越小,反之则越大.通常所说的回弹弯沉值是指标准后轴载双轮组轮隙中心处的最大回弹弯沉值.在路表测试的回弹弯沉值可以反映路基、路面的综合承载能力.从弯沉值的概念入手,分析了路面弯沉的变化规律,并进一步阐述了路面弯沉的变化规律的测试试验.  相似文献   

10.
解密生物降解   总被引:1,自引:0,他引:1  
生物降解 生物降解是一个环保概念,通常是指针对塑料、橡胶等制品产生的污染,将这些高分子污染源自然消解,使之转变成无污染的物质.  相似文献   

11.
徐华  于秀源 《科技通报》2006,22(5):584-586
基于离散对数和哈希函数求逆的困难性提出了一个前向安全的多重代理签名方案。此方案同时对代理签名人和原始签名人的权益提供了保护,攻击者即使在第j时段入侵系统,也无法伪造第j时段之前的签名,因而具有较高的执行效率和较强的安全性。  相似文献   

12.
We consider a remote state estimation process under an active eavesdropper for cyber-physical system. A smart sensor transmits its local state estimates to a remote estimator over an unreliable network, which is eavesdropped by an adversary. The intelligent adversary can work in passive eavesdropping mode and active jamming mode. An active jamming mode enables the adversary to interfere the data transmission from sensor to estimator, and meanwhile improve the data reception of itself. To protect the transmission data from being wiretapped, the sensor with two antennas injects noise to the eavesdropping link with different power levels. Aiming at minimizing the estimation error covariance and power cost of themselves while maximizing the estimation error covariance of their opponents, a two-player nonzero-sum game is constructed for sensor and active eavesdropper. For an open-loop case, the mixed Nash equilibrium is obtained by solving an one-stage nonzero-sum game. For a long term consideration, a Markov stochastic game is introduced and a Nash Q-learning method is given to find the Nash equilibrium strategies for two players. Numerical results are provided to show the effectiveness of our theoretical conclusions.  相似文献   

13.
祝良文 《科教文汇》2014,(10):102-102,106
信息时代,美军深知赢得公理比打赢战争更难,为军事行动起一个形象而颇具意义的作战代号是舆论宣传的一个重要环节。在发动一场战争时,美军总会利用媒体宣传,为战争“正名”。在以网络为中心的信息即时传播的“新媒体”时代,美军通过军事代号命名千方百计地妖魔化对手,将战争的真正战略意图隐藏起来,摆出捍卫弱者的姿态以及借口反恐和宣扬民主自由等普世价值观等,是美军巧妙运用军事文化软实力的表现形式之一。  相似文献   

14.
This paper aims to encourage an ethos of care in the study of science and technology. It starts with a reading of Bruno Latour's notion of'matters of concern' as favouring an awareness of the ethico-political effects of constructivist accounts in STS. Introducing attention to concern brings us closer to a notion of care. However, there is a'critical' edge to care that Latour's politics of things tends to disregard. Drawing upon feminist knowledge politics, I propose to treat matters of fact and sociotechnical assemblages as 'matters of care' and argue that engaging with care requires a speculative commitment to neglected things.  相似文献   

15.
In this paper, the problem of active fault tolerant control for a reusable launch vehicle (RLV) with actuator fault using both adaptive and sliding mode techniques is investigated. Firstly, the kinematic equations and dynamic equations of RLV are given, which represent the characteristics of RLV in reentry flight phase. For the dynamic model of RLV in faulty case, a fault detection scheme is proposed by designing a nonlinear fault detection observer. Then, an active fault tolerant tracking strategy for RLV attitude control systems is presented by making use of both adaptive control and sliding mode control techniques, which can guarantee the asymptotic output tracking of the closed-loop attitude control systems in spite of actuator fault. Finally, simulation results are given to demonstrate the effectiveness of the developed fault tolerant control scheme.  相似文献   

16.
We argue that the notion of trust, as it figures in an ethical context, can be illuminated by examining research in artificial intelligence on multi-agent systems in which commitment and trust are modeled. We begin with an analysis of a philosophical model of trust based on Richard Holton’s interpretation of P. F. Strawson’s writings on freedom and resentment, and we show why this account of trust is difficult to extend to artificial agents (AAs) as well as to other non-human entities. We then examine Margaret Urban Walker’s notions of “default trust” and “default, diffuse trust” to see how these concepts can inform our analysis of trust in the context of AAs. In the final section, we show how ethicists can improve their understanding of important features in the trust relationship by examining data resulting from a classic experiment involving AAs.  相似文献   

17.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号