报告题目1:Two recursive constructions of ASIC-POVMs
报 告 人:曹喜望 教授 (南京航空航天大学)
报告时间:2016年12月31日 (星期六)上午9:00-9:30
报告题目2:Measures of Efficiency in Secret Sharing
报 告 人:林昌露 教授 (福建师范大学)
报告时间:2016年12月31日 (星期六)上午9:30-10:00
报告题目3:Some Repeated-Root Constacyclic Codes over Galois Rings
报 告 人:刘宏伟 教授 (华中师范大学)
报告时间:2016年12月31日 (星期六)上午10:00-10:30
报告题目4:New constructions of sparse permutation polynomials over finite fields
报 告 人:屈龙江 教授 (国防科技大学)
报告时间:2016年12月31日 (星期六)上午10:30-11:00
报告题目5:安全多方计算的设计与构造
报 告 人:唐春明 教授 (广州大学)
报告时间:2016年12月31日 (星期六)上午11:00-11:30
报告地点:4号楼4318室
报告1摘要:Symmetric informationally complete positive operator-valued measures (SIC-POVMs) have many applications in quantum information, including dense coding, teleportation, entanglement swapping, covariant cloning, and state tomography, and so on. However, it is not easy to construct SIC-POVMs and there are only a few known classes of them, and we don't even know whether there exists an infinite class of them, thus constructing approximately symmetric information complete positive operator-valued measures (ASIC-PVOMs) has its own meaning. In this talk, we show that one can use character sums over finite fields to present some constructions of ASIC-POVMs. We show that there are some classes of infinite families of ASIC-POVMs by using some special functions over finite fields.
报告2摘要:秘密共享(secret sharing)在拜占庭协议、安全计算、门限密码,属性基密码以及安全信息存储等密码协议或算法中均有广泛的应用。在不同的应用环境中,需要考虑秘密共享的各种效率,如通信效率、存储效率等。本报告将简要介绍秘密分享方案效率的三种典型的度量方法:信道效率(channel efficiency)、通信效率(communication efficiency)及存储效率(storage efficiency);进而分析在点对点信道(point-to-point channel)、多播信道(partial broadcast channels)以及密钥再分发这三种情形下这三种度量方法一些结果及存在的问题。
报告3摘要:Codes over the Galois rings have been studied by many researchers, negacyclic codes over $GR(2^a,m)$ of length $2^s$ have been characterized by the fact that the ring $/R_2(a,m,-1)= /frac{GR(2^a,m)[x]}{/langle x^{2^s}+1/rangle}$ is a chain ring, furthermore, these results have been generalized to $/lambda$-constacyclic codes for any unit $/lambda$ of the form $4z-1$, $z/in GR(2^a, m)$. In this paper, we give more general cases and investigate all cases where $/R_2(a,m,/gamma)= /frac{GR(2^a,m)[x]}{/langle x^{2^s}-/gamma /rangle}$ is a chain ring, moreover, we give necessary and sufficient conditions for the ring $/R_2(a,m,/gamma)$ to be a chain ring. Furthermore, we generalize these results to all odd prime number, by giving necessary and sufficient conditions for the ring $/R_p(a,m,/gamma)=/frac{GR(p^a,m)[x]}{/langle x^{p^s}-/gamma/rangle}$ to be a chain ring, using this structure we investigate all $/gamma$-constacyclic codes over $GR(p^a,m)$, where $/R_p(a,m,/gamma)$ is a chain ring. The dual codes and necessary and sufficient conditions for the existence of self-orthogonal and self-dual $/gamma$-constacyclic codes are provided. Among others, for any prime $p$, the structure of $/R_p(a,m,/gamma)=/frac{GR(p^a,m)[x]}{/langle x^{p^s}-/gamma/rangle}$ is used to establish the Hamming distance.
报告5摘要:安全多方计算是密码学领域中一个重要的分支,构造安全多方计算的主要工具是密钥共享方案。Shamir的密钥共享方案和基于线性码的密钥共享方案都满足线性的性质,因此可以使用来构造安全多方计算协议。然而,基于Shamir的密钥共享方案构造的安全多方计算协议仅仅实现门限的存取结构,而基于线性码的密钥共享方案构造的安全多方计算协议尽管能实现非门限的存取结构,但是由于密钥共享方案不是理想的,因此计算复杂度和通信复杂度都非常昂贵。我们将为任意的存取结构构造理想的但是非线性的密钥共享方案,并利用这些方案的特殊性质来构造高效的安全多方计算协议。