报告题目1:Tworecursive constructions of ASIC-POVMs
报告人:曹喜望教授 (南京航空航天大学)
报告时间:2016年12月31日(星期六)上午9:00-9:30
报告题目2:Measuresof Efficiency in Secret Sharing
报告人:林昌露教授 (福建师范大学)
报告时间:2016年12月31日(星期六)上午9:30-10:00
报告题目3:SomeRepeated-Root Constacyclic Codes over Galois Rings
报告人:刘宏伟教授 (华中师范大学)
报告时间:2016年12月31日(星期六)上午10:00-10:30
报告题目4:Newconstructions of sparse permutation polynomials over finite fields
报告人:屈龙江教授 (国防科技大学)
报告时间:2016年12月31日(星期六)上午10:30-11:00
报告题目5:安全多方计算的设计与构造
报告人:唐春明教授 (广州大学)
报告时间:2016年12月31日(星期六)上午11:00-11:30
报告地点:4号楼4318室
报告1摘要:Symmetricinformationally complete positive operator-valued measures(SIC-POVMs) have many applications in quantum information, includingdense coding, teleportation, entanglement swapping, covariantcloning, and state tomography, and so on. However, it is not easy toconstruct SIC-POVMs and there are only a few known classes of them,and we don't even know whether there exists an infinite class ofthem, thus constructing approximately symmetric information completepositive operator-valued measures (ASIC-PVOMs) has its own meaning.In this talk, we show that one can use character sums over finitefields to present some constructions of ASIC-POVMs. We show thatthere are some classes of infinite families of ASIC-POVMs by usingsome special functions over finite fields.
报告2摘要:秘密共享(secretsharing)在拜占庭协议、安全计算、门限密码,属性基密码以及安全信息存储等密码协议或算法中均有广泛的应用。在不同的应用环境中,需要考虑秘密共享的各种效率,如通信效率、存储效率等。本报告将简要介绍秘密分享方案效率的三种典型的度量方法:信道效率(channelefficiency)、通信效率(communicationefficiency)及存储效率(storageefficiency);进而分析在点对点信道(point-to-point channel)、多播信道(partialbroadcast channels)以及密钥再分发这三种情形下这三种度量方法一些结果及存在的问题。
报告3摘要:Codesover the Galois rings have been studied by many researchers,negacyclic codes over $GR(2^a,m)$ of length $2^s$ have beencharacterized by the fact that the ring $\R_2(a,m,-1)=\frac{GR(2^a,m)[x]}{\langle x^{2^s}+1\rangle}$ is a chain ring,furthermore, these results have been generalized to$\lambda$-constacyclic codes for any unit $\lambda$ of the form$4z-1$, $z\in GR(2^a, m)$. In this paper, we give more general casesand investigate all cases where $\R_2(a,m,\gamma)=\frac{GR(2^a,m)[x]}{\langle x^{2^s}-\gamma \rangle}$ is a chain ring,moreover, we give necessary and sufficient conditions for the ring$\R_2(a,m,\gamma)$ to be a chain ring. Furthermore, we generalizethese results to all odd prime number, by giving necessary andsufficient conditions for the ring$\R_p(a,m,\gamma)=\frac{GR(p^a,m)[x]}{\langle x^{p^s}-\gamma\rangle}$to be a chain ring, using this structure we investigate all$\gamma$-constacyclic codes over $GR(p^a,m)$, where$\R_p(a,m,\gamma)$ is a chain ring. The dual codes and necessary andsufficient conditions for the existence of self-orthogonal andself-dual $\gamma$-constacyclic codes are provided. Among others, forany prime $p$, the structure of$\R_p(a,m,\gamma)=\frac{GR(p^a,m)[x]}{\langle x^{p^s}-\gamma\rangle}$is used to establish the Hamming distance.
报告5摘要:安全多方计算是密码学领域中一个重要的分支,构造安全多方计算的主要工具是密钥共享方案。Shamir的密钥共享方案和基于线性码的密钥共享方案都满足线性的性质,因此可以使用来构造安全多方计算协议。然而,基于Shamir的密钥共享方案构造的安全多方计算协议仅仅实现门限的存取结构,而基于线性码的密钥共享方案构造的安全多方计算协议尽管能实现非门限的存取结构,但是由于密钥共享方案不是理想的,因此计算复杂度和通信复杂度都非常昂贵。我们将为任意的存取结构构造理想的但是非线性的密钥共享方案,并利用这些方案的特殊性质来构造高效的安全多方计算协议。