•  学术报告

关于举行编码及密码系列讲座的通知

发布时间:2017-04-12文章来源:浏览次数:71

1Tworecursive constructions of ASIC-POVMs

人:曹喜望教授 (南京航空航天大学)

时间20161231(星期六)上午9:00-9:30

 

2Measuresof Efficiency in Secret Sharing

人:林昌露教授 (福建范大学)

时间20161231(星期六)上午9:30-10:00

 

3SomeRepeated-Root Constacyclic Codes over Galois Rings

人:刘宏教授 范大学)

时间20161231(星期六)上午10:00-10:30

 

4Newconstructions of sparse permutation polynomials over finite fields

人:屈教授 (国防科技大学)

时间20161231(星期六)上午10:30-11:00

 

5:安全多方算的设计与构造

人:唐春明教授 (广州大学)

时间20161231(星期六)上午11:00-11:30

告地点:4号楼4318

 

1摘要:Symmetricinformationally complete positive operator-valued measures(SIC-POVMs) have many applications in quantum information, includingdense coding, teleportation, entanglement swapping, covariantcloning, and state tomography, and so on. However, it is not easy toconstruct SIC-POVMs and there are only a few known classes of them,and we don't even know whether there exists an infinite class ofthem, thus constructing approximately symmetric information completepositive operator-valued measures (ASIC-PVOMs) has its own meaning.In this talk, we show that one can use character sums over finitefields to present some constructions of ASIC-POVMs. We show thatthere are some classes of infinite families of ASIC-POVMs by usingsome special functions over finite fields.

 

2摘要:秘密共享(secretsharing)在拜占庭协议、安全算、限密,属性基密以及安全信息存等密码协议或算法中均有广泛的用。在不同的境中,需要考秘密共享的各种效率,如通信效率、存效率等。本告将要介秘密分享方案效率的三种典型的度量方法:信道效率(channelefficiency)、通信效率(communicationefficiency)及存效率(storageefficiency)而分析在点点信道(point-to-point channel)、多播信道(partialbroadcast channels)以及密再分发这三种情形下三种度量方法一些果及存在的问题

 

3摘要:Codesover the Galois rings have been studied by many researchers,negacyclic codes over $GR(2^a,m)$ of length $2^s$ have beencharacterized by the fact that the ring $\R_2(a,m,-1)=\frac{GR(2^a,m)[x]}{\langle x^{2^s}+1\rangle}$ is a chain ring,furthermore, these results have been generalized to$\lambda$-constacyclic codes for any unit $\lambda$ of the form$4z-1$, $z\in GR(2^a, m)$. In this paper, we give more general casesand investigate all cases where $\R_2(a,m,\gamma)=\frac{GR(2^a,m)[x]}{\langle x^{2^s}-\gamma \rangle}$ is a chain ring,moreover, we give necessary and sufficient conditions for the ring$\R_2(a,m,\gamma)$ to be a chain ring. Furthermore, we generalizethese results to all odd prime number, by giving necessary andsufficient conditions for the ring$\R_p(a,m,\gamma)=\frac{GR(p^a,m)[x]}{\langle x^{p^s}-\gamma\rangle}$to be a chain ring, using this structure we investigate all$\gamma$-constacyclic codes over $GR(p^a,m)$, where$\R_p(a,m,\gamma)$ is a chain ring. The dual codes and necessary andsufficient conditions for the existence of self-orthogonal andself-dual $\gamma$-constacyclic codes are provided. Among others, forany prime $p$, the structure of$\R_p(a,m,\gamma)=\frac{GR(p^a,m)[x]}{\langle x^{p^s}-\gamma\rangle}$is used to establish the Hamming distance.

 

5摘要:安全多方算是密域中一个重要的分支,构造安全多方算的主要工具是密共享方案。Shamir的密共享方案和基于线的密共享方案都线性的性,因此可以使用来构造安全多方协议。然而,基于Shamir的密共享方案构造的安全多方协议仅仅实现门限的存取构,而基于线的密共享方案构造的安全多方协议尽管能实现限的存取构,但是由于密共享方案不是理想的,因此算复度和通信复度都非常昂。我任意的存取构构造理想的但是非线性的密共享方案,并利用些方案的特殊性来构造高效的安全多方协议