排序方式: 共有9条查询结果,搜索用时 31 毫秒
1
1.
2.
3.
Let Ed(x) denote the “Euler polynomial” x2+x+(1−d)/4 if and x2−d if . Set Ω(n) to be the number of prime factors (counting multiplicity) of the positive integer n. The Ono invariantOnod of is defined to be except when d=−1,−3 in which case Onod is defined to be 1. Finally, let hd=hk denote the class number of K. In 2002 J. Cohen and J. Sonn conjectured that hd=3⇔Onod=3 and is a prime. They verified that the conjecture is true for p<1.5×107. Moreover, they proved that the conjecture holds for p>1017 assuming the extended Riemann Hypothesis. In this paper, we show that the conjecture holds for p?2.5×1013 by the aid of computer. And using a result of Bach, we also proved that the conjecture holds for p>2.5×1013 assuming the extended Riemann Hypothesis. In conclusion, we proved the conjecture is true assuming the extended Riemann Hypothesis. 相似文献
4.
5.
6.
7.
Affine message authentication code (MAC) and delegatable affine MAC turn out to be useful tools for constructing identity-based encryption (IBE) and hierarchical IBE (HIBE), as shown in Blazy, Kiltz and Pan’s (BKP) creative work in CRYPTO (2014). An important result obtained by BKP is IBE of tight PR-ID-CPA security, i.e., tight IND-ID-CPA security together with ciphertext pseudorandomness (PR). However, the problem of designing tightly PR-ID-CCA2 secure IBE remains open. We note that the CHK transformation does not preserve ciphertext pseudorandomness when converting IND-ID-CPA secure 2-level HIBE to IND-ID-CCA2 secure IBE. In this paper, we solve this problem with a new approach. We introduce a new concept called De-randomized delegatable affine MAC and define for it weak APR-CMA security. We construct such a MAC with a tight security reduction to the Matrix DDH assumption, which includes the k-Linear and DDH assumptions. We present a paradigm for constructing PR-ID-CCA2 secure IBE, which enjoys both ciphertext pseudorandomness and IND-ID-CCA2 security, from De-randomized delegatable affine MAC and Chameleon hashing. The security reduction is tightness preserving. It provides another approach to IND-ID-CCA2 security besides the CHK transformation. By instantiating the paradigm with our specific De-randomized delegatable affine MAC, we obtain the first IBE of tight PR-ID-CCA2 security from the Matrix DDH assumption over pairing groups of prime order. Our IBE also serves as the first tightly IND-ID-CCA2 secure IBE with anonymous recipient (ANON-ID-CCA2) from the Matrix DDH assumption. Our IBE further implies the first tightly IND-ID-CCA2 secure extractable IBE based on the Matrix DDH assumption. The latter can be used to get IBE of simulation-based selective opening CCA2 (SIM-SO-CCA2) security (due to Lai et al. in EUROCRYPT, 2014). The tight security of our IBE leads to a tighter reduction of the SIM-SO-CCA2 security. 相似文献
8.
9.
利用材料试验机及Hopkinson杆装置系统开展热等静压金属铍在不同温度下的静动态压缩力学行为研究,获得了温度、应变率对金属铍屈服强度和加工硬化行为的影响规律。结果表明:金属铍在压缩应力状态下呈现出良好的塑性,同时其力学性能具有显著的应变率敏感性与热软化效应,屈服强度和流动应力随应变率提高呈明显增大趋势,随着温度升高逐渐降低。同时,室温下其加工硬化行为随着应变增大表现为分段硬化特征,随温度升高则趋于理想塑性。最后,采用修正的Johnson-Cook本构模型对实验结果进行了拟合,模型计算结果与实验结果吻合较好。 相似文献
1