搜索结果: 1-15 共查到“braid”相关记录23条 . 查询时间(0.093 秒)
CASIMIR OPERATORS AND MONODROMY REPRESENTATIONS OF GENERALISED BRAID GROUPS
CASIMIR OPERATORS MONODROMY REPRESENTATIONS GENERALISED BRAID GROUPS
2015/10/14
Let g be a complex, simple Lie algebra with Cartan subalgebra h and Weyl group W . We construct a one parameter family of flat connections ∇κ on h with values in any finite–dimensional g–moduleV...
The Poincare-Hopf Theorem for relative braid classes
Poincare-Hopf Theorem relative braid classes Symplectic Geometry
2012/4/18
Braid Floer homology is an invariant of proper relative braid classes. Closed integral curves of 1-periodic Hamiltonian vector fields on the 2-disc may be regarded as braids. If the Braid Floer homolo...
Homology computations for complex braid groups
Homology computations complex braid groups
2010/11/23
Complex braid groups are the natural generalizations of braid groups associated to arbitrary (finite) complex reflection groups. We investigate several methods for computing the homology of these gro...
Governed by locality, we explore a connection between unitary braid group representations associated to a unitary R-matrix and to a simple object in a unitary braided fusion category.
Singular braids are isotopy classes of smooth strings which are allowed to cross each other pairwise with distinct tangents. Under the usual multiplication of braids, they form a monoid. The singular ...
A Strong Blind Signature Scheme over Braid Groups
Braid Group Blind Signature One-more Matching Conjugacy Random Oracle Model
2009/12/29
The rapid development of quantum computing makes public key cryptosystems not based on commutative algebraic systems hot topic. Because of the non-commutativity property, the braid group with braid in...
Security Analysis and Design of Proxy Signature Schemes over Braid Groups
proxy signature braid group conjugacy search problem
2009/9/27
The braid groups have attracted much attention as a new platform of constructing cryptosystems. This paper
firstly analyzes the security vulnerabilities of existing proxy signature schemes over braid...
Security Analysis and Design of Proxy Signature Schemes over Braid Groups
proxy signature braid group conjugacy search problem
2009/9/22
The braid groups have attracted much attention as a new platform of constructing cryptosystems. This paper firstly analyzes the security vulnerabilities of existing proxy signature schemes over braid ...
On the Security of a Proxy Blind Signature Scheme over Braid Groups
Security Proxy Blind Signature Scheme Braid Groups
2009/7/22
A proxy blind signature scheme is the combination of
proxy signature and blind signature scheme. In 2009,Verma
proposed a proxy blind signature scheme over braid groups.
Verma claimed that the prop...
Linkability of Blind Signature Schemes over Braid Groups
Linkability Blind Signature Schemes Braid Groups
2009/6/12
Blindness and unforgeability are two essential security
requirements of a secure blind signature scheme.
Blindness means that after interacting with various
users, the signer can never be able to l...
Security Analysis of a Proxy Signature Scheme over Braid Groups
Proxy Signature Scheme Braid Groups signer and proxy singer changing attacks
2009/6/12
Delegation of powers is a common practice in the
real world. To realized the delegation of powers electronically,
Mambo,Usuda and Okamoto proposed the
first proxy signature scheme in 1996. Since th...
A Proxy Signature Scheme over Braid Groups
Proxy Signature Conjugacy Decision Problem Braid groups
2009/6/3
Proxy signatures, introduced by Mambo, Usuda and
Okamoto, allow a designated person to sign on behalf of an original
signer. Braid groups has been playing an important role in the theory of
cryptog...
Blind signature scheme over Braid groups
Blind signature Braid groups Conjugcy search problem
2009/6/2
A blind signature scheme is a cryptographic protocol for
obtaining a signature from a signer such that the signer’s view of the
protocol cannot be linked to the resulting message signature pair. In ...
Entity Authentication Schemes Using Braid Word Reduction
braid group authentication zero knowledge handle reduction
2009/4/15
Artin’s braid groups currently provide a promising background for cryptographical
applications, since the first cryptosystems using braids were introduced in
[2, 3, 18] (see also [22]). A variety of...
Braid Groups have recently been considered for use in Public-Key
Cryptographic Systems. The most notable of these system has been the
Birman-Ko-Lee system presented at Crypto 2000. This article give...