multiplication property
Recently Published Documents


TOTAL DOCUMENTS

8
(FIVE YEARS 3)

H-INDEX

2
(FIVE YEARS 0)

2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Ying Zou ◽  
Yanting Chai ◽  
Sha Shi ◽  
Lei Wang ◽  
Yunfeng Peng ◽  
...  

Due to the transparency of the wireless channel, users in multiple-key environment are vulnerable to eavesdropping during the process of uploading personal data and re-encryption keys. Besides, there is additional burden of key management arising from multiple keys of users. In addition, profile matching using inner product between vectors cannot effectively filter out users with ulterior motives. To tackle the above challenges, we first improve a homomorphic re-encryption system (HRES) to support a single homomorphic multiplication and arbitrarily many homomorphic additions. The public key negotiated by the clouds is used to encrypt the users’ data, thereby avoiding the issues of key leakage and key management, and the privacy of users’ data is also protected. Furthermore, our scheme utilizes the homomorphic multiplication property of the improved HRES algorithm to compute the cosine result between the normalized vectors as the standard for measuring the users’ proximity. Thus, we can effectively improve the social experience of users.


Author(s):  
Manish Khare ◽  
Kalyanlakshmi Chitta

Successive-addition-of-digits-of-a-number(SADN) refers to the process of adding up the digits of an integer number until a single digit is obtained. Concept of SADN has been occasionally identified but seldom employed in extensive mathematical applications. This paper discusses SADN and its properties in terms of addition, subtraction and multiplication. Further, the paper applies the multiplication-property of SADN to understand the distribution of prime numbers. For this purpose the paper introduces three series of numbers -S1, S3 and S5 series- into which all odd numbers can be placed, depending on their SADN and the rationale of such classification. Extending the analysis the paper explains how composite numbers of the S1 and S5 series can be derived. Based on this discussion it concludes that even as the concept of SADN is rather simple in its formulation and appears as an obvious truism but a profound analysis of the properties of SADN in terms of fundamental mathematical functions reveals that SADN holds a noteworthy position in number theory and may have significant implications for unfolding complex mathematical questions like understanding the distribution of prime numbers and Goldbach-problem.


Author(s):  
Manish Khare ◽  
Kalyanlakshmi Chitta

Successive-addition-of-digits-of-a-number(SADN) refers to the process of adding up the digits of an integer number until a single digit is obtained. Concept of SADN has been occasionally identified but seldom employed in extensive mathematical applications. This paper discusses SADN and its properties in terms of addition, subtraction and multiplication. Further, the paper applies the multiplication-property of SADN to understand the distribution of prime numbers. For this purpose the paper introduces three series of numbers -S1, S3 and S5 series- into which all odd numbers can be placed, depending on their SADN and the rationale of such classification. Extending the analysis the paper explains how composite numbers of the S1 and S5 series can be derived. Based on this discussion it concludes that even as the concept of SADN is rather simple in its formulation and appears as an obvious truism but a profound analysis of the properties of SADN in terms of fundamental mathematical functions reveals that SADN holds a noteworthy position in number theory and may have significant implications for unfolding complex mathematical questions like understanding the distribution of prime numbers and Goldbach-problem.


2013 ◽  
Vol 46 (1) ◽  
Author(s):  
Tsetska Rashkova

AbstractThe paper considers the anticommutative multiplication property for the matrix algebra


2000 ◽  
Vol 6 (1) ◽  
pp. 12-18
Author(s):  
David B. Smith

Here is the teacher'S Dilemma: Students are motivated by new experiences in mathematics, but many lack the basic skills and understanding of concepts that they need to be successful when the pace of instruction quickens. For example, when introducing the multiplication property of equality to solve ax = b, I find that many seventh graders have forgotten how to multiply fractions and decimals. They are interested in the prospect of learning something new, but their enthusiasm is dampened because they cannot perform simple computations. Even after years of drill and practice, familiar algorithms have not reached long-term memory.


1997 ◽  
Vol 4 (28) ◽  
Author(s):  
Ronald Cramer ◽  
Ivan B. Damgård ◽  
Ueli Maurer

The contributions of this paper are three-fold. First, as an abstraction of previously proposed cryptographic protocols we propose two cryptographic primitives: homomorphic<br />shared commitments and linear secret sharing schemes with an additional multiplication property. We describe new constructions for general secure multi-party computation protocols, both in the cryptographic and the information-theoretic (or secure<br />channels) setting, based on any realizations of these primitives.<br />Second, span programs, a model of computation introduced by Karchmer and Wigderson, are used as the basis for constructing new linear secret sharing schemes, from which the two above-mentioned primitives as well as a novel verifiable secret sharing scheme can efficiently be realized. Third, note that linear secret sharing schemes can have arbitrary (as opposed to<br />threshold) access structures. If used in our construction, this yields multi-party protocols secure against general sets of active adversaries, as long as in the cryptographic (information-theoretic) model no two (no three) of these potentially misbehaving player sets cover the full player set. This is a strict generalization of the threshold-type adversaries and results previously considered in the literature. While this result is new for the cryptographic model, the result for the information-theoretic model was previously proved by Hirt and Maurer. However, in addition to providing an independent proof, our protocols are not recursive and have the potential of being more efficient.


1955 ◽  
Vol 7 ◽  
pp. 188-190 ◽  
Author(s):  
W. P. Brown

The algebras considered here arose in the investigation of an algebra connected with the orthogonal group. We consider an algebra of dimension mn over a field K of characteristic zero, and possessing a basis {eij} (1 ≤ i ≤ m; 1 ≤ j ≤ n) with the multiplication property1,The field elements ϕij form a matrix Φ = (ϕij) of order n × m. It will be called the multiplication matrix of the algebra relative to the basis {ϕij}.


Sign in / Sign up

Export Citation Format

Share Document