54,778 research outputs found
One Password: An Encryption Scheme for Hiding Users' Register Information
In recent years, the attack which leverages register information (e.g.
accounts and passwords) leaked from 3rd party applications to try other
applications is popular and serious. We call this attack "database collision".
Traditionally, people have to keep dozens of accounts and passwords for
different applications to prevent this attack. In this paper, we propose a
novel encryption scheme for hiding users' register information and preventing
this attack. Specifically, we first hash the register information using
existing safe hash function. Then the hash string is hidden, instead a
coefficient vector is stored for verification. Coefficient vectors of the same
register information are generated randomly for different applications. Hence,
the original information is hardly cracked by dictionary based attack or
database collision in practice. Using our encryption scheme, each user only
needs to keep one password for dozens of applications
-Deformed Chern Characters for Quantum Groups
In this paper, we introduce an matrix in
the quantum groups to transform the conjugate representation into
the standard form so that we are able to compute the explicit forms of the
important quantities in the bicovariant differential calculus on ,
such as the -deformed structure constant and the
-deformed transposition operator . From the -gauge covariant
condition we define the generalized -deformed Killing form and the -th
-deformed Chern class for the quantum groups . Some
useful relations of the generalized -deformed Killing form are presented. In
terms of the -deformed homotopy operator we are able to compute the
-deformed Chern-Simons by the condition ,
Furthermore, the -deformed cocycle hierarchy, the -deformed gauge
covariant Lagrangian, and the -deformed Yang-Mills equation are derived
- β¦