Generalized pairing strategies-a bridge from pairing strategies to colorings
نویسندگان
چکیده
منابع مشابه
A particle-number-conserving solution to the generalized pairing problem
An exact, number-conserving solution to the generalized, orbit-dependent pairing problem is derived by introducing an infinite-dimensional algebra. A method for obtaining eigenvalues and eigenvectors of the corresponding Hamiltonian is also given. The relevance of the orbit-dependent pairing solution is demonstrated by comparing predictions of the model with shell-model calculations. q 1998 Els...
متن کامل-pairing superconductivity in generalized Hubbard models
We consider generalized Hubbard models in arbitrary dimensions which have additional nearest-neigbour interactions. It is shown that in a large region of the parameter space these models have ground states of the-pairing type. These ground states exhibit oo-diagonal long-range order and are thus su-perconducting. In special cases the complete (T = 0) phase diagram can be obtained. The proposal ...
متن کاملPolynomials for Ate Pairing and Atei Pairing
The irreducible factor r(x) of Φk(u(x)) and u(x) are often used in constructing pairing-friendly curves. u(x) and uc ≡ u(x) (mod r(x)) are selected to be the Miller loop control polynomial in Ate pairing and Atei pairing. In this paper we show that when 4|k or the minimal prime which divides k is larger than 2, some u(x) and r(x) can not be used as curve generation parameters if we want Atei pa...
متن کاملChameleon Signature from Bilinear Pairing
Xinjun Du, Ying Wang, Jianhua Ge and Yumin Wang Key Laboratory of Computer Networks and Information Security Xidian University Abstract: Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chameleon signatures is that there are non-transferable, with only the designated recip...
متن کاملAutomated Device Pairing for Asymmetric Pairing Scenarios
“Secure Device Pairing” is the process of bootstrapping secure communication between two human-operated devices over a shortor medium-range wireless channel (such as Bluetooth, WiFi). The devices in such a scenario can neither be assumed to have a prior context with each other nor do they share a common trusted authority. However, the devices can generally be connected using auxiliary physical ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Acta Universitatis Sapientiae, Mathematica
سال: 2016
ISSN: 2066-7752
DOI: 10.1515/ausm-2016-0015