A ring R is called a left (right) SF-ring if all simple left (right) R-modules are flat. It is known that von Neumann regular rings are left and right SF-rings. In this paper, we study the regularity of right SF-rings...A ring R is called a left (right) SF-ring if all simple left (right) R-modules are flat. It is known that von Neumann regular rings are left and right SF-rings. In this paper, we study the regularity of right SF-rings and prove that if R is a right SF-ring whose all maximal (essential) right ideals are GW-ideals, then R is regular.展开更多
Based on tht difficulty of solving the ECDLP (elliptic curve discretelogarithm problem) on the finite field, we present a (t, n) threshold signature scheme and averifiable key agreement scheme without trusted party. A...Based on tht difficulty of solving the ECDLP (elliptic curve discretelogarithm problem) on the finite field, we present a (t, n) threshold signature scheme and averifiable key agreement scheme without trusted party. Applying a modified elliptic curve signatureequation, we gel a more efficient signature scheme than the existing ECDSA (elliptic curve digitalsignature algorithm) from the computability and security view. Our scheme has a shorter key, fastercomputation, and better security.展开更多
文摘A ring R is called a left (right) SF-ring if all simple left (right) R-modules are flat. It is known that von Neumann regular rings are left and right SF-rings. In this paper, we study the regularity of right SF-rings and prove that if R is a right SF-ring whose all maximal (essential) right ideals are GW-ideals, then R is regular.
文摘Based on tht difficulty of solving the ECDLP (elliptic curve discretelogarithm problem) on the finite field, we present a (t, n) threshold signature scheme and averifiable key agreement scheme without trusted party. Applying a modified elliptic curve signatureequation, we gel a more efficient signature scheme than the existing ECDSA (elliptic curve digitalsignature algorithm) from the computability and security view. Our scheme has a shorter key, fastercomputation, and better security.