Lu Rong-bo, He Da-ke, Wang Chang-ji. Cryptanalysis of an Identity-Based Threshold Proxy Signature Scheme with Known Signers[J]. Journal of Electronics & Information Technology, 2008, 30(1): 100-103. doi: 10.3724/SP.J.1146.2006.01218
Citation:
Lv Lei , Zhang Zhong-Pei. Low Complexity Codeword Search Algorithms Base on Subspace Distance[J]. Journal of Electronics & Information Technology, 2011, 33(12): 2990-2994. doi: 10.3724/SP.J.1146.2011.00627
Lu Rong-bo, He Da-ke, Wang Chang-ji. Cryptanalysis of an Identity-Based Threshold Proxy Signature Scheme with Known Signers[J]. Journal of Electronics & Information Technology, 2008, 30(1): 100-103. doi: 10.3724/SP.J.1146.2006.01218
Citation:
Lv Lei , Zhang Zhong-Pei. Low Complexity Codeword Search Algorithms Base on Subspace Distance[J]. Journal of Electronics & Information Technology, 2011, 33(12): 2990-2994. doi: 10.3724/SP.J.1146.2011.00627
Two subspace distance calculation algorithms are proposed for codeword search of limited feedback precoding multi-user MIMO systems. The equivalence of subspace distance and chordal distance are first proved, then the complexity of chordal distance calculation and proposed two subspace distance calculation algorithms are analyzed. Simulation results verify that subspace distance calculation algorithms cost fewer operations. Further more the proper one of two proposed algorithms can be chosen based on different hardware implementations and transmitting antenna numbers.
Lu Rong-bo, He Da-ke, Wang Chang-ji. Cryptanalysis of an Identity-Based Threshold Proxy Signature Scheme with Known Signers[J]. Journal of Electronics & Information Technology, 2008, 30(1): 100-103. doi: 10.3724/SP.J.1146.2006.01218
Lu Rong-bo, He Da-ke, Wang Chang-ji. Cryptanalysis of an Identity-Based Threshold Proxy Signature Scheme with Known Signers[J]. Journal of Electronics & Information Technology, 2008, 30(1): 100-103. doi: 10.3724/SP.J.1146.2006.01218