Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  • articleNo Access

    A Matrix Construction of Cellular Algebras

    In this paper, we give a concrete method to construct cellular algebras from matrix algebras by specifying certain fixed matrices for the data of inflations. In particular, orthogonal matrices can be chosen for such data.

  • articleNo Access

    Defect and Equivalence of Unitary Matrices. The Fourier Case. Part I

    Consider the real space 𝔻U of directions one can move in from a unitary N × N matrix U without disturbing its unitarity and the moduli of its entries in the first order. dim (𝔻U) is called the defect of U and denoted D(U). We give an account of Alexander Karabegov’s theory where 𝔻U is parametrized by the imaginary subspace of the eigenspace, associated with λ = 1, of a certain unitary operator IU on 𝕄N, and where D(U) is the multiplicity of 1 in the spectrum of IU. This characterization allows us to establish the dependence of D(U(1) ⊗ … ⊗U(r)) on D(U(k))’s, to derive formulas expressing D(F) for a Fourier matrix F of the size being a power of a prime, as well as to show the multiplicativity of D(F) with respect to Kronecker factors of F if their sizes are pairwise relatively prime. Also partly due to the role of symmetries of U in the determination of the eigenspaces of IU we study the ‘permute and enphase’ symmetries and the equivalence of Fourier matrices, associated with arbitrary finite abelian groups. This work is divided in two parts — the present one and the second appearing in the next issue of OSID [1].

  • articleNo Access

    Defect and Equivalence of Unitary Matrices. The Fourier Case. Part II

    Consider the real space 𝔻U of directions one can move in from a unitary N × N matrix U without disturbing its unitarity and the moduli of its entries in the first order. dim (𝔻U) is called the defect of U and denoted D(U). We give an account of Alexander Karabegov’s theory where 𝔻U is parametrized by the imaginary subspace of the eigenspace, associated with λ = 1, of a certain unitary operator ℐU on 𝕄N, and where D(U) is the multiplicity of 1 in the spectrum of ℐU. This characterisation allows us to establish the dependence of D(U(1) ⊗ … ⊗ U(r)) on D(U(k))’s, to derive formulas expressing D(F) for a Fourier matrix F of the size being a power of a prime number, as well as to show the multiplicativity of D(F) with respect to Kronecker factors of F if their sizes are pairwise relatively prime. Also partly due to the role of symmetries of U in the determination of the eigenspaces of ℐU we study the ‘permute and enphase’ symmetries and equivalence of Fourier matrices, associated with arbitrary finite abelian groups. This work is published as two papers — the first part [1] and the current second one.

  • chapterNo Access

    A Secure Scheme of Biometric Key Generation from Biometric Features

    Cryptographic key is the central problem in cryptographic techniques. The key based on password protection is not enough secure because of the low entropy in user chosen passwords that can be exploited to launch password-guessing attacks. And the length of cryptographic key generated from user's biometric features directly is limited. Differ from prior methods, a novel scheme of cryptographic key generation based on biometric features and secret sharing is proposed. Biometric feature vectors is transformed through orthogonal matrix, and mapped to integer spaces. Then, a steady integer vector is obtained, and can be utilized to bind with cryptographic key by Shamir's secret sharing scheme. This method may realize the security of key storing, and can produce the key of the arbitrary length.