Abstract
Function S-rough sets are defined by R-function equivalence class, which have dynamic characteristic. Function S-rough sets have dynamic characteristic, law characteristic and law-hiding characteristic. Function S-rough sets can generate f-hiding law and \( \bar f \)-hiding law. By engrafting, crossing, and penetrating between the information security theory and function S-rough sets, the security hiding and the authentication of f-hiding law and \( \bar f \)-hiding law are given respectively in this paper. The fusion and share between function S-rough sets and information security theory is a new research direction of the application of information law in information system.
Similar content being viewed by others
References
Shi K Q. S-rough sets and its applications in diagnosis-recognition for disease. IEEE Proc of the 1st Int Conf on Machine Learning and Cybernetics, 2002, 4(1): 50–54
Pawlak Z. Rough sets. Int J Comp Inf Sci, 1982, 32(11): 341–356
Shi K Q, Cui Y Q. F-decomposition and \( \bar F \)-reduction of S-rough sets. An Int J Adv Syst Sci Appl, 2004, 4(4): 487–499
Shi K Q, Chang T C. One direction S-rough sets. Int J Fuzzy Math, 2005, 13(2): 319–334
Shi K Q. Two direction S-rough sets. Int J Fuzzy Math, 2005, 13(2): 335–349
Shi K Q. S-rough sets and discovery-recognition of new material. Syst Engin Elect (in Chinese), 2006, 28(3): 383–388
Shi K Q. Function S-rough sets and function transfer. An Int J Adv Syst Sci Appl, 2005, 5(1): 1–8
Shi K Q. Function S-rough sets. J Shandong Univ (Nat Sci) (in Chinese), 2005, 40(1): 1–10
Zhang P, Shi K Q. Function S-rough sets and rough law heredity-mining. IEEE Proc of the 4th Int Conf on Machine Learning and Cybernetics, 2005, 7(3): 3148–3152
Cui Y Q, Shi K Q. Function S-rough sets and its applications. J Syst Engin Elect, 2006, 17(3): 434–442
Shi K Q, Yao B X. Function S-rough sets and recognition of financial risk laws. The 1st Int Conf on Rough Sets and Knowledge Technology, RSKT, 2006, 1(1): 247–253
Shi K Q. Function S-rough sets and mining-discovery of rough law in system. J Syst Engin Elect, 2006, 17(2): 330–338
Xue P J, Shi K Q. \( \bar F \)-generation law and recognition of system law. An Int J Adv Syst Sci Appl, 2006, 6(2): 177–183
Wang H Y, Shi K Q. Function S-rough sets and investment warning estimation. Int J Fuzzy Math, 2006, 14(3): 507–520
Shi K Q, Cui Y Q. S-rough Sets and Rough Decision (in Chinese). Beijing: Science Press, 2006. 155–165
Shi K Q, Yao B X. Function S-rough Sets and System Law Mining (in Chinese). Beijing: Science Press, 2007. 147–198
Koblitz N. Elliptic curve cryptosystems. Math Comp, 1987, 21(1): 203–209
Stallings W. Cryptography and Network Security Principles and Practice. London: Prentice-Hall Int Ltd, 1999. 193–206
Shi K Q, Cui Y Q Both-branch fuzzy decision and decision encryption-authentication, Sci China Ser F-Inf Sci, 2003, 46(2): 90–103
Author information
Authors and Affiliations
Corresponding author
Additional information
Supported by the National Natural Science Foundation of China (Grant No. 10771073) and the Natural Science Foundation of Shandong Province (Grant No. Y2004A04)
Rights and permissions
About this article
Cite this article
Shi, K., Zhao, J. Function S-rough sets and security-authentication of hiding law. Sci. China Ser. F-Inf. Sci. 51, 924–935 (2008). https://doi.org/10.1007/s11432-008-0062-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11432-008-0062-9