
In order to ensure that only the designated person can verify the signer's signature on the message, Steinfeld et al. introduced the concept of Universal Designated Verifier Signature (UDVS), which enables a designator who has obtained a signature on a message from the signer to designate the signature to any desired designated verifier. This idea was developed to address the privacy concerns of the signature holder at the time of certificate distribution. They are appropriate for applications that demand the designer's secrecy. The fact that the designated verifier must generate a public key with regard to the signer's public parameter for signature verification is a significant drawback of UDVS methods. In cases where the verifier is unable to begin the key generation procedure, this constraint is inapplicable. Baek et al. developed the idea of "Universal Designated Verifier Signature Proof (UDVSP)", which does not require the verifier's public key for verification, to get around this restriction. All existing UDVSP constructions are based on a discrete logarithm problem, which is vulnerable to quantum computer attacks. As a result, an efficient quantum resistant UDVSP is built on a hard problem in coding theory, as suggested by NIST reports. The scheme's security against forgeability and impersonation attacks is examined using the random oracle model.
Citation: P. Thanalakshmi, N. Anbazhagan, Gyanendra Prasad Joshi, Eunmok Yang. A quantum resistant universal designated verifier signature proof[J]. AIMS Mathematics, 2023, 8(8): 18234-18250. doi: 10.3934/math.2023927
[1] | Zuliang Lu, Xiankui Wu, Fei Huang, Fei Cai, Chunjuan Hou, Yin Yang . Convergence and quasi-optimality based on an adaptive finite element method for the bilinear optimal control problem. AIMS Mathematics, 2021, 6(9): 9510-9535. doi: 10.3934/math.2021553 |
[2] | Zuliang Lu, Fei Cai, Ruixiang Xu, Chunjuan Hou, Xiankui Wu, Yin Yang . A posteriori error estimates of hp spectral element method for parabolic optimal control problems. AIMS Mathematics, 2022, 7(4): 5220-5240. doi: 10.3934/math.2022291 |
[3] | Xin Zhao, Xin Liu, Jian Li . Convergence analysis and error estimate of finite element method of a nonlinear fluid-structure interaction problem. AIMS Mathematics, 2020, 5(5): 5240-5260. doi: 10.3934/math.2020337 |
[4] | Zuliang Lu, Ruixiang Xu, Chunjuan Hou, Lu Xing . A priori error estimates of finite volume element method for bilinear parabolic optimal control problem. AIMS Mathematics, 2023, 8(8): 19374-19390. doi: 10.3934/math.2023988 |
[5] | Changling Xu, Hongbo Chen . A two-grid $ P_0^2 $-$ P_1 $ mixed finite element scheme for semilinear elliptic optimal control problems. AIMS Mathematics, 2022, 7(4): 6153-6172. doi: 10.3934/math.2022342 |
[6] | Tiantian Zhang, Wenwen Xu, Xindong Li, Yan Wang . Multipoint flux mixed finite element method for parabolic optimal control problems. AIMS Mathematics, 2022, 7(9): 17461-17474. doi: 10.3934/math.2022962 |
[7] | Yuelong Tang . Error estimates of mixed finite elements combined with Crank-Nicolson scheme for parabolic control problems. AIMS Mathematics, 2023, 8(5): 12506-12519. doi: 10.3934/math.2023628 |
[8] | Miao Xiao, Zhe Lin, Qian Jiang, Dingcheng Yang, Xiongfeng Deng . Neural network-based adaptive finite-time tracking control for multiple inputs uncertain nonlinear systems with positive odd integer powers and unknown multiple faults. AIMS Mathematics, 2025, 10(3): 4819-4841. doi: 10.3934/math.2025221 |
[9] | Jie Liu, Zhaojie Zhou . Finite element approximation of time fractional optimal control problem with integral state constraint. AIMS Mathematics, 2021, 6(1): 979-997. doi: 10.3934/math.2021059 |
[10] | Cagnur Corekli . The SIPG method of Dirichlet boundary optimal control problems with weakly imposed boundary conditions. AIMS Mathematics, 2022, 7(4): 6711-6742. doi: 10.3934/math.2022375 |
In order to ensure that only the designated person can verify the signer's signature on the message, Steinfeld et al. introduced the concept of Universal Designated Verifier Signature (UDVS), which enables a designator who has obtained a signature on a message from the signer to designate the signature to any desired designated verifier. This idea was developed to address the privacy concerns of the signature holder at the time of certificate distribution. They are appropriate for applications that demand the designer's secrecy. The fact that the designated verifier must generate a public key with regard to the signer's public parameter for signature verification is a significant drawback of UDVS methods. In cases where the verifier is unable to begin the key generation procedure, this constraint is inapplicable. Baek et al. developed the idea of "Universal Designated Verifier Signature Proof (UDVSP)", which does not require the verifier's public key for verification, to get around this restriction. All existing UDVSP constructions are based on a discrete logarithm problem, which is vulnerable to quantum computer attacks. As a result, an efficient quantum resistant UDVSP is built on a hard problem in coding theory, as suggested by NIST reports. The scheme's security against forgeability and impersonation attacks is examined using the random oracle model.
With the development of computer technology, the finite element method follows closely in the early 1960s. The research on the reliability and validity of finite element analysis promoted the development of the finite element method [3,4,5,25,27]. Applying finite element methods, the emergence of errors has captured the attention of scholars. One of the main sources of errors is the error caused by the discretisation of the model, while researchers dissect various aspects of finite element analysis. In addition, the generation of finite element mesh is also a concern for scholars. In the early conventional FEA, scholars usually used experience, intuition or even guesses to generate meshes to simple judge whether the approximation results are reasonable or not. If it is not reasonable, the grid needs to be redesigned whenever necessary for the efficiency of the analysis and the reliability of the results. Therefore, the emergence of the adaptive finite element method is because the computer, after checking the current conditions, decides whether the solution is accurate enough to meet the determination needs according to the error information obtained during the adjustment process.
To the best of our knowledge, the adaptive finite element method is a numerical method that can automatically adjust the algorithm to improve the process of solving [2]. An appropriate mesh can greatly reduce the errors arising from the discretisation of the finite element approximation process during the replication. According to the current situation, solutions of optimal control problems for nonlinear systems are usually not available. Besides the complexity and diversity of nonlinear equations, it is also very practical to use the adaptive finite element method for solving nonlinear equations.
Adaptive finite element methods have been widely and successfully applied in various linear optimal control problems, for example, Eriksson and Johnson proposed that the adaptive finite element algorithm produces a series of successively refined meshes in which the final mesh satisfies a given error tolerance [11]. Gaevaskaya and Hope et al. proposed an adaptive finite element method for a class of distributed optimal control problems with control constraints is analysed by applying the reliability and discrete local efficiency of the posterior estimator and the quasi-orthogonality property as basic tools [13]. Braess and Carstensen et al. Investigate the residual jump contributions of a standard explicit residual-based a posteriori error estimator for an adaptive finite element method [1]. Hu and Xu et al. performed research on the convergence and optimality of the adaptive nonconforming linear element method for the stokes problem [17].
However, a large number of literature show that the researches on adaptive finite element method for nonlinear optimal control problems have not reached its peak yet.
Recently, for instance, Wriggers and Scherf propose an adaptive finite element technique for nonlinear contact problems [29]. Eriksson and Johnson consider adaptive finite element methods for parabolic problems to a class of nonlinear scalar problems, the authors obtain posteriori error estimates and design corresponding adaptive algorithms [12]. Nowadays, the problem of nonlinear optimal control problems, similar to big data, is the focus of scholars worldwide. Hence it is worthy of investigating the adaptive finite element method for such nonlinear problems.
Many scholars have also studied the prior error estimates of the bilinear optimal control problem. For example, Yang, Demlow, and Dobrowolski et al. investigated the prior error estimates and superconvergence of optimal control problems for bilinear models and give the optimal L2-norm error estimates and the almost optimal L∞-norm estimates about the state and co-state variables [7,8,31]. Lu investigated a second-order parabolic bilinear optimal control problems and provided a priori error estimates for the finite element solutions of the state equations describing the system [24]. Shen and Yang et al. investigated a quadratic optimal control problem governed by a linear hyperbolic integro differential equation and its finite element approximation, a priori estimates have been carried out using the standard functional analysis techniques, and the existence and regularity of the solution are provided by using these estimates. At the same time, some scholars have analysed the posteriori error estimates of the finite element method for bilinear optimal control problems [15,26]. Lu, Chen, and Leng et al. discussed the discretisation of Raviart-Thomas mixed finite element for general bilinear optimal control problems, a posteriori error estimates are derived for both the coupled state and the control solutions [18,23]. Although bilinear optimal control problems are frequently met in applications, they are much more difficult to handle than linear or nonlinear cases. There is little work on nonlinear optimal control problems.
In this paper, we focus on nonlinear optimal control problem with integral control constraints where we deal with the control via adopting piecewise constant discetization while applying continuous piecewise linear discretization for the state and the co-state, respectively. Then a posteriori error estimates is gained. For the convergence and the quasi-optimality, we prove them relying on quasi-orthogonality and discrete local upper bound. Based on the mild assumption to the initial grids, we obtain the proof of convergence and quasi-optimality by means of the solution operator of nonlinear elliptic equations. Finally, some numerical simulations are provided support for our theoretical analysis.
Here are some notations will be used in this paper. Let Ω be a bounded Lipschitz domain in R2 and ∂Ω denote the boundary of Ω. We use the standard notation Wm,q(ω) with norm ‖⋅‖m,q,ω and seminorm |⋅|m,q,ω to express the standard Sobolev space for ω⊂Ω. Moreover, we will omit the subscription if ω=Ω. For q=2, we denote Wm,2(Ω) by Hm(Ω) and ‖⋅‖m=‖⋅‖m,2. Also for m=0 and q=2, we denote W0,2(ω)=L2(ω) and ‖⋅‖0,2,ω=‖⋅‖0,ω. Additionally, we observe that H10(Ω)={v∈H1(Ω):v=0 on ∂Ω}. Let Th0 be the initial partition of ˉΩ into disjoint triangles. By newest-vertex bisections for Th0, we can obtain a class T of conforming partitions. For Th,˜Th∈T, we use Th⊂˜Th to indicate that ˜Th is a refinement of Th and hT=|T|1/2, T is the partition diameter. In addition (⋅,⋅) denotes the L2 inner product. Beyond that, let C be a constant which independent of grids size, then we use A≈B to represent cA≤B≤CA.
The rest of the paper is organized as follows. In Section 2, we introduce the optimal control problem of our interest and obtain a posteriori error estimates. The relevant algorithms are introduced in Section 3. In Section 4, we use quasi-orthogonality and discrete local upper bounds to prove the convergence of the adaptive finite element method, as well as quasi-optimality in Section 5. We provide an adaptive finite element algorithm and some numerical simulations to verify our theoretical analysis in Section 6. Finally, we summarize the results of this paper and develop a plan for future work.
In this paper we mainly enter into meaningful discussions with the following nonlinear optimal control problem governed by nonlinear elliptic equations:
minu∈Uad{12‖y−yd‖20+α2‖u‖20},−Δy+ϕ(y)=f+u,in Ω,y=0,on ∂Ω, |
where y is the state variable, u is the control variable, f is a function of the control variable, α is a constant greater than zero, yd∈L2(Ω), Uad={v:v∈L2(Ω), ∫Ωv dx≥0} is a closed convex subset of U=L2(Ω) and ϕ(⋅)∈W2,∞(−R,R) for any R>0, ϕ′(y)∈L2(Ω) for any y∈H1(Ω), ϕ′≥0. Let V=H10(Ω), we give the weak formulation to deal with state equation, namely, find y∈V such that
a(y,v)+(ϕ(y),v)=(f+u,v),∀ v∈V, |
where
a(y,v)=∫Ω∇y⋅∇v dx. |
Then the nonlinear optimal control problem can be restated as follows
minu∈Uad{12‖y−yd‖20+α2‖u‖20}, | (2.1) |
a(y,v)+(ϕ(y),v)=(f+u,v),∀ v∈V. | (2.2) |
It is well known [14,20] that the nonlinear optimal control problem has at least one solution (y,u), and that if a pair (y,u) is the solution of the nonlinear optimal control problem, then there is a co-state p∈V such that the triplet (y,p,u) satisfies the following optimality conditions:
a(y,v)+(ϕ(y),v)=(f+u,v),∀ v∈V, | (2.3) |
a(q,p)+(ϕ′(y)p,q)=(y−yd,q),∀ q∈V, | (2.4) |
(αu+p,v−u)≥0,∀ v∈Uad. | (2.5) |
Due to coercivity of a(⋅,⋅), we define a linear operator S:L2(Ω)→H10(Ω) such that S(f+u)=y and let S∗ be the adjoint of S such that S∗(y−yd)=p where Vh is the continuous piecewise linear finite element space with respect to the partition Th∈T. For Th∈T, we define Uh as the piecewise constant finite element space with respect to Th. Let Uhad={vh∈Uh:∫Ωvhdx≥0}. Then we derive the standard finite element discretization for the nonlinear optimal control problem as follows:
minuh∈Uhad{12‖yh−yd‖20+α2‖uh‖20}, | (2.6) |
a(yh,v)+(ϕ(yh),v)=(f+uh,v),∀ v∈Vh. | (2.7) |
Similarly the nonlinear optimal control problem (2.6)–(2.7) has a solution (yh,uh), and that if a pair (yh,uh)∈Vh×Uh is the solution of (2.6)–(2.7), then there is a co-state ph∈Vh such that the triplet (yh,ph,uh) satisfies the following optimality conditions:
a(yh,v)+(ϕ(yh),v)=(f+uh,v),∀ v∈Vh, | (2.8) |
a(q,ph)+(ϕ′(yh)ph,q)=(yh−yd,q),∀ q∈Vh, | (2.9) |
(αuh+ph,vh−uh)≥0,∀ vh∈Uhad. | (2.10) |
Here we define some error indicators we largely and frequently use in this paper where η(⋅) are error indicators and osc(⋅) represent the data oscillations. For Th∈T, T∈Th, we define
η21,Th(ph,T)=h2T‖∇ph‖20,T,η22,Th(uh,yh,T)=h2T‖f+uh−ϕ(yh)‖20,T+hT‖[∇yh]⋅n‖20,∂T∖∂Ω,η23,Th(yh,ph,T)=h2T‖yh−yd−ϕ′(yh)ph‖20,T+hT‖[∇ph]⋅n‖20,∂T∖∂Ω,osc2Th(f,T)=h2T‖f−fT‖20,T,osc2Th(yh−yd,T)=h2T‖(yh−yd)−(yh−yd)T‖20,T, |
where uh∈Uhad, yh,ph∈Vh, and where fT is L2-projection of f onto piecewise constant space on T and fT=∫Tf|T|. For ω⊂Th, we have
η21,Th(ph,ω)=∑T∈ωη21,Th(ph,T),osc2Th(f,ω)=∑T∈ωosc2Th(f,T), |
by which η22,Th(uh,yh,ω), η23,Th(uh,yh,ω) and osc2Th(yh−yd,ω) can be denoted similarly.
Also, a reliable and effective a posteriori error estimates for the nonlinear optimal control problem (2.1)–(2.2) which is presented in next Theorem.
Theorem 2.1. For Th∈T, let (y,p,u) be the exactsolution of problem (2.3), (2.4) and (2.5) and (yh,ph,uh) be the solution of problem (2.8), (2.9) and (2.10) with respect to Th. Then thereexist constants c and C such that
‖u−uh‖20+‖y−yh‖21+‖p−ph‖21≤C(η21,Th(ph,Th)+η22,Th(uh,yh,Th)+η23,Th(yh,ph,Th)), | (2.11) |
and
c(η21,Th(ph,Th)+η22,Th(uh,yh,Th)+η23,Th(yh,ph,Th))≤‖u−uh‖20+‖y−yh‖21+‖p−ph‖21+osc2Th(f,Th)+osc2Th(yh−yd,Th). | (2.12) |
Proof. Step 1. We seek functions yh,ph∈V satisfying the following auxiliary problems
a(yh,v)+(ϕ(yh),v)=(f+uh,v),∀ v∈V, | (2.13) |
a(q,ph)+(ϕ′(yh)ph,q)=(yh−yd,q),∀ q∈V. | (2.14) |
It follows that
‖u−uh‖20≤C(αu,u−uh)−C(αuh,u−uh)≤−C(αuh,u−uh)=C(αuh,uh−u)+C(αuh−αuh,u−uh). |
With the help of the proof of Lemma 3.4 in [14] and the lemma 3.4 in [21], we have
(αuh,uh−u)=(αuh+ph,uh−u)≤C(∑T∈Th‖ph−πhph‖20,T+‖u−uh‖20)≤C(σ)η21,Th(ph,Th)+Cσ‖u−uh‖20, | (2.15) |
where η21,Th(ph,Th)=∑T∈Thη21,Th(ph,T), and
(αuh−αuh,u−uh)=(ph−ph,u−uh)≤C(σ)‖ph−ph‖20+Cσ‖u−uh‖20, | (2.16) |
where πh is the L2-projection operator onto piecewise constant space on Th, C(σ) is a universal constant, which depends on σ, σ is an arbitrary positive number, and C is a general universal constant, which can include C(σ). Obviously, from (2.15) and (2.16) there holds
‖u−uh‖20≤C(η21,Th(ph,Th)+‖ph−ph‖20). |
Let ey=yh−yh, and eyI=ˆπhey, where ˆπh is the average interpolation operator defined in Lemma 3.2 of [14], then we can obtain
c‖ey‖21≤(∇(yh−yh),∇ey)+(ϕ(yh)−ϕ(yh),ey)=(∇(yh−yh),∇(ey−eyI))+(ϕ(yh)−ϕ(yh),ey−eyI)=∑T∈Th∫T(f+uh−ϕ(yh))(ey−eyI)dx−∑T∈Th∫∂T([∇yh]⋅n)(ey−eyI)dx≤C(σ)∑T∈Thh2T∫T(f+uh−ϕ(yh))2dx+C(σ)∑∂T∖∂ΩhT∫([∇yh]⋅n)2dx+Cσ‖ey‖21=C(σ)η22,Th(uh,yh,Th)+Cσ‖ey‖21, |
where σ is an arbitrary positive number. The definition of η2 will be given later on. Then let σ=c2C, we have
‖yh−yh‖21≤Cη22,Th(uh,yh,Th). |
Similarly, let ep=ph−ph and epI be the average interpolation of ep, then we can get
c‖ep‖21≤(∇ep,∇(ph−ph))+((ϕ′(yh)(ph−ph),ep)=(∇ep,∇(ph−ph))+(ϕ′(yh)ph−ϕ′(yh)ph,ep)+((ϕ′(yh)−ϕ′(yh))ph,ep)=(∇(ep−epI),∇(ph−ph))+(ϕ′(yh)ph−ϕ′(yh)ph,ep−epI)+(∇epI,∇(ph−ph))+(ϕ′(yh)ph−ϕ′(yh)ph,epI)+((ϕ′(yh)−ϕ′(yh))ph,ep)=∑T∈Th∫T(yh−yd−ϕ′(yh)ph)(ep−epI)dx−∑∂T∖∂Ω∫∂T([∇ph]⋅n)(ep−epI)−(yh−yh,epI)+((ϕ′(yh)−ϕ′(yh))ph,ep)dx≤C(σ)∑T∈Thh2T∫T(yh−yd−ϕ′(yh)ph)2dx+C(σ)∑∂T∖∂ΩhT∫∂T([∇ph]⋅n)2dx+Cσ∑T∈Thh2T∫T|∇ep|2dx+C‖yh−yh‖0‖ep‖0+C‖ϕ′(yh)−ϕ′(yh)‖0‖ph‖0,4‖ep‖0,4≤C(σ)η23,Th(yh,ph,Th)+C(σ)‖yh−yh‖20+C(σ)‖ph‖21‖yh−yh‖20+Cσ‖ph−ph‖21)≤C(σ)η23,Th(yh,ph,Th)+C‖yh−yh‖20+Cσ‖ph−ph‖21, |
in which we apply the embedding theorem ‖v‖0,4≤C‖v‖1 (see [6]) and the property: ‖ph‖1≤C, C(σ)‖yh−yh‖20+C(σ)‖ph‖21‖yh−yh‖20≤C(σ)‖yh−yh‖20+C(σ)C‖yh−yh‖20≤C‖yh−yh‖20. The definition of η3 will be given later on. Absolutely, we can obtain
‖ph−ph‖21≤Cη23,Th(yh,ph,Th)+C‖yh−yh‖20. |
Hence we gain
‖ph−ph‖20≤C‖ph−ph‖21+C‖yh−yh‖21≤C(η22,Th(uh,yh,Th)+η23,Th(yh,ph,Th)). |
By the triangular inequality we obtain that
‖y−yh‖1≤‖y−yh‖1+‖yh−yh‖1≤C(‖u−uh‖0+‖yh−yh‖1),‖p−ph‖1≤‖p−ph‖1+‖ph−ph‖1≤C(‖y−yh‖1+‖ph−ph‖1). |
In connection with what we discussed above, we have
‖u−uh‖20+‖p−ph‖21+‖y−yh‖21≤C(η21,Th(ph,Th)+η22,Th(uh,yh,Th)+η23,Th(yh,ph,Th)). |
Step 2. Now we are in the position to get the lower bound. Consulting to the proof of Lemma 3.6 in [14] and Lemma 3.4 in [21], we conclude that
h2T‖∇ph‖20≈∑T∈Th‖ph−πhph‖20,T≤C(‖u−uh‖20+‖p−ph‖21). | (2.17) |
Proof. It is easily seen that
∑T∈Th‖ph−πhph‖20,T=∑T∈Th‖ph−πhph‖0,T‖ph−p+p−πhp+πhp−πhph‖0,T≤∑T∈Th‖ph−πhph‖0,T‖p−πhp‖+13∑T∈Th‖ph−πhph‖20,T+C‖ph−p‖21. |
Since u+p=max(0,ˉp)=const, hence
πh(u+p)=u+p, |
such that
∑T∈Th‖ph−πhph‖0,T‖p−πhp‖0,T=∑T∈Th‖ph−πhph‖0,T‖p+u−πh(p+u)+πhp−u‖0,T=∑T∈Th‖ph−πhph‖0,T‖πh(u−uh)−(u−uh)‖0,T≤13∑T∈Th‖ph−πhph‖20,T+C‖uh−u‖21. |
This completes the proof.
According to [28], we empoly the standard bubble function technique to estimate error indicators η2,Th(uh,yh,Th) and η3,Th(yh,ph,Th). Similar to Chapter 7.2 in [22], there exists polynomials wT∈H10(T) and w∂T∈H10(∂T∖∂Ω) such that
∫∂ThT([∇ph]⋅n)2dx=∫∂T([∇ph]⋅n)w∂Tdx, | (2.18) |
∫Th2T((yh−yd)T−ϕ′(yh)ph)2dx=∫T((yh−yd)T−ϕ′(yh)ph)wTdx, | (2.19) |
and apparently
‖w∂T‖21,∂T∖∂Ω≤C∫∂ThT([∇ph]⋅n)2dx, | (2.20) |
h−2T‖w∂T‖20,∂T∖∂Ω≤C∫∂ThT([∇ph]⋅n)2dx, | (2.21) |
‖wT‖21,T≤C∫hh2T((yh−yd)T−ϕ′(yh)ph)2dx, | (2.22) |
h−2T‖wT‖20,T≤C∫hh2T((yh−yd)T−ϕ′(yh)ph)2dx. | (2.23) |
By using the Schwarz inequality, it follows from (2.18), (2.20), and (2.21) that
∫∂ThT([∇ph]⋅n)2dx=∫∂T([∇ph]⋅n)w∂Tdx=∫∂T([∇ph]⋅n−[∇p]⋅n)w∂Tdx=∫∂T∇(ph−p)∇w∂Tdx+div(Δ(ph−p))w∂T=∫∂T∇(ph−p)∇w∂Tdx+∫∂T(y−yd)dx−ϕ′(y)p)w∂Tdx=∫∂T∇(ph−p)∇w∂Tdx+∫∂T(yh−yd−ϕ′(yh)ph)w∂Tdx+∫∂T((y−yd)−(yh−yd))w∂Tdx+∫∂T(ϕ′(y)p−ϕ′(yh)ph)w∂Tdx≤C(σ)‖ph−p‖21,∂T∖∂Ω+C(σ)‖y−yh‖20,∂T∖∂Ω+∫∂Tϕ′(y)(p−ph)w∂Tdx+∫∂T(ϕ′(y)−ϕ′(yh))phw∂Tdx+C(σ)∫∂T(yh−yd−ϕ′(yh)ph)2dx+Cσ(‖w∂T‖21,∂T∖∂Ω+h−2T‖w∂T‖20,∂T∖∂Ω)≤C(σ)‖ph−p‖21,∂T∖∂Ω+C(σ)‖y−yh‖20,∂T∖∂Ω+C(σ)‖ϕ′(y)‖20,∂T∖∂Ω‖(p−ph)‖20,∂T∖∂Ω+∫∂T˜ϕ″(yh)(y−yh)phw∂Tdx+C(σ)∫∂T(yh−yd−ϕ′(yh)ph)2dx+Cσ(‖w∂T‖21,∂T∖∂Ω+h−2T‖w∂T‖20,∂T∖∂Ω)≤C(σ)‖ph−p‖21,∂T∖∂Ω+C(σ)‖y−yh‖20,∂T∖∂Ω+C(σ)‖˜ϕ″(yh)‖20,∂T∖∂Ω‖y−yh‖20,∂T∖∂Ω‖ph‖20,∂T∖∂Ω+C(σ)∫∂T(yh−yd−ϕ′(yh)ph)2dx+Cσ(‖w∂T‖21,∂T∖∂Ω+h−2T‖w∂T‖20,∂T∖∂Ω)≤C(σ)‖ph−p‖21,∂T∖∂Ω+C(σ)‖y−yh‖20,∂T∖∂Ω+C(σ)∫∂T(yh−yd−ϕ′(yh)ph)2dx+Cσ∫∂ThT([∇ph]⋅n)2dx, |
where σ is an arbitrary positive number and ϕ(⋅)∈W2,∞(Ω) has been used. Then let σ=12C and we have
∫∂ThT([∇ph]⋅n)2dx≤C‖ph−p‖21,∂T∖∂Ω+C‖y−yh‖20,∂T∖∂Ω+C∫∂T(yh−yd−ϕ′(yh)ph)2dx. | (2.24) |
Next, it follows from (2.19), (2.22), and (2.23) that
∫Th2T((yh−yd)T−ϕ′(yh)ph)2dx=∫T((yh−yd)T−ϕ′(yh)ph)wTdx=∫T(yh−yd−ϕ′(yh)ph)wTdx+∫T((yh−yd)−(yh−yd)T)wTdx≤∫T(yh−yd−ϕ′(yh)ph−(y−yd)+ϕ′(y)p)wTdx+C(σ)∫Th2T((yh−yd)−(yh−yd)T)2dx+Cσh−2T‖wT‖20,T=−∫T∇(ph−p)∇wTdx+∫T((yh−yd)−(y−yd))wTdx+∫T(ϕ′(yh)ph−ϕ′(y)p)wTdx+C(σ)∫Th2T((yh−yd)−(yh−yd)T)2dx+Cσh−2T‖wT‖20,T≤C(σ)‖ph−p‖21,T+C(σ)‖(y−yd)−(yh−yd)‖20,T+∫Tϕ′(yh)(ph−p)wTdx+∫T(ϕ′(yh)−ϕ′(y))pwTdx+C(σ)∫Th2T((yh−yd)−(yh−yd)T)2dx+Cσ(‖wT‖21,T+h−2T‖wT‖20,T)≤C(σ)‖ph−p‖21,T+C(σ)‖y−yh‖20,T+C(σ)∫Th2T((yh−yd)−(yh−yd)T)2dx+C(σ)‖ϕ′(yh)‖20,T‖ph−p‖20+C(σ)‖˜ϕ″(y)‖20,T‖yh−y‖20,T‖p‖20,T+Cσ(‖wT‖21,T+h−2T‖wT‖20,T)≤C(σ)‖ph−p‖21,T+C(σ)‖y−yh‖20,T+C(σ)∫Th2T((yh−yd)−(yh−yd)T)2dx+Cσ∫Th2T((yh−yd)T−ϕ′(yh)ph)2dx, |
where ϕ(⋅)∈W2,∞(Ω) has been used. Absolutely, we can deduce that
∫Th2T((yh−yd)T−ϕ′(yh)ph)2dx≤C‖ph−p‖21,T+C‖y−yh‖20,T+C∫Th2T((yh−yd)−(yh−yd)T)2dx. |
Then we have
∫Th2T(yh−yd−ϕ′(yh)ph)2dx≤C∫Th2T((yh−yd)T−ϕ′(yh)ph)2dx+C∫Th2T((yh−yd)−(yh−yd)T)2dx≤C‖ph−p‖21,T+C‖y−yh‖20,T+C∫Th2T((yh−yd)−(yh−yd)T)2dx. | (2.25) |
In connection with (2.24) and (2.25) we are easy to gain
η23,Th(yh,ph,Th)=∑T∈Th∫Th2T(yh−yd−ϕ′(yh)ph)2dx+∑∂T∖∂Ω∫∂ThT([∇ph]⋅n)2dx≤C‖ph−p‖21+C‖y−yh‖20+C∑T∈Th∫Th2T((yh−yd)−(yh−yd)T)2dx≤C‖ph−p‖21+C‖y−yh‖21+Cosc2Th(yh−yd,Th). |
It can also be deduced that
η22,Th(uh,yh,Th)=∑T∈Th∫Th2T(f+uh−ϕ(yh))2dx+∑∂T∖∂Ω∫∂ThT([∇yh]⋅n)2dx≤C‖yh−y‖21+C‖u−uh‖20+C∑T∈Th∫Th2T(f−fT)2dx≤C‖yh−y‖21+C‖u−uh‖20+Cosc2Th(f,Th). |
Above-mentioned results tell the proof of Theorem 2.1 is accomplished.
In this section, we introduce two related algorithms as follows:
Algorithm 3.1. Adaptive finite element algorithm for nonlinear optimal controlproblems:
(0) Given an initial grids Th0 and construct finiteelement space Uh0ad and Vh0. Select marking parameter 0<θ≤1 and set k:=0.
(1) Solve the discrete nonlinear optimal control problem (2.8)–(2.10), then obtain approximate solution (uhk,yhk,phk) with respect to Thk.
(2) Compute the local error estimator ηThk(T) for all T∈Thk.
(3) Select a minimal subset Mhk of Thk such that
η2Thk(Mhk)≥θη2Thk(Thk), |
where η2Thk(ω)=η21,Th(ph,ω)+η22,Th(uh,yh,ω)+η23,Th(yh,ph,ω) for all ω⊂Thk.
(4) Refine Mhk by bisecting b≥1 times inpassing from Thk to Thk+1 andgenerally additional elements are refined in the process in order toensure that Thk+1 is conforming.
(5) Solve the discrete nonlinear optimal control problem (2.8)–(2.10), then obtain approximate solution (uhk+1,yhk+1,phk+1) with respect to Thk+1.
(6) Set k=k+1 and go to step (2).
Algorithm 3.2. Given an initial control u0h∈Uhad, then seek (ykh,pkh,ukh) such that
a(ykh,wh)+(ϕ(ykh),wh)=(f+uk−1h,wh),∀ wh∈Vh,a(qh,pk−1h)+(ϕ(ykh)pk−1h,qh)=(ykh−yd,qh),∀ qh∈Vh,(αukh+pk−1h,vh−ukh)≥0,∀ vkh∈Uhad, |
for k=1,2,⋯, and apparently
ukh=1α(−Phpkh+max(0,ˉpkh)), |
where Ph is the L2-projection from L2(Ω) to Uh and ˉpkh=∫Ωpkh|Ω|.
In this section we first consider the nonlinear elliptic equations as follows:
{−Δy+ϕ(y)=f,in Ω,y=0,on ∂Ω, | (4.1) |
where f∈L2(Ω). We introduce the quantity J(h) in view of the idea in [30] as follows:
J(h):=supf∈L2(Ω), ‖f‖0,Ω=1infvh∈vT‖S−vh‖1, |
where S is the solution operator for nonlinear elliptic equations. Obviously, J(h)≪1 for h∈(0,h0) if h0≪1. Hereinafter there holds the Lemma about the quantity referring to [10,30].
Lemma 4.1. For each f∈L2(Ω), there exists a constant C such that
‖Sf−Shf‖1≤CJ(h)‖f‖0, | (4.2) |
and
‖Sf−Shf‖0≤CJ(h)‖Sf−Shf‖1, | (4.3) |
where Sh is the discretesolution operator for nonlinear elliptic equations.
Here, Lemma 4.1 is a preparation for Lemma 4.4.
According to [19], the local perturbation property plays an important role for the proof of the convergence. It impels us to combine the sum of the error estimates.
Lemma 4.2. For Th∈T, T∈Th, let uh1,uh2∈Uhad, yh1,yh2,ph1,ph2∈Vh, we have
η1,Th(ph1,T)−η1,Th(ph2,T)≤ChT‖ph1−ph2‖1,T, | (4.4) |
η2,Th(uh1,yh1,T)−η2,Th(uh2,yh2,T)≤C(hT‖uh1−uh2‖0,T+‖yh1−yh2‖1,T), | (4.5) |
η3,Th(yh1,ph1,T)−η3,Th(yh2,ph2,T)≤C(hT‖yh1−yh2‖0,T+‖ph1−ph2‖1,T), | (4.6) |
oscTh(yh1−yd,T)−oscTh(yh2−yd,T)≤Ch2T‖yh1−yh2‖1,T. | (4.7) |
Proof. Step 1. According to [16,21] we have
‖v‖0,∂T∖∂Ω≤C(h−1/2T‖v‖0,T+h1/2T‖v‖1,T). | (4.8) |
By adopting the inverse estimates and (4.8) we obtain
‖[∇(yh1−yh2)]⋅n‖0,∂T∖∂Ω≤Ch−1/2T‖yh1−yh2‖1,ωT, | (4.9) |
‖[∇(ph1−ph2)]⋅n‖0,∂T∖∂Ω≤Ch−1/2T‖ph1−ph2‖1,ωT, | (4.10) |
where ωT denotes the patch of elements that share an edge with T. By the definition of η1,Th(ph,T) and (4.10) we can deduce that
η1,Th(ph1,T)≤η1,Th(ph2,T)+ChT‖[∇(ph1−ph2)]⋅n‖0,∂T∖∂Ω. |
Then we have
η1,Th(ph1,T)−η1,Th(ph2,T)≤ChT‖[∇(ph1−ph2)]⋅n‖0,∂T∖∂Ω≤ChT‖ph1−ph2‖1,T, |
where the proof of (4.4) is finished.
Step 2. By the definition of η2,Th(uh,yh,T) and (4.9), we can deduce that
η2,Th(uh1,yh1,T)−η2,Th(uh2,yh2,T)≤hT‖uh1−uh2‖0,T+h1/2T‖[∇(yh1−yh2)]⋅n‖0,∂T∖∂Ω+hT‖ϕ(yh1)−ϕ(yh2)‖0,T≤hT‖uh1−uh2‖0,T+C‖yh1−yh2‖1,ωT+ChT‖˜ϕ′(yh1)‖0,T‖yh1−yh2‖0,T≤C(hT‖uh1−uh2‖0,T+‖yh1−yh2‖1,T), |
where ϕ(⋅)∈W2,∞(Ω) has been used and the proof of (4.5) is finished.
Step 3. By the definition of η3,Th(yh,ph,T) and (4.10) we can derive that
η3,Th(yh1,ph1,T)−η3,Th(yh2,ph2,T)≤hT‖yh1−yh2‖0,T+h1/2T‖[∇(ph1−ph2)]⋅n‖0,∂T∖∂Ω+hT‖ϕ′(yh1)ph1−ϕ′(yh2)ph2‖0,T≤hT‖yh1−yh2‖0,T+C‖ph1−ph2‖1,ωT+hT‖ϕ′(yh1)‖0,T‖ph1−ph2‖0,T+hT‖˜ϕ″(yh1)‖0,T‖yh1−yh2‖0,T‖ph2‖0,T≤hT‖yh1−yh2‖0,T+C‖ph1−ph2‖1,ωT+ChT‖ph1−ph2‖0,T≤C(hT‖yh1−yh2‖0,T+‖ph1−ph2‖1,T), |
where ϕ(⋅)∈W2,∞(Ω) has been used and the proof of (4.6) is finished. \\Step 4. Similarly, we have
oscTh(yh1−yd,T)−oscTh(yh2−yd,T)≤h2T‖yh1−yh2‖0,T. |
In brief, Lemma 4.2 is proved.
The authors in [25] demonstrate an error reduction provided the current errors are larger than the desired errors, that is to say, the errors may not be reduced in the process of coarse grids refinement before introducing a node of the refined grids inside each marked element while D¨orfler proves a similar result assumption [9].
Lemma 4.3. Let Th⊂~Th for Th,~Th∈T.Mh⊂Th denotes the set of elements whichare marked from Th to ˜Th. Then for uh∈Uhad, ˜uh∈U˜had, yh,ph∈Vh, ˜yh,˜ph∈V˜h and any δ,δ1∈(0,1], we have
η21,˜Th(˜ph,~Th)−(1+δ1){η21,Th(ph,Th)−(1−2−1/2)η1,Th(ph,Rh)}≤C(1+δ−11)h20‖ph−˜ph‖21, | (4.11) |
and
η22,˜Th(˜uh,˜yh,˜Th)−(1+δ){η22,T(uh,yh,Th)−λη22,Th(uh,yh,Mh)}≤C(1+δ−1)(h20‖uh−˜uh‖20+‖yh−˜yh‖21), | (4.12) |
and
η23,˜Th(˜yh,˜ph,˜Th)−(1+δ){η23,Th(yh,ph,Th)−λη23,Th(uh,yh,Mh)}≤C(1+δ−1)(h20‖yh−˜yh‖20+‖ph−˜ph‖21), | (4.13) |
and
osc2Th(yh−yd,Th∩˜Th)−2osc2˜Th(˜yh−yd,Th∩˜Th)≤2Ch40‖yh−˜yh‖21, | (4.14) |
where λ=1−2−b2, h0=maxT∈Th0hT and Rh denotes the set ofelements which are refined from Th to ~Th.
Proof. Step 1. Applying the Young's inequality with parameter δ1 and (4.4) we get
η21,~Th(˜ph,~Th)−η21,~Th(ph,~Th)≤Ch20‖ph−˜ph‖21+2η1,~Th(˜ph,~Th)⋅η1,~Th(ph,~Th)≤C(1+δ−11)h20‖ph−˜ph‖21+δ1η21,~Th(ph,~Th). | (4.15) |
Note that T will be bisected at least one time for the element T∈Rh⊂Th, then we have
∑T′∈Tη1,~Th(ph,T′)≤2−1/2η1,Th(ph,T). |
For T∈Th∖Rh, we gain
η21,~Th(ph,T)=η21,Th(ph,T). |
In connection with the above estimates we demonstrate that
η21,˜Th(˜ph,~Th)−(1+δ1){η21,Th(ph,Th)−(1−2−1/2)η1,Th(ph,Rh)}=η21,~Th(ph,Rh)+η21,~Th(ph,Th∖Rh)−(1+δ1){η21,Th(ph,Th)−(1−2−1/2)η1,Th(ph,Rh)}≤2−1/2η21,~Th(ph,Rh)+η21,~Th(ph,Th∖Rh)−(1+δ1){η21,Th(ph,Th)−(1−2−1/2)η1,Th(ph,Rh)}≤C(1+δ−11)h20‖ph−˜ph‖21, |
which illustrates (4.11) has been proved.
Step 2. Employing the Young's inequality with parameter δ and (4.5) we obtain
η23,~Th(˜yh,˜ph,~Th)−η23,~Th(yh,ph,~Th)≤C(1+δ−1)h2T(∑T∈ThhT‖˜yh−yh‖20,T+‖˜ph−ph‖21)+δη23,~Th(yh,ph,~Th), |
where it is similar to (4.15). Then let ˜ThT′={T∈~Th:T⊂T′} where T′∈Mh is a marked element. For arbitrary ph∈VTh⊂V~Th, we find the jump [∇ph]=0 on the interior sides of ∪˜ThT′. Suppose b is the number of bisections, we can deduce that
hT=|T|1/2≤(2−b|T′|)1/2≤2−b2hT′, |
due to refinement by bisection, then we obtain
∑T∈~ThT′η23,~Th(yh,ph,T)≤2−b2η23,Th(yh,ph,T′). |
It is easy to find that
η23,~Th(yh,ph,T)≤η23,Th(yh,ph,T), |
for any T∈Th∖Mh. In connection with the above estimates we expound that
η23,~Th(yh,ph,~Th)=η23,~Th(yh,ph,Mh)+η23,~Th(yh,ph,Th∖Mh)≤2−b2η23,Th(yh,ph,Mh)+η23,Th(yh,ph,Th∖Mh)=η23,Th(yh,ph,Th)−(1−2−b2)η23,Th(yh,ph,Mh). |
As has been said, we can achieve (4.13) connecting with the above estimates to which the proof of (4.12) is similar.
Step 3. For arbitrary T∈Th∩~Th via using (4.7) and the Young's inequality we obtain that
oscTh(yh−yd,T)=osc~Th(yh−yd,T),osc2Th(yh−yd,T)−2osc2~Th(˜yh−yd,T)≤2Ch4T‖˜yh−yh‖21,T. |
Obviously, (4.14) can be got by summing the above inequality over T∈Th∩~Th. To sum up, Lemma 4.3 is proved.
As to the proof of the convergence, one of the main obstacle is that there do not have the orthogonality while it is vital to prove the convergence. Thus getting back to the second place we transfer proof of the quasi-orthogonality. The latter is popularly adopted in the adaptive mixed and the nonconforming adaptive finite element methods [19]. Apparently it is true for the following basic relationships with Thk,Thk+1∈T and Thk⊂Thk+1,
‖u−uhk+1‖20=‖u−uhk‖20−‖uhk−uhk+1‖20−2(u−uhk+1,uhk+1−uhk), | (4.16) |
‖y−yhk+1‖21=‖y−yhk‖21−‖yhk−yhk+1‖21−2a(y−yhk+1,yhk+1−yhk), | (4.17) |
‖p−phk+1‖21=‖p−phk‖21−‖phk−phk+1‖21−2a(p−phk+1,phk+1−phk), | (4.18) |
where (u,y,p) are the solution of (2.3)–(2.5), (uhk,yhk,phk) and (uhk+1,yhk+1,phk+1) are the solution of (2.8)–(2.10) with respect to Thk and Thk+1, respectively. Accordingly we have the quasi-orthogonality below.
Lemma 4.4. For Thk,Thk+1∈T and Thk⊂Thk+1, we have
(1−δ)‖u−uhk+1‖20−‖u−uhk‖20+‖uhk−uhk+1‖20≤Cδ−1(η21,Thk(phk,Rh)+J2(h0)(η22,Thk(uhk,yhk,Rh)+η23,Thk(yhk,phk,Rh))), | (4.19) |
and
(1−δ)‖y−yhk+1‖21−‖y−yhk‖21−‖yhk−yhk+1‖21−δ‖u−uhk+1‖20≤Cδ−1(η21,Thk(phk,Rh)+J2(h0)(η22,Thk(uhk,yhk,Rh)+η23,Thk(yhk,phk,Rh))), | (4.20) |
and
(1−δ)‖p−phk+1‖21−‖p−phk‖21+‖phk−phk+1‖21−δ‖y−yhk+1‖21≤Cδ−1(η21,Thk(phk,Rh)+J2(h0)(η22,Thk(uhk,yhk,Rh)+η23,Thk(yhk,phk,Rh))). | (4.21) |
Proof. Step 1. It follows from Lemma 4.3 in [19] that for Uhkad⊂Uhk+1ad we have
α‖uhk+1−uhk‖20≤(phk+1−phk,uhk−uhk+1)+(αuhk+phk,uhk−uhk+1)≤(S∗hk+1(Shk+1(f+uhk)−yd)−S∗hk(Shk(f+uhk)−yd),uhk−uhk+1)+Cη1,Thk(phk,Rh)‖uhk−uhk+1‖0, | (4.22) |
where Rh is the set of elements which are refined from Thk to Thk+1.
For the right-hand first item of (4.22) we let ζh∈H10(Ω) be the solution of the following problem based on Lemma 4.1
a(ζh,q)=(S∗hk+1(Shk+1(f+uhk)−yd)−S∗hk(Shk(f+uhk)−yd),q),∀ q∈H10(Ω). |
Hence we can get
‖S∗hk+1(Shk+1(f+uhk)−yd)−S∗hk(Shk(f+uhk)−yd)‖20=a(ζh,S∗hk+1(Shk+1(f+uhk)−yd)−S∗hk(Shk(f+uhk)−yd))=a(ζh−ζhk,S∗hk+1(Shk+1(f+uhk)−yd)−S∗hk(Shk(f+uhk)−yd))+(Shk+1(f+uhk)−Shk(f+uhk),ζhk−ζh)+(Shk+1(f+uhk)−Shk(f+uhk),ζh). |
From the proof of Lemma 3.3 in [19], we infer that
a(ζh−ζhk,S∗hk+1(Shk+1(f+uhk)−yd)−S∗hk(Shk(f+uhk)−yd))≤J(h0)‖S∗hk+1(Shk+1(f+uhk)−yd)−S∗hk(Shk(f+uhk)−yd)‖0⋅(‖Shk+1(f+uhk)−Shk(f+uhk)‖1+‖S∗hk+1(Shk(f+uhk)−yd)−S∗hk(Shk(f+uhk)−yd)‖1), |
and
(Shk+1(f+uhk)−Shk(f+uhk),ζhk−ζh)≤CJ(h0)‖Shk+1(f+uhk)−Shk(f+uhk)‖0⋅‖S∗hk+1(Shk(f+uhk)−yd)−S∗hk(Shk(f+uhk)−yd)‖0, |
and
(Shk+1(f+uhk)−Shk(f+uhk),ζ)≤‖Shk+1(f+uhk)−Shk(f+uhk)‖0⋅‖S∗hk+1(Shk(f+uhk)−yd)−S∗hk(Shk(f+uhk)−yd)‖0. |
Similar to Lemma 4.6 in [4], we derive that
‖Shk+1(f+uhk)−Shk(f+uhk)‖1≤Cη2,Thk(uhk,yhk,Rh),‖S∗hk+1(Shk(f+uhk)−yd)−S∗hk(Shk(f+uhk)−yd)‖1≤Cη3,Thk(yhk,phk,Rh). |
In connection with the above estimates we conclude that
‖S∗hk+1(Shk(f+uhk)−yd)−S∗hk(Shk(f+uhk)−yd)‖0≤C(J(h0)(η2,Thk(uhk,yhk,Rh)+η3,Thk(yhk,phk,Rh))+‖Shk+1(f+uhk)−Shk(f+uhk)‖0). |
For the third term at the right end of the above inequality, we let φh∈H10(Ω) be the solution of the following problem
a(q,φh)=(Shk+1(f+uhk)−Shk(f+uhk),q),∀ q∈H10(Ω). |
According to the standard duality theory, we can deduce that
‖Shk+1(f+uhk)−Shk(f+uhk)‖20=a(Shk+1(f+uhk)−Shk(f+uhk),φh−φhk)≤CJ(h0)‖Shk+1(f+uhk)−Shk(f+uhk)‖1⋅‖Shk+1(f+uhk)−Shk(f+uhk)‖0, |
where φhk is the standard finite element estimate of φh with respect to VThk. So we have
‖S∗hk+1(Shk(f+uhk)−yd)−S∗hk(Shk(f+uhk)−yd)‖0≤C(J(h0)(η2,Thk(uk,yk,Rh)+η3,Thk(yhk,phk,Rh))). |
As mentioned above, we can get
(phk+1−phk,uhk−uhk+1)≤C(J(h0)(η2,Thk(uhk,yhk,Rh)+η3,Thk(yhk,phk,Rh))‖uhk−uhk+1‖0). |
In combination with (4.22) and above inequality, we deduct that
‖uhk−uhk+1‖0≤C(η1,Thk(phk,Rh)+J(h0)(η2,Thk(uhk,yhk,Rh)+η3,Thk(yhk,phk,Rh))). | (4.23) |
It is easy to derive the desired result (4.19) with the help of (4.16) and (4.23).
Step 2. Our task now is to prove (4.20) and so is (4.21). Obviously we have
‖yhk+1−yhk‖0=‖Shk+1(f+uhk+1)−Shk(f+uhk)‖0≤‖Shk+1(f+uhk+1)−Shk+1(f+uhk)‖0+‖Shk+1(f+uhk)−Shhk(f+uhk)‖0≤C(‖uhk−uhk+1‖0+J(h0)η2,Thk(uhk,yhk,Rh)). | (4.24) |
By using the Cauchy inequality, we obtain
2a(y−yhk+1,yhk+1−yhk)=2(u−uhk+1,yhk+1−yhk)−2(ϕ(y)−ϕ(yhk+1),yhk+1−yhk)≤δ‖u−uhk+1‖20+1δ‖yhk+1−yhk‖20+(˜ϕ′(y)(y−yhk+1),yhk+1−yhk)≤δ‖u−uhk+1‖20+1δ‖yhk+1−yhk‖20+‖˜ϕ′(y)‖0‖y−yhk+1‖0‖yhk+1−yhk‖0≤δ‖u−uhk+1‖20+1δ‖yhk+1−yhk‖20+C(δ‖y−yhk+1‖20+1δ‖yhk+1−yhk‖20). | (4.25) |
It is easy to derive the desired result (4.20) with the assistance of (4.17) and (4.23)–(4.25).
For Thk∈T, we will denote Uhkad, Vhk and the solution (uhk,yhk,phk) of (2.8)–(2.10) with respect to Thk by Uhkad, Vhk, and (uhk,yhk,phk) and we define some notations before we prove the convergence of Algorithm 3.1 as follows:
e2hk=‖u−uhk‖20+‖y−yhk‖21+‖p−phk‖21,E2hk=‖uhk−uhk+1‖20+‖yhk−yhk+1‖21+‖phk−phk+1‖21,˜η2Thk(ω)=η22,Thk(uhk,yhk,ω)+η23,Thk(yhk,phk,ω), |
for ω⊂Ω.
Theorem 4.1. Let (Thk,Uhkad,Vhk,uhk,yhk,phk) be the sequence of grids, finite element spaces and discretesolutions produced by the Algorithm 3.1. Then there existconstants γ1>0, γ2>0 and α∈(0,1), onlydepending on the shape regularity of initial grids Th0, b, and the marking parameter θ∈(0,1], such that
e2hk+1+γ1η21,Thk+1(phk+1,Thk+1)+γ2˜η2Thk+1(Thk+1)≤α(e2hk+γ1η21,Thk(phk,Thk)+γ2˜η2Thk(Thk)), | (4.26) |
provided h0≪1.
Proof. We get the following results from Theorem 2.1, Lemma 4.3 and Lemma 4.4,
e2hk≤Cη2Thk(Thk), | (4.27) |
˜η2Thk+1(Thk+1)≤(1+δ){˜η2Thk(Thk)−λ˜η2Thk(Mhk)}+C(1+1δ)E2hk, | (4.28) |
η21,Thk+1(phk+1,Thk+1)≤(1+δ1){η21,Thk(phk,Thk)−(1−2−1/2)η21,Thk(phk,Rhk)}+C(1+1δ1)h20‖phk−phk+1‖21, | (4.29) |
(1−2δ)e2hk+1≤e2hk−E2hk+C1δ(η21,Thk(phk,Rhk)+J(h0)˜η2Thk(Thk)), | (4.30) |
where Rhk is the set of elements which are refined from Thk to Thk+1. Applying the upper bound in Theorem 2.1, (4.29) can be simplified into
η21,Thk+1(phk+1,Thk+1)≤(1+δ1){η21,Thk(phk,Thk)−(1−2−1/2)η21,Thk(phk,Rhk)}+C(1+1δ1)h20(η21,Thk+1(phk+1,Thk+1)+˜η2Thk+1(Thk+1)+η21,Thk(phk,Thk)+˜η2Thk(Thk)). | (4.31) |
Multiplying (4.28) and (4.31) with ~γ2 and ~γ1, respectively, and adding the results to (4.30) yields
(1−2δ)e2hk+1+~γ1η21,Thk+1(phk+1,Thk+1)+~γ2˜η2Thk+1(Thk+1)≤e2hk+~γ2(1+δ){˜η2Thk(Thk)−λ˜η2Thk(Mhk)}+~γ2C(1+1δ)E2hk−E2hk−(~γ1(1+δ1)(1−2−1/2)−C1δ)η21,Thk(phk,Rhk)+~γ1(1+δ1)η21,Thk(phk,Thk)+C1δJ2(h0)˜η2Thk(Thk)+~γ1C(1+1δ1)h20(η21,Thk+1(phk+1,Thk+1)+˜η2Thk+1(Thk+1)+η21,Thk(phk,Thk)+˜η2Thk(Thk)). |
If ~γ1 is such that
~γ1(1+δ1)(1−2−1/2)−C1δ>0, |
and one chooses ~γ2 such that
~γ2C(1+1δ)=1, | (4.32) |
then we have
(1−2δ)e2hk+1+~γ1(1−C(1+1δ1)h20)η21,Thk+1(phk+1,Thk+1)+(~γ2−~γ1C(1+1δ1)h20)˜η2Thk+1(Thk+1)≤e2hk+~γ1((1+δ1)+C(1+1δ1)h20)η21,Thk(phk,Thk)+(~γ2(1+δ)+~γ1C(1+1δ1)h20+C1δJ2(h0))˜η2Thk(Thk)−c(η21,Thk(phk,Mhk)+˜η2Thk(Mhk)), |
where
c=min{~γ2(1+δ)λ,~γ1(1+δ1)(1−2−1/2)−C1δ}. |
By using the marking strategy in Algorithm 3.1 and the upper bound in Theorem 2.1 to arrive at
(1−2δ)e2hk+1+~γ1(1−C(1+1δ1)h20)η21,Thk+1(phk+1,Thk+1)+(~γ2−~γ1C(1+1δ1)h20)˜η2Thk+1(Thk+1)≤(1−Cθβ)e2hk+(~γ1((1+δ1)+C(1+1δ1)h20)−cθ(1−β))η1,Thk(phk,Thk)+(~γ2(1+δ)+~γ1C(1+1δ1)h20+C1δJ2(h0)−cθ(1−β))˜ηThk(Thk), |
where β∈(0,1). Then we deduce that
e2hk+1+γ1η21,Thk+1(phk+1,Thk+1)+γ2˜η2Thk+1(Thk+1)≤α1e2hk+α2γ1η21,Thk(phk,Thk)+α3γ2˜η2Thk(Thk), |
where
α1=1−Cθβ1−2δ,γ1=~γ1(1−C(1+δ−11)h20)1−2δ,γ2=~γ2−~γ1C(1+δ−11)h201−2δ,α2=~γ1((1+δ1)+C(1+δ−11)h20)−cθ(1−β)~γ1(1−C(1+δ−11)h20),α3=~γ2(1+δ)+~γ1C(1+δ−11)h20+Cδ−1J2(h0)−cθ(1−β)~γ2−~γ1C(1+δ−11)h20. |
As long as δ<1 and β is small enough, α1∈(0,1) can be guaranteed. To facilitate judgment, we transfer the following adjustments to the above formula:
α2=(1−C(1+δ−11)h20)+δ1+2C(1+δ−11)h20−cθ(1−β)~γ11−C(1+δ−11)h20,α3=~γ2(1+δ)−~γ1C(1+δ−11)h20+2~γ1C(1+δ−11)h20+Cδ−1J2(h0)−cθ(1−β)~γ2−~γ1C(1+δ−11)h20. |
It is absolutely clear that
α2∈(0,1), |
if h0≪1 and δ1 is sufficiently small. Then consider (4.32) to deduce that
γ2=δ2C(1+δ), |
which can say
α3∈(0,1), |
if h0≪1 and δ is sufficiently small. Therefore if choose α=max{α1,α2,α3}, we can derive the expected results.
Theorem 4.2. Let (Thk,Uhkad,Vhk,uhk,yhk,phk) be the sequence of grids, finite element spaces and discretesolutions produced by the Algorithm 3.1 and the conditionsof Theorem 4.1 keep. Then we have
‖u−uhk‖20+‖y−yhk‖21+‖p−phk‖21→0ask→∞. |
Proof. It is obviously true combining Theorem 2.1 and Theorem 4.1.
In this section we consider the quasi-optimality for the adaptive finite element method. Firstly we give the notations interpretation. For Th,Th1,Th2∈T, let #Th be the number of elements in Th, and Th1⊕Th2 be the smallest common conforming refinement of Th1 and Th2 and satisfies [4,27]
#(Th1⊕Th2)≤#Th1+#Th2−#Th0. | (5.1) |
According to [19], we need defining a function approximation class
As:={(u,y,p,yd,f)∈L2(Ω)×H10(Ω)×H10(Ω)×L2(Ω)×L2(Ω):|(u,y,p,yd,f)|s<+∞}, |
where
|(u,y,p,yd,f)|s:=supN>0NsinfTh∈TNinf(uh,yh,ph)∈Uhad×Vh×Vh{‖u−uh‖20+‖y−yh‖21+‖p−ph‖21+osc2Th(f,Th))+osc2Th(yh−yd,Th)}12, |
and
TN:={Th∈T:#Th−#Th0≤N0}. |
To illustrate the quasi-optimality of the adaptive finite element method, we need a local upper bound on the distance between nested solutions [4], since the error of this method can only be estimated by using the indicators of refined elements without a buffer layer.
Lemma 5.1. For Th,˜Th∈T and Th⊂˜Th, let Rh bethe set of refined elements from Th to ˜Th. Let (uh,yh,ph) and (˜u,˜y,˜p) be the solutions of (2.8)–(2.10) with respect to Th and ˜Th, respectively. Then there exists a constant C, depending on the shape regularity of initial grids Th0 and b such that
‖uh−˜u‖20+‖yh−˜y‖21+‖ph−˜p‖21≤Cη2Th(Rh), | (5.2) |
where
η2Th(Rh)=η21,Th(ph,Rh)+η22,Th(uh,yh,Rh)+η23,Th(yh,ph,Rh). |
Proof. From (4.23) of Lemma 4.4, we have
‖uh−˜u‖20≤η2Th(Rh). | (5.3) |
By Lemma 4.6 in [4], we deduce that
‖yh−˜y‖1=‖Sh(f+uh)−S˜h(f+˜u)‖1≤‖Sh(f+uh)−S˜h(f+uh)‖1+‖S˜h(f+uh)−S˜h(f+˜u)‖1≤C(η2,Th(uh,yh,Rh)+‖uh−˜u‖0). | (5.4) |
The corresponding result is attained by the similar method above
‖ph−˜p‖1=‖S∗h(Sh(f+uh)−yd)−S∗˜h(S˜h(f+˜u)−yd)‖1 ≤C(η3,Th(yh,ph,Rh)+‖yh−˜y‖1). | (5.5) |
In connection with (5.3), (5.4) and (5.5) we can derive (5.2).
Dörfler introduced a crucial marking and proved strict energy error reduction for the Laplacian provided the initial grids Th0 satisfying a mild assumption [9]. If the sum of errors satisfy suitable error reductions, the error indicators on the coarse grids must satisfy a Dörfler property on the refined one [19].
Lemma 5.2. Assume that the marking parameter θ∈(0,θ∗), where
θ∗=C2C(1+h40)+1. |
For Th,˜Th∈T and Th⊂˜Th, let (uh,yh,ph) and (˜u,˜y,˜p) be thesolutions of (2.8)–(2.10) with respect to Th and ˜Th, respectively. If
e2˜Th+osc2˜Th(˜Th)≤μ[e2Th+osc2Th(Th)], | (5.6) |
is satisfied for μ:=12(1−θθ∗). Then, the set Rh of elements which are refined from Th to ˜Th satisfies the Dörfler property
η2Th(Rh)≥θη2Th(Th), |
where
e2Th=‖u−uh‖20+‖y−yh‖21+‖p−ph‖21,osc2Th(ω)=osc2Th(f,ω)+osc2Th(yh−yd,ω), |
for ω⊂Th and e2˜Th, osc2˜Th(˜Th) similarly defined.
Proof. By the lower bound in Theorem 2.1 and (5.6) to obtain that
(1−2μ)Cη2Th(Th)≤(1−2μ)(e2Th+osc2Th(Th))≤e2Th−2e2˜Th+osc2Th(Th)−2osc2˜Th(˜Th). |
It is well-known that there exists the fundamental relationships:
‖u−uh‖20≤2‖u−˜u‖20+2‖uh−˜u‖20,‖y−yh‖21≤2‖y−˜y‖21+2‖yh−˜y‖21,‖p−ph‖21≤2‖p−˜p‖21+2‖ph−˜p‖21. |
Hence we can get the following result form Lemma 5.1
e2Th−2e2˜Th≤2Cη2Th(Rh). | (5.7) |
For T∈Th∩˜Th, we can get the following result from (4.14) of Lemma 4.3
osc2Th(yh−yd,Th∩˜Th)−2osc2˜Th(˜y−yd,Th∩˜Th)≤2C(h40η2Th(Rh)). | (5.8) |
According to Remark 2.1 in [4], we get the following result as the indicator ηTh(T) dominates oscillation oscTh(T)
osc2Th(T)≤η2Th(T), | (5.9) |
for all T∈Rh. Then in connection with (5.7), (5.8) and (5.9) one obtains
(1−2μ)Cη2Th(Th)≤(2C(1+h40)+1)η2Th(Rh),(1−2μ)θ∗η2Th(Th)≤η2Th(Rh),θη2Th(Th)≤η2Th(Rh), |
where
θ∗=C2C(1+h40)+1,andθ=(1−2μ)θ∗. |
Lemma 5.3. Let (u,y,p) and (Thk,Uhkad,Vhk,uhk,yhk,phk) be the solution of (2.3)–(2.5) and the sequence ofgrids, finite element spaces and discrete solutions produced by Algorithm 3.1, respectively. Assume that the markingparameter θ satisfies the condition in Lemma 5.2, then the following estimate is valid
#Mhk≤C(N12s|(u,y,p,yd,f)|1ssμ−12s(e2hk+osc2Thk(Thk))−12s), | (5.10) |
if (u,y,p,yd,f)∈As.
Proof. Let ϵ2:=μN−1(e2Tk+osc2Tk(Tk)), where N shall be produced in the proof of (5.13) and μ is defined in Lemma 5.2. Because of (u,y,p,yd,f)∈As, there exists a Thϵ∈T and a (uhϵ,yhϵ,phϵ)∈Uhϵad×Vhϵ×Vhϵ such that
#Thϵ−#Th0≤|(u,y,p,yd,f)|1/ss∈ϵ−1/s, | (5.11) |
and
‖u−uhϵ‖20+‖y−yhϵ‖21+‖p−phϵ‖21+osc2Thϵ(f,Thϵ)+osc2Thϵ(yhϵ−yd,Thϵ)≤ϵ2. | (5.12) |
Let (uh∗,yh∗,ph∗) be the solution of (2.8)–(2.10) with respect to Th∗, where Th∗=Thϵ⊕Thk is the smallest common refinement of Thϵ and Thk. In the following we will prove the following inequality firstly
e2h∗+osc2Th∗(Th∗)≤N(e2Thϵ+osc2Thϵ(Thϵ)), | (5.13) |
where
e2Thϵ:=‖u−uhϵ‖20+‖y−yhϵ‖21+‖p−phϵ‖21,osc2Thϵ(Thϵ):=osc2Thϵ(f,Thϵ)+osc2Thϵ(yhϵ−yd,Thϵ). |
According to the principle of adding one item and subtracting one item, then we have
‖u−uhϵ‖20=‖u−uh∗‖20+‖uhϵ−uh∗‖20+2(u−uh∗,uh∗−uhϵ),‖y−yhϵ‖21=‖y−yh∗‖21+‖yhϵ−yh∗‖21+2a(y−yh∗,yh∗−yhϵ),‖p−phϵ‖21=‖p−ph∗‖21+‖phϵ−ph∗‖21+2a(p−ph∗,ph∗−phϵ). |
With the help of the Young's inequality one obtains
(u−uh∗,uh∗−uhϵ)=(u−uhϵ,uh∗−uhϵ)−(uh∗−uhϵ,uh∗−uhϵ)≤(u−uhϵ,uh∗−uhϵ)≤‖u−uhϵ‖20+14‖uh∗−uhϵ‖20, |
and so are a(y−yh∗,yh∗−yhϵ) and a(p−ph∗,ph∗−phϵ). Hence in connection with what we get above we deduce that
‖u−uh∗‖20+‖uh∗−uhϵ‖20+‖y−yh∗‖2a+‖yh∗−yhϵ‖21+‖p−ph∗‖21+‖ph∗−phϵ‖21≤6(‖u−uhϵ‖20+‖y−yhϵ‖21+‖p−phϵ‖21). | (5.14) |
From Remark 2.1 in [4] and (4.14) in Lemma 4.3 with Th=˜Th=Th∗, y=yh∗ and ˜y=yhϵ, we obtain that
osc2Th∗(yh∗−yd,Th∗)−2osc2Thϵ(yhϵ−yd,Thϵ)≤osc2Th∗(yh∗−yd,Th∗)−2osc2Th∗(yhϵ−yd,Th∗)≤2Nh40‖yh∗−yhϵ‖21. | (5.15) |
For any T′∈Thϵ, let ThT′:={T∈Th∗:T∈T′}. From the proof of Lemma 4.3 in [19], we derive that
∑T∈ThT′‖f−fT‖20,T≤N‖f−fT′‖20,T′. |
And then we can get
osc2T∗(f,T∗)≤N(osc2Tϵ(f,Tϵ)). | (5.16) |
Combining (5.14)–(5.16) to obtain (5.13) and using (5.12) and the definition of ϵ2, we have
e2h∗+osc2Th∗(Th∗)≤N(e2Thϵ+osc2Thϵ(Thϵ))≤Nϵ2=μ(e2hk+osc2Thk(Thk)). |
It is true for the following result from Lemma 5.2
#Mhk≤#Rh≤#Th∗−#Thk≤#Thϵ−#Th0. | (5.17) |
Combining (5.11), (5.17) and the definition of ϵ2 to derive the desired result (5.10).
The following consequence is the result of previous estimates where the truth is that the number of elements is a dwindle for the errors. Namely, if a given adaptive method is used to approximate the exact solution at a certain convergence rate, the iteratively constructed grids sequence will achieve this rate until a constant factor.
Theorem 5.1. Let (u,y,p) and (Thk,Uhkad,Vhk,uhk,yhk,phk) be the solution of (2.3)–(2.5) and the sequence ofgrids, finite element spaces and discrete solutions produced by Algorithm 3.1, respectively. Assume that Th0 satisfies the condition (b) of Section 4 in [27]. Let (u,y,p,yd,f)∈As, then we have
#Thk−#Th0≤C|(u,y,p,yd,f)|1ss(e2hk+osc2Thk(Thk))−12s, | (5.18) |
provided h0≪1.
Proof. It follows from Theorem 2.1 and Lemma 5.3 that
e2hk+γ1η21,Thk(phk,Thk)+γ2˜ηThk(Thk)≈e2hk+osc2Thk(Thk). | (5.19) |
From Lemma 2.3 in [4], we have
#Thk−#Th0≤Ck−1∑i=0Mhi. | (5.20) |
With the assistance of Lemma 5.3 and (5.20) to gain
#Thk−#Th0≤Ck−1∑i=0Mhi≤C(Mk−1∑i=0(e2hk+osc2Thk(Thk))−12s), | (5.21) |
where
M=N12s|(u,y,p,yd,f)|1ssα−12s. |
Then it follows from (5.19), (5.21) and Theorem 4.1 that
#Thk−#Th0≤C(M(e2hk+osc2Thk(Thk))−12sk∑i=1α−12s)≤C|(u,y,p,yd,f)|1ss(e2hk+osc2Thk(Thk))−12s, |
which tells the proof of Theorem 5.1.
In this section, we firstly present an adaptive finite element and then give the adaptive iteration method where the purpose is to provide empirical analysis for our theory.
Example 1. We consider the nonlinear optimal control problem governed by nonlinear elliptic equations subject to the state equation
−Δy+y3=f+u,−Δp+3y2p=y−yd, |
where we choose α=1 and Ω=[0,1]×[0,1] and apparently exact solution
u=1α(max(0,ˉp)−p),y=sin(πx1)+sin(πx2),p=−y. |
By simple calculation we have ∫Ωpdx=−4π which satisfies u∈Uad.
We choose 15 adaptive loops for Example 1, then we plot the profiles of the exact state and the numerical state on adaptively refined grids with θ=0.5 in Figure 1. It is easy to see that the solution is smooth, but we can find larger gradients in some regions, hence comparing with uniform refinement, adaptive finite element method can provide smaller error. In Figure 2, we provide the triangle refined grids after 6 and 12 adaptive iterations of Algorithm 3.1.
In Figure 3, we plot the convergence history for the errors where the left is adaptive refinement (θ=0.5) and the right is uniform refinement (θ=1). We can find it very intuitively when we provide the optimal convergence rate slope −1 via adopting the linear finite elements, the error reduction can be observed.
Example 2. We consider the same nonlinear optimal control problem as Example 1 with α=0.1, Ω=(−1,1)×(0,1)∪(−1,0)×(−1,0] and apparently exact solution
p={−5×1010e1m,m<0,0,m≥0,y=−p,m=(x1−0.2)2+(x2−0.6)2−0.04, |
where u∈Uad can be guaranteed.
Comparing with Example 1, we provide some plots concerning with 21 adaptive loops for Example 2 with θ=0.5. In Figure 4, it is more easy to say that the solution is smooth while the large gradients can be found in some regions illustrating that adaptive refinement can obtain smaller errors than the uniformly refinement where we offer the error estimate graphs to explain. In Figure 5, the left plot tells us the error estimates on adaptive refinement (θ=0.5) and the right shows the error estimates on uniform refinement (θ=1). With the slope −1 being the optimal convergence rate expected, we see the error reduction from Figure 5. Meanwhile we can also find that the convergence order of the total-error and the error estimate indicators are approaching to straight line slope −1 in which they are roughly parallel where it is showed that the posteriori error estimates we obtained in Section 2 are reliable.
In Figure 6, we show the adaptive grids after 9 and 19 adaptive iterations for Example 2 of 21 adaptive loops with θ=0.5. We can find that the grids are concentrated on the regions where the solutions have larger gradients. Only can we note that reduced orders are observed for the uniform refinement because of the singularity of the solutions.
In this paper, we first study the adaptive finite element method for nonlinear optimal control problems and give the corresponding adaptive algorithm. To evaluate the adaptive finite element method, we obtain the a posteriori error estimates for the nonlinear elliptic equations with upper and lower bound convergence and optimality, which are also important indicators for evaluating the algorithms. Therefore, we prove that the sum of the posterior errors of the control, state and covariance variables are convergent, as shown in Theorem 4.2. Based on the local upper bound, we prove the quasi-optimality of the proposed adaptive algorithm, see Section 5. To verify our theoretical analysis, we finally provide some numerical simulations. In previous research papers, the finite element methods for linear optimal control problems were studied. Our innovation is to extend the method of linear optimal control problems to a series of nonlinear optimal control problems.
There are a lot of problems which can not be tackled, such as the L2−L2 posteriori error estimates for nonlinear elliptic equations as well as the convergence and quasi-optimality for nonlinear parabolic equations. Furthermore, we note that the analysis in this paper can be generalized to common nonlinear parabolic problems and boundary problems, and we will work on these problems.
This work is supported by National Science Foundation of China (11201510), National Social Science Fund of China (19BGL190), Chongqing Research Program of Basic Research and Frontier Technology (cstc2019jcyj-msxmX0280), General project of Chongqing Natural Science Foundation (cstc2021jcyj-msxmX0949), Scientific and Technological Research Program of Chongqing Municipal Education Commission (KJZD-K20200120), Chongqing Key Laboratory of Water Environment Evolution and Pollution Control in Three Gorges Reservoir Area (WEPKL2018YB-04), Science and technology research project of Chongqing Education Commission (KJQN202101212), Research Center for Sustainable Development of Three Gorges Reservoir Area (2019sxxyjd07), Guangdong Basic and Applied Basic Research Foundation of Joint Fund Project (2021A1515111048), and Guangdong Province Characteristic Innovation Project (2021WTSCX120).
The authors declare that they have no competing interests.
[1] | R. Steinfeld, L. Bull, H. Wang, J. Pieprzyk, International conference on the theory and application of cryptology and information security, In: Advances in cryptology-asiacrypt 2003, Heidelberg: Springer, 2003,523–542. https://doi.org/10.1007/978-3-540-40061-5_33 |
[2] | J. Baek, R. Safavi-Naini, W. Susilo, International conference on the theory and application of cryptology and information security, In: Advances in cryptology-asiacrypt 2003, Heidelberg: Springer, 2005,644–661. https://doi.org/10.1007/11593447_35 |
[3] | R. Steinfeld, H. Wang, J. Pieprzyk, Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signatures, In: Public key cryptography-PKC 2004, Heidelberg: Springer, 2004, 86–100. https://doi.org/10.1007/b95631 |
[4] | R. Zhang, J. Furukawa, H. Imai, Short signature and universal designated verifier signature without random oracles, In: Applied cryptography and network security, Heidelberg: Springer, 2005,483–498. https://doi.org/10.1007/b137093 |
[5] |
M. Yang, X. Q. Shen, Y. M. Wang, Certificateless universal designated verifier signature schemes, The Journal of China Universities of Posts and Telecommunications, 14 (2007), 85–90. https://doi.org/10.1016/S1005-8885(07)60154-X doi: 10.1016/S1005-8885(07)60154-X
![]() |
[6] |
X. Chen, G. Chen, F. Zhang, B. Wei, Y. Mu, Identity-based universal designated verifier signature proof system, International Journal of Network Security, 8 (2009), 52–58. https://doi.org/10.1007/11596042_85 doi: 10.1007/11596042_85
![]() |
[7] |
P. W. Shor, Polynomial-time algorithms for prime factorization and discrete logarithms on quantum computer, SIAM Rev., 41 (1999), 303–332. https://doi.org/10.1137/S0036144598347011 doi: 10.1137/S0036144598347011
![]() |
[8] | J. Li, N. Qian, Y. Zhang, X. Huang, An efficient certificate-based designated verifier signature scheme, Comput. Informatics, 35 (2016), 1210–1230. |
[9] |
P. Rastegari, M. Berenjkoub, M. Dakhilalian, W. Susilo, Universal designated verifier signature scheme with non-delegatability in the standard model, Inform. Sciences, 419 (2019), 321–334. https://doi.org/10.1016/j.ins.2018.12.020 doi: 10.1016/j.ins.2018.12.020
![]() |
[10] | D. Gottesman, I. Chuang, Quantum digital signatures, arXiv: quant-ph/0105032. |
[11] |
M. Zheng, K. Xue, S. Li, N. Yu, A practical quantum designated verifier signature scheme for E-voting applications, Quantum Inf. Process., 20 (2021), 230. https://doi.org/10.1007/s11128-021-03162-5 doi: 10.1007/s11128-021-03162-5
![]() |
[12] |
X. Xin, L. Ding, C. Li, Y. Sang, Q. Yang, F. Li, Quantum public-key designated verifier signature, Quantum Inf. Process., 21 (2022), 33. https://doi.org/10.1007/s11128-021-03387-4 doi: 10.1007/s11128-021-03387-4
![]() |
[13] |
P. Thanalakshmi, R. Anitha, N. Anbazhagan, W. Cho, G. P. Joshi, E. Yang, A hash-based quantum-resistant chameleon signature scheme, Sensors, 21 (2021), 8417. https://doi.org/10.3390/s21248417 doi: 10.3390/s21248417
![]() |
[14] |
P. Thanalakshmi, R. Anitha, N. Anbazhagan, C. Park, G. P. Joshi, C. Seo, A hash-based quantum-resistant designated verifier signature scheme, Mathematics, 10 (2022), 1642. https://doi.org/10.3390/math10101642 doi: 10.3390/math10101642
![]() |
[15] | P. L. Cayrel, P. Gaborit, M. Girault, Identity-based identification and signature schemes using correcting codes, International Workshop on Coding and Cryptography (IWCC), Fujian, China, 2007, 69–78. |
[16] | D. Zheng, X. Li, K. Chen, Code-based ring signature scheme, Int. J. Netw. Secur., 5 (2004), 154–157. |
[17] | R. Overbeck, A step towards QC blind signatures, IACR Cryptol. ePrint Arch., 2009 (2009), 102. |
[18] | D. S. Wong, K. Fung, J. K. Liu, V. K. Wei, On the RS-code construction of ring signature schemes and a threshold setting of RST, In: International conference on information and communications security, Heidelberg: Springer, 2003, 34–46. https://doi.org/10.1007/978-3-540-39927-8_4 |
[19] | L. Dallot, D. Vergnaud, Provably secure code-based threshold ring signatures, In: IMA international conference on cryptography and coding, Heidelberg: Springer, 2009,222–235. https://doi.org/10.1007/978-3-642-10868-6_13 |
[20] |
P. S. Barreto, R. Misoczki, J. M. A. Simplicio, One-time signature scheme from syndrome decoding over generic error-correcting codes, J. Syst. Software, 84 (2011), 198–204. https://doi.org/10.1016/j.jss.2010.09.016 doi: 10.1016/j.jss.2010.09.016
![]() |
[21] | K. P. Mathew, S. Vasant, C. P. Rangan, A provably secure signature and signcryption scheme using the hardness assumptions in coding theory, In: International conference on information security and cryptology, Cham: Springer, 2013,342–362. https://doi.org/10.1007/978-3-319-12160-4_21 |
[22] | C. Aguilar-Melchor, S. Bettaieb, P. Gaborit, J. A. Schrek, A code-based undeniable signature scheme, In: IMA international conference on cryptography and coding, Heidelberg: Springer, 2013, 99–119. https://doi.org/10.1007/978-3-642-45239-0_7 |
[23] | M. R. Asaar, M. Salmasizadeh, M. R. Aref, Code-based strong designated verifier signatures security analysis and a new construction, IACR Cryptol. ePrint Arch., 2016 (2016), 779. |
[24] |
P. Thanalakshmi, R. Anitha, A new code-based designated verifier signature scheme, Int. J. Commun. Syst., 31 (2018), e3803. https://doi.org/10.1002/dac.3803 doi: 10.1002/dac.3803
![]() |
[25] |
P. Thanalakshmi, R. Anitha, A quantum resistant chameleon hashing and signature scheme, IETE J. Res., 68 (2022), 2271–2282. https://doi.org/10.1080/03772063.2019.1698323 doi: 10.1080/03772063.2019.1698323
![]() |
[26] | L. Dallot, Towards a concrete security proof of Courtois, Finiasz and Sendrier signature scheme, In: Western european workshop on research in cryptology, Heidelberg: Springer, 2007, 65–77. https://doi.org/10.1007/978-3-540-88353-1_6 |
[27] |
J. Stern, A new paradigm for public key identification, IEEE T. Inform. Theory, 42 (1996), 1757–1768. https://doi.org/10.1109/18.556672 doi: 10.1109/18.556672
![]() |
[28] | A. Lysyanskaya, R. Rivest, A. Sahai, S. Wolf, Pseudonym systems, In: International workshop on selected areas in cryptography, Heidelberg: Springer, 1999,184–199. https://doi.org/10.1007/3-540-46513-8_14 |
[29] | D. Chaum, H. Antwerpen, Undeniable signatures, In: Conference on the theory and application of cryptology, New York: Springer, 1990,212–216. https://doi.org/10.1007/0-387-34805-0_20 |
[30] | J. Camenisch, A. Lysyanskaya, An efficient system for non-transferable anonymous credentials with anonymity revocation, In: Advances in cryptology-eurocrypt 2001, Heidelberg: Springer, 2001, 93–118. https://doi.org/10.1007/3-540-44987-6_7 |