ID 原文 译文
17805 已有密文等值测试加密方案直接以消息生成陷门作为等值测试的凭证,测试的准确度不高,搜索效率较低。 Nowadays, the existing PKEET scheme takes directly the message to generate a trapdoor as the proof of equality test, which has low test accuracy and search efficiency.
17806 针对此问题,该文首先提出了支持关键字搜索的无证书密文等值测试加密(CLEETS)方案。 To solve the above problems, a certificateless public key encryption withequality test scheme supporting keyword search (CertificateLess Equality test EncrypTion with keywordSearch, CLEETS) is proposed.
17807 方案通过关键字检索判断是否包含自己需要的信息,根据判断结果选择执行等值测试,从而避免无效测试。 The scheme determines whether it contains information needed by the userthrough the keyword search, then performs the equality test according to the search result, which can avoidinvalid test.
17808 然后,在随机预言机模型下证明该方案满足适应性选择关键词不可区分性。 Then, it is proved that the scheme satisfies the indistinguishability of adaptive selection ofkeywords under the random oracle model.
17809 最后,对方案进行功能和效率对比。 Finally, the comparison analyses of function and efficiency areperformed.
17810 对比结果表明,该文方案的计算代价略高,但是方案在密文等值测试加密中实现了关键字的检索功能,弥补了效率低的不足。 The results indicate the computation cost of CLEETS scheme is less efficient. Fortunately, it canrealizes the function of keyword search in encryption with equality test, which can remedies the inefficiency.
17811 随着移动通信技术的快速发展和第5代移动通信(5G)网络的商用,网络空间安全问题日益凸显。 With the rapid development of mobile communication technologies and the commercial use of 5G,cybersecurity issues are increasingly prominent.
17812 该文针对5G网络空间安全中对抗博弈问题进行探讨,从静态博弈、动态博弈、基于演化和图论的博弈等基础模型以及窃听与窃听对抗、干扰与干扰对抗等典型对抗种类方面,对当前国内外网络空间安全对抗博弈的研究进行分析和归纳, For revealing the essence of operation in 5G cybersecurity,current researches on cybersecurity confrontation and game are analyzed from the aspects of basic modelsincluding static game, dynamic game, evolutionary game, and graph-based game, as well as the typicalconfrontation issues including eavesdropping and anti-eavesdropping and jamming and anti-jamming.
17813 并进一步阐述5G网络空间安全对抗博弈研究中潜在的基础理论和对抗规律研究方向,分析5G环境下安全对抗博弈研究的必要性及面临的挑战,为5G网络空间安全攻防对抗研究提供新视角。 Furthermore, some potential research directions are also set forth in establishing 5G cybersecurity confrontationtheory and general law. Finally, the necessity and challenges of security and game research in 5G networks arediscussed, so as to provide new sights for the research of confrontation in 5G cyberspace.
17814 为了对自动广播相关监视(ADS-B)攻击数据进行弹性恢复,确保空情态势感知信息的持续可用性,该文提出针对ADS-B攻击数据的弹性恢复方法。 In order to conduct effective resilient recovery on Automatic Dependent Surveillance-Broadcast(ADS-B) attack data and ensure the continuous availability of air traffic situation awareness, a resilientrecovery method on ADS-B attack data is proposed.