ID |
原文 |
译文 |
45486 |
仿真结果表明,所提传递信誉机制能有效地抵御内部诽谤攻击和移动攻击,增强移动终端的可信性,进而提高移动云服务的数据安全和隐私保护。 |
Simulation results demonstrate the proposed transferring reputation mechanism can defend against the internal bad mouthing attacks and mobile attacks effectively, enhance the credibility of mobile terminal sand improve the data security and privacy protection of mobile cloud services. |
45487 |
针对椭圆曲线密码系统的标量乘运算开销较大和易受能量分析攻击的问题,提出基于伪四维投射坐标的快速群运算和基于伪四维投射坐标的多基链标量乘法,对椭圆曲线密码系统的群运算层和标量乘运算层进行优化,旨在提高椭圆曲线密码系统的整体性能并抵御常见的能量分析攻击。 |
In order to address the problem of elliptic curve cryptosystem (ECC) for the expensive cost in scalar multiplication and the vulnerability to the power analysis attacks, a pseudo 4D projective coordinate-based multi-base scalar multiplication was proposed to optimize group operation layer and scalar multiplication operation layer, which aimed at in-creasing the performance of ECC and resisting common power analysis attacks. |
45488 |
实验表明,与现有算法相比,所提算法离散群运算的倍点运算开销降低 5.71%,三倍点运算开销降低 3.17%,五倍点运算开销降低 8.74%。 |
Experimental results show that compared with the state-of-the-art algorithms, the proposed algorithm decreases 5.71% of point doubling cost, 3.17% of point tripling cost, and 8.74% of point quintupling cost under discrete group operations. |
45489 |
此外,在密钥长度为 160 位的情况下,所提算法连续群运算的三倍点运算开销降低 36.32%,五倍点运算开销降低 17.42%,系统整体开销降低 8.70%。 |
When the key length is 160 bit, the pro-posed algorithm decreases 36.32% of point tripling cost, 17.42% of point quintupling cost, and 8.70% of the system cost under continuous group operations. |
45490 |
能量波形分析表明,所提算法可以有效抵御 SPA 攻击和 DPA 攻击。 |
The analyzing of power consumption wave shows that the proposed algorithm can resist SPA and DPA attack. |
45491 |
云计算和大数据技术的飞速发展促使人们进入大数据时代,越来越多的企业和个人选择将数据外包至云服务提供商。 |
The rapid development of cloud computing and big data technology brings propel to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers. |
45492 |
数据量的爆炸式增长态势、占据大量存储空间以及庞大的管理开销给云存储带来巨大压力。 |
The explosive growth of data and data replicas as well as the increasing management overhead bring a big challenge to the cloud storage space. |
45493 |
同时,如何有效防止个人隐私泄露、实现授权访问、云数据安全去重以及密钥更新与权限撤销问题也给云服务提供商提出更大挑战。 |
Meanwhile, some serious issues such as the privacy disclosure, authorized access, secure deduplication, rekeying and permission revocation should also be taken into account. |
45494 |
针对上述问题,提出一种角色对称加密算法,利用角色对称加密将用户角色与密钥相关联,构建角色密钥树,不同角色可根据访问控制策略访问对应权限的文件; |
In order to address these problems, a role-based symmetric encryption algorithm was proposed, which established a mapping relation between roles and role keys. |
45495 |
同时,提出一种基于角色对称加密的云数据安全去重方案,有效保护个人隐私信息、实现分层结构下的云数据授权去重, |
Moreover, a secure deduplication scheme was proposed via role-based symmetric encryption to achieve both the privacy protection and the authorized deduplication under the hierarchical architecture in the cloud computing environment. |