ID |
原文 |
译文 |
45666 |
另外,将扩展的 Shamir 门限秘密共享技术应用于构造方案的访问结构,从而实现用户属性的“与”“或”“门限”这 3 种操作,具有更高的灵活性。 |
In addition, the extended Shamir secret-sharing schemes was used to construct the access tree structure which can support “and” “or” and “threshold” operations of attributes with a high flexibility. |
45667 |
经安全性分析证明,该方案在标准模型下满足自适应选择明文攻击安全。 |
Besides, the scheme was proved to be secure against chosen plain-text attack under the standard mode. |
45668 |
通过与其他方案的对比,该方案系统公钥、系统私钥、用户私钥长度以及密文长度都有所优化, |
Compared to the existing related schemes, the scheme can yield significant performance benefits, especially the size of system public/secret keys, users’ secret key and ciphertext. |
45669 |
在实际应用中更加有效。 |
It is more effective in the large scale distributed environment. |
45670 |
针对无线传感网隐私保护协议的高能耗与传感网络资源受限的对立问题,基于可逆数字水印与同态加密技术,提出一种同时保证数据完整性与机密性的可恢复数据融合协议。 |
For the contradiction between high energy consumption of WSN privacy protection algorithm and constrained resources of sensor network, a recoverable data fusion protocol that ensures data integrity and confidentiality based on reversible digital watermarking and homomorphic encryption technology was proposed. |
45671 |
一方面采用可逆数字水印技术中的差异扩展方法对传感器采集数据进行嵌入,在融合数据被破坏时可以通过可逆水印恢复原始数据,保证融合数据的完整性校验; |
On the one hand, the data from the sensor was embedded by the difference expansion method by using the reversible digital watermarking technique, and original data could be recovered by using a reversible watermark to ensure the integrity check of the fusion data when the fusion data were destroyed. |
45672 |
另一方面采用基于椭圆曲线的同态加密对数据进行加密融合,防止在数据传输过程中传感器数据被感知。 |
On the other hand, elliptic curve homomorphic encryption encrypted data to prevent sensor data from being perceived during data transmission. |
45673 |
安全推理表明,所提协议可以很好地抵御簇头节点妥协和篡改攻击。 |
Security results show that the proposed protocol performs well against cluster head node compromise as well as tampering from an attack. |
45674 |
性能分析表明,该协议比其他算法在计算与通信开销、传输时延方面具有显著优势。 |
Performance analysis shows that the protocol has significant advantages over other algorithms in terms of computation, communication overhead and propagation delay. |
45675 |
实验对比结果表明,该协议有更低的资源开销,可以提升网络性能。 |
The experimental results show that the protocol has a low resource overhead and improves network performance. |