ID 原文 译文
46686 这是除 Shor 算法之外量子计算对公钥密码的一种新的有效攻击途径,有助于拓展量子计算对其他公钥密码体制的攻击。 It was a new effective way, except the Shor’s algorithm, to attack public key cryptography by quantum computing, and it contributed to extend the attack ways to the other public key cryptography.
46687 利用区块链技术实现的去中心化的密码货币被誉为有史以来最成功的密码货币。 The decentralized cryptocurrency which was based on block chain has been thought the most successful one in history.
46688 用户以公钥作为账户地址,使交易具备匿名性,即隐私的可保护性。 In the system, public keys were used as the users’ accounts which guaranteed the anonymity in real transactions.
46689 然而区块链上记录的交易信息,会给用户隐私带来潜在的泄露威胁; However, all the transaction information was recorded in the block chain, it was a potential threat for users’ privacy which might leak the payment information.
46690 此外,为了防止重复花费,系统约定只有在目标区块之后又有 k 个后续区块产生才能确认该目标区块上的交易是有效的, Moreover, to avoid double-spending, it was agreed that the transaction on the target block was valid only if another k blocks were generated after the target one.
46691 这段等待后续区块生成的时间较长,大大降低了交易效率。 The long waiting time reduced the deficiency of the payment system.
46692 针对以上问题,提出一种基于代理的密码货币支付系统模型,并给出了基于盲签名算法的实现方案, A model of payment system based on a proxy-cryptocurrency was proposed, and a solution based on blind signature techniques was proposed.
46693 通过在支付阶段引入代理,缩短了交易确认时间,提高了交易效率, The scheme introduced a proxy in the payment phase, by which transaction confirmation time could be reduced and the transaction efficiency could be improved.
46694 同时,更好地实现了用户的匿名性即隐私保护功能。 Meanwhile, the system implements better anonymity, namely as the privacy protection function.
46695 目前工业控制网络的入侵检测方法存在协议通用性差、误报率高和无法对未知入侵进行检测等问题。 At present, intrusion detection system over field bus network layer was a basic protection method in industrial control system. However, it has some weakness, such as poor generality, high false-positive rate, and unable to detect unknown anomaly.