ID |
原文 |
译文 |
56138 |
提出一种基于区块链和去中心属性密码的访问控制身份方案,利用用户和组织之间相互授权、背书身份属性实现信任成本的链接,利用属性密码对链上数据进行访问控制和共享达到细粒度的访问控制和隐私保护. |
This paper proposes an accesscontrol scheme based on Blockchain and decentralized the attribute-based algorithm with the identity. It usesmutual authorization between users and organizations to get endorsements of identity’s attributes for trust-costlinks, and uses the attribute-based algorithm to control and share data on the chain for fine-grained access controland privacy protection. |
56139 |
设计了可多用户协同的属性密码,为身份模型中的机构提供背书能力. |
By designing a multi-user collaborative attribute-based algorithm, it offers endorsementcapabilities for organizations in the identity-model. |
56140 |
通过实验仿真和对比分析,该方案在安全性和性能上都满足当前通用区块链的需求,为其提供了一种通用基础的身份模型. |
Through experimental simulation and comparative analysis,the solution meets the requirements of the current universal Blockchain in terms of security and performance,and provides a universal identity-model. |
56141 |
为了实时且直观地评估当前隐蔽无线通信系统所面临的未知非法检测威胁,本文首次定义了隐蔽威胁区域并设计了相应轻量级算法. |
In order to evaluate the unknown and illegal detecting threat intuitively for real-time covert wirelesscommunication systems, the covert threat region is defined for the first time and the corresponding lightweightalgorithm is also designed. |
56142 |
首先,在莱斯衰落信道和噪声不确定条件下构建了基于3D波束成形的下行隐蔽无线通信系统模型,分析了敌方最优检测性能,推导了系统最小平均隐蔽概率; |
Firstly, a system model of downlink covert wireless communication based on 3Dbeamforming is constructed with Rician fading channel and noise uncertainty. And then the optimal detectingperformance of the enemy is analyzed, also the minimum average covert probability of the system is derived. |
56143 |
然后,给出了通信速率及连接中断概率闭式表达式,求解了给定敌方位置时的系统最大化隐蔽吞吐量优化问题; |
Fur?thermore, after obtaining the closed-form expressions of communication rate and connection outage probability,the optimization problem for maximum covert throughput with the given position of the enemy is solved. |
56144 |
最后,针对实际通信场景中无法获知敌方位置或分布规律的情形,定义了系统隐蔽威胁区域这一新的性能指标,并设计了相应轻量级算法. |
Finally,considering the actual communication scenario where the enemy’s location or distribution law cannot be obtained,a new performance measurement called the covert threat region is defined, and the corresponding lightweight algo?rithm is designed subsequently. |
56145 |
仿真结果验证了系统的隐蔽性能、总体性能,以及所提算法性能,揭示了背景噪声、信道环境、天线构造和系统要求等主要参数对隐蔽威胁区域的影响. |
Simulation results verify the system covertness performance, overall performanceand the performance of the proposed algorithm, and show the influence of main parameters on the covert threatregion, such as background noise, channel characteristics, antenna structures, and system requirements. |
56146 |
在可预见的未来,口令仍将是最主要的身份认证方法. |
Password-based authentication is the dominant form of access control and is likely to keep its statusin the foreseeable future. |
56147 |
口令认证密钥交换协议(password authenticated key exchange, PAKE)是口令认证的重要组成部分,它允许通信双方在不安全的通话信道上建立一个安全的会话密钥. |
Password authenticated key exchange (PAKE) protocols enable two parties to exchangea session key during password-based authentication over an insecure channel. To resist password compromiseat the server-side, passwords are recommended to be stored in a salted hash form. |