ID |
原文 |
译文 |
58018 |
在量子计算机问世后,目前广泛使用的公钥密码体制将被破译,故而急需提出新的可替换的抗量子计算攻击的公钥密码体制. |
After the advent of quantum computers,the widely used public key cryptosystem will be broken,so it is urgent to propose new public key schemes to resistant quantum computing attacks. |
58019 |
结合量子比特旋转变换和经典的单向函数( Hash 函数) 构建了一个多比特的量子公钥加密方案,分析结果显示,该方案可以抵制前向搜索和选择密文攻击,而且加密相同长度的明文所需的公钥量子比特数比Kawachi 等的方案显著降低. |
A singlequbit-rotation transformation and classical one-way functions ( Hash functions) are used to construct amulti-qubit quantum public key encryption scheme. The analysis results show that the new scheme is against the known forward search attack and a chosen ciphertext attack. Furthermore,the number of public key qubits used in the new scheme is obviously lower than that in the scheme presented by Kawachi etal. As graph structure is widely applied in science and engineering,it has good practical value todesign graph encryption algorithm. |
58020 |
直接设计对于图的加密算法比较困难,为此,提出了 2 种解决方案. |
Since it is difficult to directly design an encryption algorithm for agraph,two methods are introduced to solve this problem. |
58021 |
一是借鉴二维易辛模型简单高效和局部化的优点; |
First,the advantages of 2D Ising model,suchas simplicity and locality,are introduced to the design of encryption. |
58022 |
二是将图的加密问题转换成较简单问题的组合. |
Second,the problem of graphencryption is transferred to several simple problems. Encryption algorithms for one-dimension data,twodimension data,tree - structure are proposed based on the improved Ising model. |
58023 |
通过改进基本的易辛模型设计了用于一维数据、二维数据、树结构的加密算法,最终实现了图的加密. |
Finally,the graphencryption algorithm is implemented. |
58024 |
分析和实验结果表明,该方法可以实现图加密所要求的可逆性、多样性、高效性、随机性和扩散性等. |
Analysis and simulation demonstrate that the proposed method canfulfill basic requirements of graph encryption,including reversibility,adaptability,efficiency,randomness and diffusion. |
58025 |
提出了一种集随机接入和功率控制于一体的多读写器抗干扰联合优化算法,可根据读写器密度自适应调节2 种作用的权重. |
A joint anti-interference optimization algorithm for multiple readers is proposed,which integrates random access and power control strategies. |
58026 |
首先全面考虑接入概率、功率大小和信道选择对读写器信噪比的影响,将多读写器抗干扰问题建模成混合-整数规划问题; |
Firstly,considering the effects of access probability,transmitting power and channel selection on the signal-to-noise ratio ( SNR) of the reader,the anti-interference problem of multiple readers is modeled as a mixed integer programming problem. |
58027 |
其次采用广义 Benders 分解方法将算法分解成易求解的子问题和二进制规划主问题,并证明了算法收敛于全局最优解; |
Secondly,thegeneralized Benders decomposition method is used to decompose the algorithm into an easy-to-solve primalproblem and a master problem of binary programming. It is proved that the algorithm converges to theglobal optimal solution. |