ID | 原文 | 译文 |
3873 | 理论推导与仿真计算表明了所提方法的有效性。 | Theoretical derivation and simulation calculation show the effectiveness of the proposed method. |
3874 | 针对 sybil 攻击对区块链技术有极大危害的问题,在联盟链中对 PBFT 算法进行改进,以防御 sybil 攻击。 | Aiming at the problem that sybil attack has great harm to block chain technology, a method to improve thePBFT algorithm in the alliance chain to defend against sybil attacks was proposed. |
3875 | 首先,借鉴基于权益证明的共识算法思想,通过建立信誉模型,根据各节点共识过程中的行为计算节点的信誉值,并依据信誉值的大小赋予节点不同的话语权; | Firstly, using the idea of consensusalgorithm based on proof of rights and interests, a reputation model was established, the reputation value of each node accorded to the behavior of each node in the consensus process was calculated, and different discourse rights accorded to the size of the reputation value was given. |
3876 | 然后,在 PBFT 算法中加入了 pre-commit 阶段来减少节点间通信的次数。 | Then pre-commit phase was added to the PBFT algorithm to reduce the num-ber of communication between nodes. |
3877 | 形式化分析推理和安全性测试表明,改进的 PBFT 算法不仅可以有效防御区块链中的 sybil 攻击,而且使区块链系统性能在 TPS 和区块生成时延方面有明显提高。 | The solution through formal analysis and reasoning and security testing shows that the improved PBFT algorithm can not only effectively defend against sybil attacks in the blockchain, but also make the performance of the blockchain system in terms of TPS and block generation delay. |
3878 | 针对可搜索加密方案中的结果验证方法复杂,搜索成本高且效率低,难以满足多关键词搜索结果高效验证和安全性需求的问题,提出了基于改进的 Merkle-Tree 认证方法的多关键词搜索方案。 | Aiming at the problem that the result verification method in the searchable encryption scheme was complicated,the search cost was high and the efficiency was low, it was difficult to meet the requirements of efficient verification andsecurity of multi-keyword search results, a multi-keyword search scheme based on the improved Merkle-Tree authentica-tion method was proposed. |
3879 | 首先,利用双线性映射构造多关键词的可搜索算法,实现高效精准的多关键词搜索; | Firstly, a multi-keyword searchable algorithm was built to achieve efficient and accurate mul-ti-keyword search by the bilinear mapping. |
3880 | 其次,基于 Bawa 改进的 Merkle-Tree 认证方法构造搜索方案的验证及动态更新算法,将计算成本从经典的 MHT 的 ) (n O 降低到 ) (logn O ,防止数据篡改、删除和伪造等不法操作的高效验证。 | Secondly, based on the improved Merkle-Tree authentication method of Bawa,the verification and dynamic update algorithm of the search scheme was constructed to reduce the calculation cost of theclassic MHT to prevent the efficient verification and update of illegal operations such as data tampering, deletion, andforgery. |
3881 | 在决策线性假设和 CDH 假设下,所提方案满足密文不可区分性和签名不可伪造性。 | Under the decision-type linear hypothesis and CDH hypothesis, the proof scheme meets the indistinguishabilityand unforgeability of ciphertext. |
3882 | 针对无人机辅助蜂窝网络中的海量数据内容传输与无人机无线回程带宽受限这一矛盾,提出了一种无人机与用户协同缓存算法。 | Aiming at the problem of mass data content transmission and limited wireless backhaul resource of UAV inUAV-assisted cellular network, a cooperative caching algorithm for cache-enabled UAV and user was proposed. |