ID | 原文 | 译文 |
4323 | 通过对复合语音数据库在多类型噪声与不同信噪比条件下的性能测试表明,所提算法相对于基于贝叶斯与 DNN 分类器的基线模型相比,语音检测正确率分别提高了 21.26%与 11.01%,显著提高了目标语音的质量。 | The perfor-mance test of composite voice database under the condition of multi-type noise and different signal-to-noise ratio showsthat compared with the baseline model based on Bayesian and DNN classifier, the voice detection accuracy of the pro-posed algorithm is improved by 21.26% and 11.01% respectively, and the quality of target voice is significantly im-proved. |
4324 | 为了评估轻量级分组密码算法 FeW 的安全性,提出并讨论了一种针对 FeW 算法的差分故障攻击方法。 | In order to evaluate the security of the lightweight block cipher FeW, a differential fault attack method wasproposed and discussed using a single byte random fault model. |
4325 | 该方法采用单字节随机故障模型,选择在 FeW 算法的最后一轮右侧引入单字节随机故障,利用线性扩散函数的特点获取差分信息,并基于 S 盒差分分布统计规律实现密钥恢复。 | In this method, a single byte random fault was introducedon the right side of the last round of FeW to recover the key based on the statistical characteristics of S-box difference distribution, and the difference information was obtained using the characteristics of the linear diffusion function. |
4326 | 实验结果表明,平均 47.73 次和 79.55 次故障注入可以分别完全恢复 FeW-64-80 和 FeW-64-128 的主密钥, | The ex-periment results show that the complete key recovery can be achieved with an average of 47.73 and 79.55 fault injectionsfor FeW-64-80 and FeW-64-128 respectively. |
4327 | 若在恢复密钥过程中加入 2 10 的穷举计算,所需平均故障注入次数分别降至 24.90 和 41.50。该方法可以有效地攻击 FeW 算法。 | If 2 10 exhaustive calculations are added to the key recovery process, thenumber of average fault injections required can be reduced to 24.90 and 41.50.This attack is effective on FeW. |
4328 | 针对可追踪属性基加密方案利用追踪功能解决密钥委托滥用问题的不完备性,提出了一种抗密钥委托滥用的可追踪属性基加密方案。 | Aiming at the problem that the traceability of a traceable attribute-based encryption (ABE) scheme was notsufficient to address the key abuse completely, a traceable ABE scheme against key-delegation abuse was proposed. |
4329 | 将秘密参数分享给用户私钥中关联属性的全部组件,使解密过程必须由全部组件共同参与完成,仅由用户私钥的一部分不能进行解密操作,从而实现真正的抗密钥委托滥用。 | A se-cret parameter was be shared to all user private key components corresponding to attributes, and the decryption was com-pleted by using all these components together, such that only parts of them could not realize the decryption and the realkey-delegation abuse resistance ability was be obtained consequently. |
4330 | 利用一种短签名技术保护用户私钥中的追踪参数,防止追踪参数被伪造,从而获得对用户的追踪能力。 | A short signature technique was employed to pre-vent the tracing parameter embedded in a user private key from being forged, so as to achieve the traceability of the userwho leaked his user private key. |
4331 | 同时支持抗密钥委托滥用和可追踪增强了所提方案的安全性。 | Supporting both key-delegation abuse resistance and user tracing enhances the security of the proposed scheme. |
4332 | 与相关方案的对比分析表明,所提方案在参数尺寸和计算代价上具有更好的性能优势。 | And compared with related schemes, the proposed scheme has better advantage in terms of theparameters size and the computation cost. |