feat: stage my paper
This commit is contained in:
43
paper/chapters/abs-english.tex
Normal file
43
paper/chapters/abs-english.tex
Normal file
@@ -0,0 +1,43 @@
|
||||
% 英文摘要页
|
||||
\pdfbookmark[0]{Abstract}{abstract-en}
|
||||
\begin{center}\heiti\sanhao\textbf{
|
||||
Abstract
|
||||
}
|
||||
\end{center}
|
||||
|
||||
In response to the data circulation requirements in the context of data elementization,
|
||||
data security authorization becomes particularly important in distributed environments with multi-node participation.
|
||||
This project proposes a distributed proxy re-encryption algorithm based on Chinese cryptographic standards.
|
||||
The traditional single-proxy node in proxy re-encryption is split into multiple proxy nodes,
|
||||
combining threshold proxy re-encryption and Chinese cryptographic algorithm characteristics to
|
||||
ensure data integrity and privacy during data transmission and storage between clients and central servers,
|
||||
central servers and different nodes,and clients and different nodes.
|
||||
|
||||
Compared with traditional access control and permission management methods,
|
||||
the algorithm in this project has the following advantages:
|
||||
High-strength encryption:
|
||||
Uses threshold proxy re-encryption technology to provide high-strength encryption of data,
|
||||
protecting data confidentiality and privacy.
|
||||
Distributed architecture:
|
||||
Implements access control and authorization management for distributed data through a distributed architecture,
|
||||
solving the challenges faced by traditional methods in distributed scenarios.
|
||||
Independent control:
|
||||
Designed based on Chinese cryptographic algorithms,
|
||||
ensuring data sovereignty and effectively preventing data leakage and information security risks.
|
||||
High performance:
|
||||
Simple algorithm implementation with low computational complexity,
|
||||
enabling efficient data security sharing and authorization management with existing computational resources.
|
||||
|
||||
To verify the effectiveness and performance of the proposed system,
|
||||
this project conducted a series of experimental tests.
|
||||
The test results show that this proxy re-encryption system based on
|
||||
Chinese cryptographic algorithms demonstrates superior encryption speed,
|
||||
decryption efficiency, and scalability in distributed environments.
|
||||
|
||||
Therefore, this project provides an efficient and secure solution for distributed data transmission and storage,
|
||||
bringing new research perspectives and practical experience to privacy computing in blockchain environments.
|
||||
|
||||
\textbf{Keywords:} Distributed Computing; Chinese Cryptographic Algorithm; Proxy Re-encryption; Data Sharing
|
||||
|
||||
\newpage\quad %加一页,使得目录第一页的页眉为 目录
|
||||
\clearpage
|
||||
Reference in New Issue
Block a user