44 lines
2.4 KiB
TeX
44 lines
2.4 KiB
TeX
% 英文摘要页
|
|
\pdfbookmark[0]{Abstract}{abstract-en}
|
|
\begin{center}\heiti\sanhao\textbf{
|
|
Abstract
|
|
}
|
|
\end{center}
|
|
|
|
In response to the data circulation requirements in the context of data elementization,
|
|
data security authorization becomes particularly important in distributed environments with multi-node participation.
|
|
This project proposes a distributed proxy re-encryption algorithm based on Chinese cryptographic standards.
|
|
The traditional single-proxy node in proxy re-encryption is split into multiple proxy nodes,
|
|
combining threshold proxy re-encryption and Chinese cryptographic algorithm characteristics to
|
|
ensure data integrity and privacy during data transmission and storage between clients and central servers,
|
|
central servers and different nodes,and clients and different nodes.
|
|
|
|
Compared with traditional access control and permission management methods,
|
|
the algorithm in this project has the following advantages:
|
|
High-strength encryption:
|
|
Uses threshold proxy re-encryption technology to provide high-strength encryption of data,
|
|
protecting data confidentiality and privacy.
|
|
Distributed architecture:
|
|
Implements access control and authorization management for distributed data through a distributed architecture,
|
|
solving the challenges faced by traditional methods in distributed scenarios.
|
|
Independent control:
|
|
Designed based on Chinese cryptographic algorithms,
|
|
ensuring data sovereignty and effectively preventing data leakage and information security risks.
|
|
High performance:
|
|
Simple algorithm implementation with low computational complexity,
|
|
enabling efficient data security sharing and authorization management with existing computational resources.
|
|
|
|
To verify the effectiveness and performance of the proposed system,
|
|
this project conducted a series of experimental tests.
|
|
The test results show that this proxy re-encryption system based on
|
|
Chinese cryptographic algorithms demonstrates superior encryption speed,
|
|
decryption efficiency, and scalability in distributed environments.
|
|
|
|
Therefore, this project provides an efficient and secure solution for distributed data transmission and storage,
|
|
bringing new research perspectives and practical experience to privacy computing in blockchain environments.
|
|
|
|
\textbf{Keywords:} Distributed Computing; Chinese Cryptographic Algorithm; Proxy Re-encryption; Data Sharing
|
|
|
|
\newpage\quad %加一页,使得目录第一页的页眉为 目录
|
|
\clearpage
|