化学试剂安全柜:高分就简短的翻译:中文→英文(用翻译软件的不要来了)

来源:百度文库 编辑:神马品牌网 时间:2024/04/30 02:33:51
下面这段中文希望高人翻译成英文下,只要自己翻译的都行!
科技的飞跃发展,商业,政务的信息化,使得密码技术—这种以数学为基础的学科技术有着广泛的应用前景。比如以RSA,ElGarmal和ECC为代表的数字签名技术等,不过近几年出现的NTRU公钥密码体制凭借其在加解密中的快速,高效性和很高的安全性,成为了密码研究中的热点。而门限密码学作为现代密码学中一个活跃的分支,在实际生活中具有很重要的作用。本文主要研究的就是门限密码学和NTRU公钥体制。本文在第一章将简单的介绍公钥密码学发展的背景,发展的历史。再重点介绍NTRU公钥算法和门限密码学发展的历程,并介绍Brickell的矢量空间的密码共享方案[10]。第二章将对NTRU在截尾多项式环中的加解密工作进行介绍和分析。并在后面用简单的实例来验证NTRU公钥算法的可行性,在第二章的最后,我们将对解密正确性和密钥生成中的参数选择作出分析和讨论。第三章将是根据NTRU公钥算法是针对多项式的基础上对Brickell的矢量空间的密码共享方案作出调整,然后给出了一种新的门限NTRU公钥加密方案,并接着用一个例子来验证这个方案,最后将对这个新的方案做出一点简单的安全性分析。
是求翻译

Abstract
With the rapid development of the Stechnology and the informationization of commerce and government affairs, the technology of cryptography which based on mathmatics has the widespread for application .such as RSA, ELGarmal , ECC and other digital signature schemes.But with the fast speed and the high securith in encryption and decryption, NTRU Public-Key Cryptosystem which appeared in recent years becomes a hot spot in the research of cryptography.And Threshold cryptology as a active branch in the modern cryptology plays a impartant role in the life.And this paper mainly discussed the NTRU Public-key cryptosystem and Threshold cryptology.In first of this paper, the history, classifies, Background of the public-key cryptosystem and the Development of Threshold cryptology are introduced,then we will emphatic introduce Brickell’s Vector Space Serect Sharing Sheme, In the end of this chapter we tell the main work we have done.In chapter two,the research of NTRU encryption , decryption and key creation in the ring of truncated polynomials,the give a example to prove NTRU Algorithm’s
Feasibility.In the end the chapter why decryption works and parameter selection. Because NTRU is in view of polynomials,so in chapter three we adjust Brickell’s Vector Space Serect Sharing Sheme to adapt NTRU,then we verifies the scheme through an example, finally we analysis the security of the new scheme briefly.

Leap of science and technology development, business, governmental affairs of information-based, make the password technique- this kind of takes mathematics as the basal course technique to have the extensively applied foreground.For example the numerical signature technique that regards the RSA, ElGarmal and ECC as the representative etc., however the NTRU male key password system appear in the last few years with borrow it fast in add decrypt, efficiently sex and very high safety, became hot point within the password research.But the threshold password learn to be the modern password to learn medium branch for stimulate, having the very important function in the real life.This text mainly studies of is the threshold password to learn and male key system of NTRU.This text is in chapter 1 the background that the male key password of simple introduction learns the development, the history of the development.Then the point introduction NTRU male key calculate way and the threshold passwords learn the process of the development, and introduce the password of the Brickell vector space share project[10].Chapter 2 will to the NTRU in the bobtail polynomial wreath of add and decrypt the work carries on the introduction and analysis.Combine at the behind with a possibility that verifies the male key calculate way of NTRU, end in chapter 2, we will make an analysis and discussions towards decrypting the born and medium parameter choice of accuracy and key of 密s.Chapter 3 will is a foundation that aims at the polynomial to share the project to make an adjustment to the password of the Brickell vector space up according to the male key calculate way of NTRU, then give a kind of key with male new threshold NTRU encrypts the project, being alongside of an example to verify this project, will do a little simple safety analysis of to this new project finally.

楼上的已经写的很好了。

The rapid development of technology, business, the Chief of informationization, making password technology-based disciplines such mathematical techniques to a wide range of applications. For example, represented by RSA,ElGarmal and ECC digital signatures technology, but which has emerged in recent years NTRU public key cryptographic system, by virtue of its rapid increase declassified, high efficiency and high security has become a hot research codes. And the threshold of modern cryptography as a dynamic branch of cryptography, in real life a very important role. This major study is the threshold and NTRU public key cryptography system. In the first chapter of this simple introduction to the development of public key cryptography background, the development of history. Further highlights NTRU public key cryptography algorithms and threshold development process, and the vector space on Brickell passwords [10] sharing programme. Chapter II will be closed Mei polynomial Central NTRU in the presentation and analysis of the decryption work. And in the back with a simple example to test the feasibility of NTRU public key algorithms, in the final two chapters, we will declassification correctness of the parameters and key generation options analysis and discussion. Chapter III will be based on the NTRU public key algorithm is based on Brickell against polynomial vector space programme password sharing adjustments, and then given a new threshold NTRU public key encryption programme, and then use an example to test the programme, Finally this new programme will make a simple point safety analysis.

我也赞同