Design and realization of secure query scheme

被引:0
|
作者
National High Performance Computing Centre, Department of Computer Science and Technology, University of Science and Technology of China, Hefei 230027, China [1 ]
机构
来源
Jisuanji Gongcheng | 2006年 / 22卷 / 144-145+158期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
The secure query is that a user of a database can accomplish a query without revealing the user and database's private information. This paper presents two methods of secure query: (1) The first scheme is a protocol of secure two-party computation, which is based on the Equijoin protocol. Although it has high security, the first scheme has too high cost and it is too difficult to use in large database. (2) The second scheme introduces the software as a trust third part and prevents the user and database from disclosing privacy. Although the security is lower than that of the first method, the second method has lower cost and it is more practical.
引用
收藏
相关论文
共 50 条
  • [1] Design and realization of a secure multiplicative homomorphic encryption scheme for cloud services
    Christiana Zaraket
    Khalil Hariss
    Sandro Ephrem
    Maroun Chamoun
    Tony Nicolas
    Cluster Computing, 2023, 26 : 685 - 699
  • [2] Design and realization of a secure multiplicative homomorphic encryption scheme for cloud services
    Zaraket, Christiana
    Hariss, Khalil
    Ephrem, Sandro
    Chamoun, Maroun
    Nicolas, Tony
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (01): : 685 - 699
  • [3] Design and SOPC-Based Realization of a Video Chaotic Secure Communication Scheme
    Chen, Ping
    Yu, Simin
    Chen, Baoju
    Xiao, Liangshan
    Lu, Jinhu
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2018, 28 (13):
  • [4] SecSky: A Secure Dynamic Skyline Query Scheme With Data Privacy
    Zhao, Jiale
    Ma, Yong
    Cui, Jiangtao
    Peng, Yanguo
    Li, Kangshun
    Wang, Tengyu
    IEEE ACCESS, 2021, 9 : 5690 - 5703
  • [5] Secure ADS-B protection scheme supporting query
    Zeng, Feng
    2021 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, INTERNET OF PEOPLE, AND SMART CITY INNOVATIONS (SMARTWORLD/SCALCOM/UIC/ATC/IOP/SCI 2021), 2021, : 513 - 518
  • [6] A New Hyperchaotic Map for a Secure Communication Scheme with an Experimental Realization
    Al-Saidi, Nadia M. G.
    Younus, Dhurgham
    Natiq, Hayder
    Ariffin, M. R. K.
    Asbullah, M. A.
    Mahad, Z.
    SYMMETRY-BASEL, 2020, 12 (11): : 1 - 17
  • [7] A New Hyperchaotic Secure Communication Scheme and Its Circuitry Realization
    Abooee, Ali
    Jahed-Motlagh, Mohammad Reza
    2014 22nd Iranian Conference on Electrical Engineering (ICEE), 2014, : 1295 - 1300
  • [8] Crowdsensed Data-oriented Distributed and Secure Spatial Query Scheme
    Li, Yuxi
    Zhou, Fucai
    Chen, Jingjing
    Ji, Dong
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 912 - 919
  • [9] An Index-based Secure Query Processing Scheme for Outsourced Databases
    Akiyama, Kento
    Shinozuka, Chisato
    Watanabe, Chiemi
    Amagasa, Toshiyuki
    Kitagawa, Hiroyuki
    19TH INTERNATIONAL CONFERENCE ON INFORMATION INTEGRATION AND WEB-BASED APPLICATIONS & SERVICES (IIWAS2017), 2017, : 215 - 223
  • [10] Secure Top-k Query Scheme in Wireless Sensor Networks
    Xiao, Yunpeng
    Zhang, Yaru
    PROCEEDINGS OF 2015 6TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE, 2015, : 516 - 519