Design and realization of secure query scheme

被引:0
|
作者
National High Performance Computing Centre, Department of Computer Science and Technology, University of Science and Technology of China, Hefei 230027, China [1 ]
机构
来源
Jisuanji Gongcheng | 2006年 / 22卷 / 144-145+158期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
The secure query is that a user of a database can accomplish a query without revealing the user and database's private information. This paper presents two methods of secure query: (1) The first scheme is a protocol of secure two-party computation, which is based on the Equijoin protocol. Although it has high security, the first scheme has too high cost and it is too difficult to use in large database. (2) The second scheme introduces the software as a trust third part and prevents the user and database from disclosing privacy. Although the security is lower than that of the first method, the second method has lower cost and it is more practical.
引用
收藏
相关论文
共 50 条
  • [21] Secure OWL query
    Xu, Baowen
    Li, Yanhui
    Lu, Jianjiang
    Kang, Dazhou
    COMPUTATIONAL SCIENCE - ICCS 2006, PT 4, PROCEEDINGS, 2006, 3994 : 95 - 103
  • [22] Design and realization of random measurement scheme for compressed sensing
    解成俊
    徐林
    Optoelectronics Letters, 2012, 8 (01) : 60 - 62
  • [23] Design and realization of random measurement scheme for compressed sensing
    Xie C.
    Xu L.
    Optoelectronics Letters, 2012, 8 (01) : 60 - 62
  • [24] SecEQP: A Secure and Efficient Scheme for SkNN Query Problem over Encrypted Geodata on Cloud
    Lei, Xinyu
    Liu, Alex X.
    Li, Rui
    Tu, Guan-Hua
    2019 IEEE 35TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2019), 2019, : 662 - 673
  • [25] A secure and efficient key management scheme design for WSNs
    Huang, Risheng
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 125 : 148 - 148
  • [26] A design of secure watermarking scheme for images in spatial domain
    Bedi, Sarabjeet S.
    Verma, Shekhar
    2006 ANNUAL IEEE INDIA CONFERENCE, 2006, : 99 - +
  • [27] System Design Scheme of Configurable Secure Memory Chip
    Xin, Ruishan
    Li, Yuehui
    Liu, Yanjiang
    Zhao, Yiqiang
    2017 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT HUMAN-MACHINE SYSTEMS AND CYBERNETICS (IHMSC 2017), VOL 2, 2017, : 280 - 283
  • [28] Development of e-learning design criteria with secure realization concepts
    Eibl, Christian J.
    Schubert, Sigrid E.
    LEARNING TO LIVE IN THE KNOWLEDGE SOCIETY, 2008, : 361 - 362
  • [29] Development of e-learning design criteria with secure realization concepts
    Eibl, Christian J.
    Schubert, Sigrid E.
    INFORMATICS EDUCATION - SUPPORTING COMPUTATIONAL THINKING, 2008, 5090 : 327 - 336
  • [30] Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme Over Encrypted Cloud Data
    Yin, Hui
    Qin, Zheng
    Zhang, Jixin
    Ou, Lu
    Li, Keqin
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (01) : 27 - 39