Design and realization of secure query scheme

被引:0
|
作者
National High Performance Computing Centre, Department of Computer Science and Technology, University of Science and Technology of China, Hefei 230027, China [1 ]
机构
来源
Jisuanji Gongcheng | 2006年 / 22卷 / 144-145+158期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
The secure query is that a user of a database can accomplish a query without revealing the user and database's private information. This paper presents two methods of secure query: (1) The first scheme is a protocol of secure two-party computation, which is based on the Equijoin protocol. Although it has high security, the first scheme has too high cost and it is too difficult to use in large database. (2) The second scheme introduces the software as a trust third part and prevents the user and database from disclosing privacy. Although the security is lower than that of the first method, the second method has lower cost and it is more practical.
引用
收藏
相关论文
共 50 条
  • [31] A Secure and Efficient Privacy-Preserving Range Query Scheme in Location-Based Services
    Huang, Zhisheng
    Yan, Xiai
    Lin, Yaping
    Xu, Zhou
    Lin, Feng
    IEEE ACCESS, 2018, 6 : 72796 - 72807
  • [32] A privacy-preserving multidimensional data aggregation scheme with secure query processing for smart grid
    Singh, Ashutosh Kumar
    Kumar, Jatinder
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (04): : 3750 - 3770
  • [33] A Fully Secure Verifiable and Outsourced Decryption Ranked Searchable Encryption Scheme Supporting Synonym Query
    Kang, Yaqian
    Liu, Zhenhua
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 223 - 231
  • [34] A privacy-preserving multidimensional data aggregation scheme with secure query processing for smart grid
    Ashutosh Kumar Singh
    Jatinder Kumar
    The Journal of Supercomputing, 2023, 79 : 3750 - 3770
  • [35] A query privacy-enhanced and secure search scheme over encrypted data in cloud computing
    Yin, Hui
    Qin, Zheng
    Ou, Lu
    Li, Keqin
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2017, 90 : 14 - 27
  • [36] Design and realization of threshold secret sharing scheme with random weights
    Ye Zhenjun~1
    2.School of Management
    3.School of Science
    Journal of Systems Engineering and Electronics, 2009, 20 (05) : 1091 - 1095
  • [37] The Design, Realization, and Validation of the Scheme for Quantum Degenerate Research in Microgravity
    Li, Lin
    Xiong, Wei
    Wang, Bin
    Li, Tang
    Xie, Yu
    Liang, Angang
    Huang, Mingshan
    Yuan, Xiaolong
    Liu, Yuanyuan
    Ji, Jingwei
    Gao, Min
    Huang, Minjie
    Zhou, Cuiyun
    Song, Tieqiang
    Xu, Xingping
    Liang, Zhaogang
    Fang, Su
    Chen, Dijun
    Hou, Xia
    Zhou, Xiaoji
    Chen, Xuzong
    Chen, Weibiao
    Liu, Liang
    IEEE PHOTONICS JOURNAL, 2023, 15 (03): : 1 - 8
  • [38] A SCHEME FOR THE REALIZATION OF GRAPHICAL COMPUTER-AIDED-DESIGN SYSTEMS
    VANDORPE, D
    RUEHER, M
    COMPUTERS IN INDUSTRY, 1983, 4 (01) : 47 - 58
  • [39] SEF: A Secure, Efficient, and Flexible Range Query Scheme in Two-Tiered Sensor Networks
    Bu, Jiajun
    Yin, Mingjian
    He, Daojing
    Xia, Feng
    Chen, Chun
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2011,
  • [40] The Design and Realization of the Test Scheme OpenVPN, Based on Message Simulation
    Hou Zhan-sheng
    Xu Min
    Zhu Li-peng
    Peng Lin
    Hu Bin
    PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 457 - 460