Design and realization of secure query scheme

被引:0
|
作者
National High Performance Computing Centre, Department of Computer Science and Technology, University of Science and Technology of China, Hefei 230027, China [1 ]
机构
来源
Jisuanji Gongcheng | 2006年 / 22卷 / 144-145+158期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
The secure query is that a user of a database can accomplish a query without revealing the user and database's private information. This paper presents two methods of secure query: (1) The first scheme is a protocol of secure two-party computation, which is based on the Equijoin protocol. Although it has high security, the first scheme has too high cost and it is too difficult to use in large database. (2) The second scheme introduces the software as a trust third part and prevents the user and database from disclosing privacy. Although the security is lower than that of the first method, the second method has lower cost and it is more practical.
引用
收藏
相关论文
共 50 条
  • [41] Design and realization of threshold secret sharing scheme with random weights
    Ye Zhenjun
    Fang Zhenming
    Wang Chunfeng
    Meng Fanzhen
    JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2009, 20 (05) : 1091 - 1095
  • [42] Comment on "Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme Over Encrypted Cloud Data"
    Qin, Zhiguang
    Wu, Yan
    Xiong, Hu
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (04) : 1675 - 1677
  • [43] Design and FPGA-Based Realization of a Chaotic Secure Video Communication System
    Chen, Shikun
    Yu, Simin
    Lu, Jinhu
    Chen, Guanrong
    He, Jianbin
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2018, 28 (09) : 2359 - 2371
  • [44] On the Realization and Design of Chaotic Spread Spectrum Modulation Technique for Secure Data Transmission
    Bhat, G. M.
    Ahmad, Javaid
    Ahmad, Shabir
    2009 INTERNATIONAL CONFERENCE ON MULTIMEDIA, SIGNAL PROCESSING AND COMMUNICATION TECHNOLOGIES, 2009, : 241 - +
  • [45] Secure and Efficient Fast Initial Link Setup Scheme Design
    Zhang, Lyuye
    Ma, Maode
    2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2019,
  • [46] Design of a Secure Medical Data Sharing Scheme Based on Blockchain
    Cheng, Xu
    Chen, Fulong
    Xie, Dong
    Sun, Hui
    Huang, Cheng
    JOURNAL OF MEDICAL SYSTEMS, 2020, 44 (02)
  • [47] Secure Access Scheme Research and Design Based on the Internet of Things
    Liu, Wei
    Zhong, Jing
    Lin, Jun
    ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING, PTS 1-3, 2013, 278-280 : 1818 - +
  • [48] A design of chaos synchronization scheme and its application in secure communication
    Tian Jinchao
    Zhang Xingzhou
    Zou Yu
    2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 1422 - +
  • [50] Design of a Secure Medical Data Sharing Scheme Based on Blockchain
    Xu Cheng
    Fulong Chen
    Dong Xie
    Hui Sun
    Cheng Huang
    Journal of Medical Systems, 2020, 44