Netinfo Security ›› 2015, Vol. 15 ›› Issue (9): 10-14.doi: 10.3969/j.issn.1671-1122.2015.09.003
• Orginal Article • Previous Articles Next Articles
Yan SONG1(), Qing ZHOU1, Guo-shuang ZHANG1, Xin WANG2
Received:
2015-07-15
Online:
2015-09-01
Published:
2015-11-13
CLC Number:
Yan SONG, Qing ZHOU, Guo-shuang ZHANG, Xin WANG. A Ciphertext Search Scheme Based on DAS[J]. Netinfo Security, 2015, 15(9): 10-14.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2015.09.003
[1] | Hacigümüs H, Iyer B, Mehrotras S.Providing database as a service[C]//Proceedings of the 18th International Conference on Data Engineering, Washington, 2002: 29-38. |
[2] | 田秀霞,王晓玲,高明,等. 数据库服务——安全与隐私保护[J]. 软件学报,2010,21(5): 991-1006. |
[3] | 刘占斌,刘虹,火一莽. 云计算中基于密文策略属性基加密的数据访问控制协议[J]. 信息网络安全,2014,(7):57-60. |
[4] | Rivest L, Adleman M,Dertouzos L.On data banks and privacy homomorphisms[J]. Foundations of Secure Computation, 1978: 169-178. |
[5] | Bijit H.Storing and querying data securely in untrusted environments[D]. University of California, 2007. |
[6] | 林艳纯,王晓明. 基于最佳桶划分的数据库加密存储与查询[J]. 计算机工程,2011,37(17):105-107. |
[7] | 陈何峰,林柏钢,杨旸,等. 基于密文的中文关键词模糊搜索方案[J]. 信息网络安全,2014,(7):69-74. |
[8] | 蔡克,张敏,冯登国. 基于单断言的安全的密文区间检索[J]. 计算机学报,2011,34(11): 2093-2103. |
[9] | Cao Ning, Wang Cong, Li Ming, et al.Privacy-preserving multi-keyword ranked search over encrypted cloud data[C]//Proceedings of INFOCOM. Shanghai, 2011, 829-837. |
[10] | Sun S.Anti-tamper database research: Query encrypted databases[D]. Case Western Reserve University. 2005. |
[11] | 章恒,禄凯. 构建云计算环境的安全检查与评估指标体系[J]. 信息网络安全,2014,(9):115-119. |
[12] | Craig G.Fully homomorphic encryption using ideal lattices[C]//Proceedings of the 41st ACM Symposium on Theory of Computing. Maryland, 2009, 169-179. |
[13] | Marten D, Craig G, Shai H, et al. Fully homomorphic encryption over the integers[C]//Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Riviera, 2010, LNCS 6110: 24-43. |
[14] | Nigel S, Fvercaut V. Fully homomorphic encryption with relatively small key and ciphertext sizes[C]//Proceedings of the 13th Internaltional Conference on Practice and Theory in Public Key Cryptography. Paris, 2010, LNCS 6056: 420-443. |
[15] | Michael C. IBM touts encryption innovation [EB/OL]. . |
[16] | 唐春明,郑晓龙. 云计算中一种对大群组用户的隐私保护公共审计方案[J]. 信息网络安全,2015,(2):19-25. |
[1] | Zhiyan ZHAO, Xiaomo JI. Research on the Intelligent Fusion Model of Network Security Situation Awareness [J]. Netinfo Security, 2020, 20(4): 87-93. |
[2] | Min LIU, Shuhui CHEN. Research on VoLTE Traffic Based on Association Fusion [J]. Netinfo Security, 2020, 20(4): 81-86. |
[3] | Lingyu BIAN, Linlin ZHANG, Kai ZHAO, Fei SHI. Ethereum Malicious Account Detection Method Based on LightGBM [J]. Netinfo Security, 2020, 20(4): 73-80. |
[4] | Yifeng DU, Yuanbo GUO. A Dynamic Access Control Method for Fog Computing Based on Trust Value [J]. Netinfo Security, 2020, 20(4): 65-72. |
[5] | Zhizhou FU, Liming WANG, Ding TANG, Shuguang ZHANG. HBase Secondary Ciphertext Indexing Method Based on Homomorphic Encryption [J]. Netinfo Security, 2020, 20(4): 55-64. |
[6] | Rong WANG, Chunguang MA, Peng WU. An Intrusion Detection Method Based on Federated Learning and Convolutional Neural Network [J]. Netinfo Security, 2020, 20(4): 47-54. |
[7] | Xiaoli DONG, Shuai SHANG, Jie CHEN. Impossible Differential Attacks on 9-Round Block Cipher Rijndael-192 [J]. Netinfo Security, 2020, 20(4): 40-46. |
[8] | Chun GUO, Changqing CHEN, Guowei SHEN, Chaohui JIANG. A Ransomware Classification Method Based on Visualization [J]. Netinfo Security, 2020, 20(4): 31-39. |
[9] | Lu CHEN, Yajie SUN, Liqiang ZHANG, Yun CHEN. A Scheme of Measurement for Terminal Equipment Based on DICE in IoT [J]. Netinfo Security, 2020, 20(4): 21-30. |
[10] | Jinfang JIANG, Guangjie HAN. Survey of Trust Management Mechanism in Wireless Sensor Network [J]. Netinfo Security, 2020, 20(4): 12-20. |
[11] | Jianwei LIU, Yiran HAN, Bin LIU, Beiyuan YU. Research on 5G Network Slicing Security Model [J]. Netinfo Security, 2020, 20(4): 1-11. |
[12] | Peng LIU, Qian HE, Wangyang LIU, Xu CHENG. CP-ABE Scheme Supporting Attribute Revocation and Outsourcing Decryption [J]. Netinfo Security, 2020, 20(3): 90-97. |
[13] | Yubo SONG, Ming FAN, Junjie YANG, Aiqun HU. Multipath Solution and Blocking Method of Network Attack Traffic Based on Topology Analysis [J]. Netinfo Security, 2020, 20(3): 9-17. |
[14] | Tengfei WANG, Manchun CAI, Tianliang LU, Ting YUE. IPv6 Network Attack Source Tracing Method Based on iTrace_v6 [J]. Netinfo Security, 2020, 20(3): 83-89. |
[15] | Yi ZHANG, Hongyan LIU, Hequn XIAN, Chengliang TIAN. A Cloud Storage Encrypted Data Deduplication Method Based on Authorization Records [J]. Netinfo Security, 2020, 20(3): 75-82. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||