Research on Database Ciphertext Retrieval Based on Homomorphic Encryption

被引:0
|
作者
Gong, Zhibin [1 ]
Xiao, Youan [1 ]
Long, Yihong [1 ]
Yang, Yanli [1 ]
机构
[1] Wuhan Univ Technol, Minist Educ, Sch Informat Engn, Key Lab Fiber Opt Sensing Technol & Informat Proc, Wuhan, Hubei, Peoples R China
关键词
structured database; homomorphic encryption; character data; ciphertext retrieval; equivalent retrieval; fuzzy retrieval;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a secure retrieval scheme based on homomorphic encryption for the server-side structured database. With the advantage of this scheme, ciphertext in server under unreliable storage circumstance can be efficiently retrieved without exposition of plaintext. Users can also have detailed access to their data. In this paper, a data encryption and decryption algorithm based on homomorphic encryption is proposed for character data in database. Server can calculate and operate the ciphertext data directly. An equivalent retrieval algorithm based on homomorphic encryption is proposed for equivalent retrieval of ciphertext data, which can effectively reduce the amount of data returned to the client and improve the retrieval efficiency. A counting joint index generation algorithm with upper limit based on dual encoding function is proposed for fuzzy retrieve of character data which can improve the efficiency of the server's filtering of the irrelevant data and reduce the waste of time and space.
引用
收藏
页码:149 / 152
页数:4
相关论文
共 50 条
  • [31] Secure and Efficient Similarity Retrieval in Cloud Computing Based on Homomorphic Encryption
    Wang, Na
    Zhou, Wen
    Wang, Jingjing
    Guo, Yifan
    Fu, Junsong
    Liu, Jianwei
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 2454 - 2469
  • [32] Performance Analysis of Private Information Retrieval Scheme based on Homomorphic Encryption
    Ichibane, Yacine
    Gahi, Youssef
    Guennoun, Mouhcine
    Guennoun, Zouhair
    [J]. 2015 5TH INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGY AND ACCESSIBILITY (ICTA), 2015,
  • [33] A Secure Image Retrieval Method Based on Homomorphic Encryption for Cloud Computing
    Zhang, Yan
    Zhuo, Li
    Peng, Yuanfan
    Zhang, Jing
    [J]. 2014 19TH INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING (DSP), 2014, : 269 - 274
  • [34] Applying Homomorphic Encryption For Securing Cloud Database
    Marwan, Mbarek
    Kartit, Ali
    Ouahmane, Hassan
    [J]. 2016 4TH IEEE INTERNATIONAL COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST), 2016, : 658 - 664
  • [35] Enhanced Database Security Using Homomorphic Encryption
    Roset, Connor
    Warren, Van
    Chiang, Chia-Chu
    [J]. INFORMATION SCIENCE AND APPLICATIONS 2017, ICISA 2017, 2017, 424 : 377 - 387
  • [36] High-throughput and fully-pipelined ciphertext multiplier for homomorphic encryption
    Wang, Zeyu
    Ikeda, Makoto
    [J]. IEICE ELECTRONICS EXPRESS, 2024,
  • [37] A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle
    Gong, Linming
    Li, Shundong
    Mao, Qing
    Wang, Daoshun
    Dou, Jiawei
    [J]. THEORETICAL COMPUTER SCIENCE, 2016, 609 : 253 - 261
  • [38] Reducing the Ciphertext Expansion in Image Homomorphic Encryption via Linear Interpolation Technique
    Li, Yunyu
    Zhou, Jiantao
    Li, Yuanman
    Au, Oscar C.
    [J]. 2015 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP), 2015, : 800 - 804
  • [39] High-throughput and fully-pipelined ciphertext multiplier for homomorphic encryption
    Wang, Zeyu
    Ikeda, Makoto
    [J]. IEICE ELECTRONICS EXPRESS, 2024, 21 (06): : 1 - 6
  • [40] Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption
    Emura, Keita
    Hanaoka, Goichiro
    Ohtake, Go
    Matsuda, Takahiro
    Yamada, Shota
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 32 - 50