1AHITUB N, LAPID Y,NENMANN S. Processing encrypted data[J].Communications of the ACM, 1987,30(9):777-785
2RIVEST R L, ADLEMAN L, OE-OUZOUS M L. On data banks and privacy homomorphisms[M]//Foundations of secure computations. [S.l.]:Academic Press, 1978:169-179.
7HACIGUMUS H, IYER B, LI C, et al. Executing SQL over encrypted data in the database service provider model[C]//Proc of ACM SIGMOD. Madison USA,2002:22-34.
8HORE B, MEHROTRA S, TSUDIK G. A privacy-index for range queries[C] //proceedings of the 30th VLDB conference. Toronto. Canada, 2004:223-235
9Ahitub N, Lapid Y, Nenmann S. Processing encrypted data[ J]. Communications of the ACM, 1987,30 ( 9 ) : 777 -785.
10Rivest R L, Adleman L, Dertouzous M L. On data banks and privacy homomorphisms [ A ]. Foundations of Secure Computations [ C ]. Academic Press, 1978. 169 - 179.
10Hacigumus H, Iyer B, Mehrotra S. Executing SQL over Encrypted Data in Database Service Provider Model [C] //Proc of AC- MSIGMOD. New York, 2002: 22-34.