期刊文献+

面向数据库加密的秘密同态算法的研究 被引量:7

Research of privacy homomorphism algorithm based on encrypted database
下载PDF
导出
摘要 在Dom ingo提出的秘密同态加密算法的理论基础上,给出了一种将浮点数转换为整数的同态运算,基于复合同态的数学理论基础,提出了类复合同态的概念并扩展应用到了实现浮点型数据的同态加密机制中。最后利用中国剩余定理实现了字符串数据的加密。 On the basis of Domingo' s privacy homomorphism algorithm theory, this paper gave a homomorphism operation that could convert data from floating-point to integer. Based on the mathematical theory of compound homomorphism,raised and ap- plied a similar-compound homomorphism notion in the encryption mechanism over float-point data. Besides, achieved the en- cryption of string using the Chinese remainder theorem in the text at last.
出处 《计算机应用研究》 CSCD 北大核心 2009年第4期1535-1537,共3页 Application Research of Computers
关键词 秘密同态 浮点数加密 字符串加密 中国剩余定理 privacy homomorphism float-point encryption string encryption Chinese remainder theorem
  • 相关文献

参考文献6

二级参考文献15

  • 1Rivest R L, Adleman L, Detrouzos M L. On Data Banks and Privacy Homomorphism[C]. Foundations of Secure Computation New York: Academic Press, 1978:169-179
  • 2Domingo-Ferrer J. A New Privacy Homomorphism and Application s[J]. Information Processing Letters, 1996, 60(5): 277-282
  • 3Domingo-Ferrer J. Multi-application Smart Cards and Encrypted Dat a Processing. Future Generation Computer Systems, 1997,13
  • 4Cormen T, Leiserson C, Rivest R. Introduction to Algorithms. Cambridge,MA: MIT Press, 1990
  • 5Stallings W. Cryptography and Network Security. Principles and Practice (Second Edition). 2001
  • 6潘承洞 潘承彪.初等数论[M].北京:北京大学出版社,1991..
  • 7N Karnik.Security in Mobile Agent Systems[D].PhD thesis. Department of Computer Science and Engineering,University of Minnesota,1998
  • 8C Krintz. Security in agent-based computing environments using existing tools[R].Technical Report,University of California,San Diego,1998
  • 9H Lee. Mobile Agent:Evaluating Encrypted Functions[D].PhD thesis.Department of Computer Science,University ofIdaho,2002
  • 10Rivest R L,Adlem an L,Dertouzos M L. On data banks and privacy homomorphism[C].In :Demillo R A et al. Foundations of Secure Computation[C].New Youk :Academic Press, 1978:169~179

共引文献42

同被引文献59

引证文献7

二级引证文献58

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部