期刊文献+

一种新的多级安全数据库同态加密方案

A New Homomorphic Encryption Scheme on MLS-DBMS
原文传递
导出
摘要 为提高加密数据库的应用性能,可以运用同态加密技术使得不用解密而直接操作密文数据。而多级安全机制能够为数据库管理系统提供更高层级的信息安全保护。本文提出了一种新的基于数论的数据库加密方案,该方案具有合理可行的密钥配置,加解密运算过程简单,并且具备多级安全机制,能够支持对密文的关系操作和动态扩展。 To acquire higher performance, a technology about privacy homomorphism which can be used.By using this technology, it is possible to manipulate encrypted information without decrypting them.DBMS with multilevel secure mechanism would have higher information protection level.A new encryption scheme on database provided in this paper has following features : feasible key configuration, simple encryption ( decryption ) process, multilevel secure mechanism, supporting relation operation on encrypted information and dynamic expanding.
作者 李斌
出处 《网络安全技术与应用》 2014年第10期124-125,127,共3页 Network Security Technology & Application
关键词 数据库加密 同态加密 多级安全机制 DBMS encryption homomorphic encryption multilevel secure mechanism
  • 相关文献

参考文献6

  • 1Rivest R L, Adleman L M, Dertouzos M.on Data Banks andPrivacy Homomorphisms[J].In Foundations of Secure Computation, pages169-178, 1978.
  • 2牟亚莉,曾浩,刘欣.多级安全数据库体系结构及其策略模型的研究[J].海军工程大学学报,2006,18(2):9-13. 被引量:3
  • 3BeU D E, La Padula.Secure Computer Systems: Mathematical Foundations and Model (Technical Report, MTR-2547 ) [R].Bedford, MA: Mitre Corporation, 1973.
  • 4Biba K J.Integrity Considerations for Secure Computer Systems (Technical Report MTR-3153 ) [R].Bedford, MA: Mitre Corporation, 1977.
  • 5Denning D E, Lunt T F.The Seaview security model [J].Software Engineering, IEEETransactions, 1990, 16 (6): 593-607.
  • 6Min-Shiang Hwang, Wei-Pang Yang.Multilevel secure database encryption with subkeys[J].Data & Knowledge Engineering 22 ( 1997 ) 117-131.

二级参考文献5

  • 1Alturi V,Jajodia S,Ceorge B.Multilevel Secure Transaction Processing[M].Boston/Dordrecht/London:Kluwer Academic Publishers,2000.
  • 2Bell D E,La Padula L J.Secure Computer Systems:Mathematical Foundations and Model (Technical Report,MTR-2547)[R].Bedford,MA:Mitre Corporation,1973.
  • 3Denning D E,Lunt T F.The Seaview security model[J].Software Engineering,IEEE Transactions,1990,16(6):593-607.
  • 4Biba K J.Integrity Considerations for Secure Computer Systems (Technical Report MTR-3153)[R].Bedford,MA:Mitre Corporation,1977.
  • 5Jajodia S,Ravi S.Polyinstantiation integrity in multiplevel relations[J].Research in Security and Privacy,1990,(5):104-115.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部