Ciphertext query calculation method for encrypted database

A computing method and database technology, applied in the field of information security, can solve problems such as large ciphertext space, affecting computing efficiency, and computing complexity, and achieve the effects of low related overhead, strong portability, and high computing efficiency.

Pending Publication Date: 2021-12-03
XIDIAN UNIV
View PDF1 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The public key and private key of asymmetric encryption will lead to a very large ciphertext space, and the operation speed will be very slow
In addition, the calculation involved in the homomorphic operation of the asymmetric scheme is relatively complicated, which also affects the operation efficiency
Due to the limitations of the asymmetric homomorphic encryption scheme itself, in the homomorphic additive and multiplicative encryption schemes deployed in the existing secret-state databases, there has always been a problem that the cost and the diversity of support operations cannot be balanced.
At present, there is no effective solution for deploying a combination of encryption algorithms with higher computing efficiency for encrypted databases

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ciphertext query calculation method for encrypted database
  • Ciphertext query calculation method for encrypted database
  • Ciphertext query calculation method for encrypted database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only The embodiments are a part of the present invention, not all embodiments, and are not intended to limit the scope of the present invention. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concepts disclosed in the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0026] The schematic diagrams of the structures according to the disclosed embodiments of th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a ciphertext query calculation method for a ciphertext database. The method comprises the following steps: 1) encrypting a plaintext data table by using a private key, and uploading the encrypted plaintext data table to a ciphertext database; 2) logging in the ciphertext database, inputting a plaintext SQL statement, and then proposing an addition, deletion and modification query request to a cloud server; 3) converting a plaintext SQL statement into a ciphertext SQL statement by using a user-defined function UDF according to the addition, deletion and modification query request; and 4) enabling the cloud server to execute related operation of the ciphertext SQL statement on the ciphertext data, and return an operation result to the client. The method supports multiple operation types, realizes addition, deletion, modification and query of the ciphertext, and is relatively high in operation efficiency.

Description

technical field [0001] The invention belongs to the technical field of information security, and relates to a cipher text query calculation method oriented to a secret state database. Background technique [0002] With the rapid growth and maturity of cloud infrastructure, corresponding cloud database services are emerging in an endless stream. Database users have gradually turned to cloud computing as a service in recent years. Whether it is a traditional offline database service or an ever-growing cloud database service, the core task of a database is to help users store and manage data. As a systematic solution that can completely solve the privacy protection of data in the whole life cycle, the fully encrypted database can effectively ensure that data is not lost and privacy is not leaked in view of data security problems existing in the cloud: users own data The decryption key and the data encryption and decryption process are only completed on the client side, and th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/242G06F16/2453G06F21/60H04L29/06
CPCG06F16/2433G06F16/24534G06F21/602H04L63/0428
Inventor 李辉田琪付艳李政
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products