Processing secure, verifiable and efficient SQL over outsourced database
From MaRDI portal
Publication:1991841
DOI10.1016/j.ins.2016.02.018zbMath1398.68125OpenAlexW2255440954MaRDI QIDQ1991841
Tao Xiang, Fei Chen, Xiaoguo Li, Shangwei Guo, Yuan-Yuan Yang
Publication date: 30 October 2018
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2016.02.018
Database theory (68P15) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Dividing secrets to secure data outsourcing
- How to share a secret
- Computing arbitrary functions of encrypted data
- Deterministic and Efficiently Searchable Encryption
- Order-Preserving Symmetric Encryption
- Fully homomorphic encryption using ideal lattices
- Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions
This page was built for publication: Processing secure, verifiable and efficient SQL over outsourced database