CN105138585B - Data base encryption field portions matching inquiry method and system - Google Patents

Data base encryption field portions matching inquiry method and system Download PDF

Info

Publication number
CN105138585B
CN105138585B CN201510463863.7A CN201510463863A CN105138585B CN 105138585 B CN105138585 B CN 105138585B CN 201510463863 A CN201510463863 A CN 201510463863A CN 105138585 B CN105138585 B CN 105138585B
Authority
CN
China
Prior art keywords
data
encrypted
logger
data logger
unique designation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510463863.7A
Other languages
Chinese (zh)
Other versions
CN105138585A (en
Inventor
陈丛亮
刘德建
毛新生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian TQ Digital Co Ltd
Original Assignee
Fujian TQ Digital Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian TQ Digital Co Ltd filed Critical Fujian TQ Digital Co Ltd
Priority to CN201510463863.7A priority Critical patent/CN105138585B/en
Publication of CN105138585A publication Critical patent/CN105138585A/en
Application granted granted Critical
Publication of CN105138585B publication Critical patent/CN105138585B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • G06F16/24553Query execution of query operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2282Tablespace storage structures; Management thereof

Abstract

The invention discloses a kind of method and system of data base encryption field portions matching inquiry, wherein method includes:Create data logger;According to the data logger, encrypted indexes table is created to the encrypted fields;Program obtains field to be checked, and encrypts;The data matched completely are inquired by SQL statement in data logger, and are the first value by the data record matched completely;The field to be checked is subjected to SHA hash, corresponding data unique designation is inquired about in encrypted indexes table by SQL statement;According to corresponding data unique designation, all data of data unique designation are inquired in data logger, and are recorded as second value;Merge first value and second value.By the above-mentioned means, the present invention can only need the field can of partial match query to use encipherment scheme in the case where ensureing performance, security of system and ease for use are improved.

Description

Data base encryption field portions matching inquiry method and system
Technical field
The present invention relates to field of database query technology, more particularly, to a kind of data base encryption field portions matching inquiry Method and system.
Background technology
Field is encrypted in order to ensure database security for database at present, still, during partial match query, needs Rear matched and searched is decrypted to every a data, when data volume is big, technical staff can be caused because query time is long Encipherment scheme is yielded, or only allows Full Match Search.
Existing patent (application number:201410150462.1) disclose a kind of data encryption for database and retrieval side Method, comprise the following steps:A) the constant situation of former data order is being kept to former data encryption first with One-way encryption algorithm Under, generate non-decryption indexes head;B) the ciphertext data that can be decrypted to former data encryption generation are then further continued for;C) may be used Index head and the ciphertext data that can be decrypted are combined in generation encrypted combination data Cun Chudao databases;The step a) In One-way encryption algorithm be MD5, SHA or HMAC;AES in the step b) is symmetric key encryption algorithm.This is special Profit is that solve the problems, such as matching completely.
The content of the invention
The technical problems to be solved by the invention are:Using partial match query, efficient data base querying mesh is realized 's.
In order to solve the above-mentioned technical problem, the technical solution adopted by the present invention is:A kind of data base encryption field portion is provided Divide the method for matching inquiry, including:
Create data logger;
According to the data logger, encrypted indexes table is created to the encrypted fields;
Program obtains field to be checked, and encrypts;
The data matched completely, and the data record that will be matched completely are inquired by SQL statement in data logger For the first value;
The field to be checked is subjected to SHA hash, corresponding data is inquired about only in encrypted indexes table by SQL statement One mark;
According to corresponding data unique designation, all data of data unique designation are inquired in data logger, and are remembered Record as second value;
Merge first value and second value.
To solve the above problems, the present invention also provides a kind of system of data base encryption field portions matching inquiry, including:
Data logger module, for creating data logger;
Encrypted indexes table module, for according to the data logger, encrypted indexes table to be created to the encrypted fields;
Encrypting module is obtained, field to be checked is obtained for program, and encrypt;
First inquiry logging modle, for the data matched completely to be inquired by SQL statement in data logger, and It is the first value by the data record matched completely;
Hash module, for the field to be checked to be carried out into SHA hash, by SQL statement in encrypted indexes table Inquire about corresponding data unique designation;
Second inquiry logging modle, for according to corresponding data unique designation, data to be inquired in data logger only All data of one mark, and it is recorded as second value;
Merging module, for merging first value and second value.
The beneficial effects of the present invention are:It is different from prior art, the present invention is by creating data logger and correspondingly Encrypted indexes table, in encrypted queries, Full Match Search and partial match query are realized by its unique numerical identification, entered And final result is obtained, its strong operability, while efficiency high, encryption are good, and improve the security and ease for use of system.
Brief description of the drawings
Fig. 1 is the schematic flow sheet of the inventive method embodiment one;
Fig. 2 is the schematic flow sheet of the inventive method embodiment two;
Fig. 3 is the structured flowchart of present system embodiment three;
Fig. 4 is the structured flowchart of present system example IV.
Embodiment
To describe the technology contents of the present invention, the objects and the effects in detail, below in conjunction with embodiment and coordinate attached Figure is explained.
The present invention provides a kind of method of data base encryption field portions matching inquiry, including:
Create data logger;
According to the data logger, encrypted indexes table is created to the encrypted fields;
Program obtains field to be checked, and encrypts;
The data matched completely, and the data record that will be matched completely are inquired by SQL statement in data logger For the first value;
The field to be checked is subjected to SHA hash, corresponding data is inquired about only in encrypted indexes table by SQL statement One mark;
According to corresponding data unique designation, all data of data unique designation are inquired in data logger, and are remembered Record as second value;
Merge first value and second value.
Wherein, the step of establishment data logger is specially:
Establish data unique designation row and arranged with encrypted fields;
Merge the data unique designation row and arranged with encrypted fields, generate data logger.
Wherein, merge the data unique designation row and arranged with encrypted fields, after generating data logger, also wrapped Include:Non-encrypted field row are established, and are merged into data logger.
Wherein, according to the data logger, after the step of encrypted fields establishment encrypted indexes table, also wrap Include:
Data are inserted in the data logger and encrypted indexes table.
Wherein, it is specially the step of insertion data in the data logger and encrypted indexes table:
Initialize the data logger and encrypted indexes table;
The data being inserted into are split into N-1 character string of part matching from the beginning of its character, wherein, the character string Length is 1~N-1, and N is the length of the data;
The N-1 character string is subjected to SHA hash, and encrypted;
Data, and data unique designation corresponding to generation are inserted in data logger;
According to corresponding data unique designation, hash inserts the N-1 character string in encrypted indexes table.
The present invention also provides a kind of system of data base encryption field portions matching inquiry, including:
Data logger module, for creating data logger;
Encrypted indexes table module, for according to the data logger, encrypted indexes table to be created to the encrypted fields;
Encrypting module is obtained, field to be checked is obtained for program, and encrypt;
First inquiry logging modle, for the data matched completely to be inquired by SQL statement in data logger, and It is the first value by the data record matched completely;
Hash module, for the field to be checked to be carried out into SHA hash, by SQL statement in encrypted indexes table Inquire about corresponding data unique designation;
Second inquiry logging modle, for according to corresponding data unique designation, data to be inquired in data logger only All data of one mark, and it is recorded as second value;
Merging module, for merging first value and second value.
Wherein, obtaining encrypting module also includes:
Column unit, for establishing data unique designation row and being arranged with encrypted fields;
Generation unit, for merging the data unique designation row and being arranged with encrypted fields, generate data logger.
Wherein, the column unit is additionally operable to establish non-encrypted field row, and is merged into data logger.
Wherein, in addition to Data insertion module, for inserting data in the data logger and encrypted indexes table.
Wherein, the Data insertion module also includes:
Unit initially is changed, for initializing the data logger and encrypted indexes table;
Split cells, for the data being inserted into be split into N-1 character string of part matching from the beginning of its character, its In, the string length is 1~N-1, and N is the length of the data;
Ciphering unit is hashed, for the N-1 character string to be carried out into SHA hash, and is encrypted;
Generation unit is inserted, for inserting data, and data unique designation corresponding to generation in data logger;
Character string inserts unit, for the data unique designation corresponding to, is hashed in encrypted indexes table described in insertion N-1 character string.
Fig. 1 is refer to, the embodiment of the present invention one provides a kind of method of data base encryption field portions matching inquiry, including Following steps:
S1:Create data logger;
S2:According to the data logger, encrypted indexes table is created to the encrypted fields;
S3:Program obtains field to be checked, and encrypts;
S4:The data matched completely are inquired by SQL statement in data logger, and the data matched completely are remembered Record as the first value;
S5:The field to be checked is subjected to SHA hash, inquires about corresponding number in encrypted indexes table by SQL statement According to unique designation;
S6:According to corresponding data unique designation, all data of data unique designation are inquired in data logger, and It is recorded as second value;
S7:Merge first value and second value.
Prior art is different from, the present invention looks into by creating data logger and corresponding encrypted indexes table in encryption During inquiry, Full Match Search and partial match query are realized by its unique numerical identification, and then obtain final result, it is operated Property is strong, while efficiency high, encryption are good, and improves the security and ease for use of system.
Wherein, as shown in Fig. 2 on the basis of embodiment one, the step S1 of the embodiment of the present invention two is specially:
S11:Establish data unique designation row and arranged with encrypted fields;
S12:Merge the data unique designation row and arranged with encrypted fields, generate data logger.
Wherein, after S12, in addition to step S13:Non-encrypted field row are established, and are merged into data logger.
Wherein non-encrypted field row may be considered in existing basic data, without that a part of content of encryption, Such as in cell phone address book, under corresponding name, can only need to encrypt phone number, and to other information, as mailbox, other IM numbers can not be encrypted.These can be merged into a data logger.It is mainly originally wherein there was only phone number Invention needs encrypted query.In practical operation, user can encrypt a variety of data as needed, or even can encrypt the institute under name There is communication information.
It should be appreciated that data logger can select to come in user's establishment or existing tables of data. Such as cell phone address book, name, telephone number are encrypted, address list is exactly the data logger.Preferably, the present invention can Database index is created to encrypted fields (name, number as described above), to facilitate follow-up lookup.
Wherein, after step S2, in addition to:
S21:Data are inserted in the data logger and encrypted indexes table.
Wherein, step S21 is specially:
S22:Initialize the data logger and encrypted indexes table;
S23:The data being inserted into are split into N-1 character string of part matching from the beginning of its character;Wherein, the word Symbol string length is 1~N-1, and N is the length of the data;
S24:The N-1 character string is subjected to SHA hash, and encrypted;
S25:Data, and data unique designation corresponding to generation are inserted in data logger;
S26:According to corresponding data unique designation, hash inserts the N-1 character string in encrypted indexes table.
Specifically, according to corresponding to creating data logger during encrypted indexes table, it is necessary to create including encrypted indexes field Row and two fields of corresponding data unique designation.Similarly, it is preferable that the present invention can be to data corresponding to the establishment of encrypted indexes field Storehouse indexes, to facilitate follow-up lookup.
Before data are inserted, the data logger established and encrypted indexes table are first initialized.Due to being that part matching is looked into Ask, therefore the N-1 character string that the data being inserted into will be split into part matching from the beginning of its character, wherein, the character String length is 1~N-1, and N is the length of the data.These character strings form a combination, and carry out SHA hash and encryption. Existing matched data word1 and pk2 completely, then be split into corresponding w, wo, wor, word such as in data logger The combination of totally 4 character strings and p, pk totally 2 character strings.The method wherein encrypted can be taken well known in the prior art AES, such as AES.
Data are inserted in data logger, and confirm generate data unique designation, then by data unique designation with it is above-mentioned All combination S HA hash be inserted into encrypted indexes record sheet.
And in inquiry, after user inputs a character, program is encrypted, and is arrived first in data logger and is passed through SQL statement inquires the content that matching completely needs to encrypt, and is matched completely according to inquiry content, due to being pre-created database Index, required data can quickly directly be found according to index, without scanning all data.Database of the prior art Sql server, mysql etc. support this function.It is result 1 (i.e. the first value) by the field record matched completely.
The character of input is subjected to SHA hash, is inquired about by SQL statement into encrypted indexes table, inquires SHA hash The corresponding data unique designation of the record matched completely is kept in.By the above-mentioned data unique designation inquired into data logger Inquire the consistent all data of data unique designation and keep in result 2 (i.e. second value).
The result inquired be result 1 and result it is 2-in-1 and overall result.
Prior art is different from, the present invention is used as data record by creating data logger or the existing tables of data of selection Table, and encrypted indexes table and data directory corresponding to establishment, the inquiry respectively in two tables is realized by unique data token And respective contact.In encrypted query, Full Match Search and partial match query are realized by its unique numerical identification, entered And the two final result merged is obtained, thus its strong operability, while efficiency high, encryption are good, and improve the peace of system Full property and ease for use.
The embodiment of the present invention three also provides a kind of system 100 of data base encryption field portions matching inquiry, including:
Data logger module 110, for creating data logger;
Encrypted indexes table module 120, for according to the data logger, encrypted indexes to be created to the encrypted fields Table;
Encrypting module 130 is obtained, field to be checked is obtained for program, and encrypt;
First inquiry logging modle 140, for inquiring the number matched completely by SQL statement in data logger According to, and be the first value by the data record matched completely;
Hash module 150, for the field to be checked to be carried out into SHA hash, by SQL statement in encrypted indexes table Middle inquiry corresponding data unique designation;
Second inquiry logging modle 160, for according to corresponding data unique designation, data to be inquired in data logger All data of unique designation, and it is recorded as second value;
Merging module 170, for merging first value and second value.
Wherein, encrypting module 130 is obtained described in the embodiment of the present invention four also includes:
Column unit 131, for establishing data unique designation row and being arranged with encrypted fields;
Generation unit 132, for merging the data unique designation row and being arranged with encrypted fields, generate data record Table.
Wherein, the column unit 131 is additionally operable to establish non-encrypted field row, and is merged into data logger.
Wherein, the system 100 also includes Data insertion module 180, in the data logger and encrypted indexes Data are inserted in table.
Wherein, the Data insertion module 180 also includes:
Unit 181 initially is changed, for initializing the data logger and encrypted indexes table;
Split cells 182, for the data being inserted into be split into N-1 character of part matching from the beginning of its character String, wherein, the string length is 1~N-1, and N is the length of the data;
Ciphering unit 183 is hashed, for the N-1 character string to be carried out into SHA hash, and is encrypted;
Generation unit 184 is inserted, for inserting data, and data unique designation corresponding to generation in data logger;
Character string inserts unit 185, for the data unique designation corresponding to, the hash insertion institute in encrypted indexes table State N-1 character string.
Embodiments of the invention are the foregoing is only, are not intended to limit the scope of the invention, it is every to utilize this hair The equivalents that bright specification and accompanying drawing content are made, or the technical field of correlation is directly or indirectly used in, similarly include In the scope of patent protection of the present invention.

Claims (6)

  1. A kind of 1. method of data base encryption field portions matching inquiry, it is characterised in that including:
    Create data logger;
    According to the data logger, encrypted indexes table is created to the encrypted fields;
    Program obtains field to be checked, and encrypts;
    Inquire the data matched completely by SQL statement in data logger, and be the by the data record matched completely One value;
    The field to be checked is subjected to SHA hash, corresponding data is inquired about in encrypted indexes table by SQL statement and uniquely marked Will;
    According to corresponding data unique designation, all data of data unique designation are inquired in data logger, and are recorded as Second value;
    Merge first value and second value;
    Wherein, according to the data logger, after the step of creating encrypted indexes table to the encrypted fields, in addition to: Data are inserted in the data logger and encrypted indexes table, are concretely comprised the following steps:Initialize the data logger and encryption rope Draw table;
    The data being inserted into are split into N-1 character string of part matching from the beginning of its character, wherein, the string length 1~N-1 is followed successively by, N is the length of the data;
    The N-1 character string is subjected to SHA hash, and encrypted;
    Data, and data unique designation corresponding to generation are inserted in data logger;
    According to corresponding data unique designation, hash inserts the N-1 character string in encrypted indexes table.
  2. 2. the method for data base encryption field portions matching inquiry according to claim 1, it is characterised in that create data note The step of record table is specially:
    Establish data unique designation row and arranged with encrypted fields;
    Merge the data unique designation row and arranged with encrypted fields, generate data logger.
  3. 3. the method for data base encryption field portions matching inquiry according to claim 2, it is characterised in that merge the number Arrange according to unique designation and arranged with encrypted fields, after generating data logger, in addition to:Non-encrypted field row are established, and are closed And arrive data logger.
  4. A kind of 4. system of data base encryption field portions matching inquiry, it is characterised in that including:
    Data logger module, for creating data logger;
    Encrypted indexes table module, for according to the data logger, encrypted indexes table to be created to the encrypted fields;
    Encrypting module is obtained, field to be checked is obtained for program, and encrypt;
    First inquiry logging modle, for the data matched completely to be inquired by SQL statement in data logger, and will be complete The data record matched entirely is the first value;
    Hash module, for the field to be checked to be carried out into SHA hash, inquired about by SQL statement in encrypted indexes table Corresponding data unique designation;
    Second inquiry logging modle, for according to corresponding data unique designation, in data logger inquiring data uniquely marks All data of will, and it is recorded as second value;
    Merging module, for merging first value and second value;
    Wherein, in addition to Data insertion module, for inserting data, the number in the data logger and encrypted indexes table Also include according to insertion module:
    Unit initially is changed, for initializing the data logger and encrypted indexes table;
    Split cells, for the data being inserted into be split into N-1 character string of part matching from the beginning of its character, wherein, The string length is followed successively by 1~N-1, and N is the length of the data;
    Ciphering unit is hashed, for the N-1 character string to be carried out into SHA hash, and is encrypted;
    Generation unit is inserted, for inserting data, and data unique designation corresponding to generation in data logger;Character string is inserted Unit, for the data unique designation corresponding to, hash inserts the N-1 character string in encrypted indexes table.
  5. 5. the system of data base encryption field portions matching inquiry according to claim 4, it is characterised in that obtain encryption mould Block also includes:
    Column unit, for establishing data unique designation row and being arranged with encrypted fields;
    Generation unit, for merging the data unique designation row and being arranged with encrypted fields, generate data logger.
  6. 6. the system of data base encryption field portions matching inquiry according to claim 5, it is characterised in that the column unit It is additionally operable to establish non-encrypted field row, and is merged into data logger.
CN201510463863.7A 2015-07-31 2015-07-31 Data base encryption field portions matching inquiry method and system Active CN105138585B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510463863.7A CN105138585B (en) 2015-07-31 2015-07-31 Data base encryption field portions matching inquiry method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510463863.7A CN105138585B (en) 2015-07-31 2015-07-31 Data base encryption field portions matching inquiry method and system

Publications (2)

Publication Number Publication Date
CN105138585A CN105138585A (en) 2015-12-09
CN105138585B true CN105138585B (en) 2018-04-10

Family

ID=54723934

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510463863.7A Active CN105138585B (en) 2015-07-31 2015-07-31 Data base encryption field portions matching inquiry method and system

Country Status (1)

Country Link
CN (1) CN105138585B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106202386A (en) * 2016-07-08 2016-12-07 唐博 The method automatically analyzing database table relation
CN106934298B (en) * 2017-03-06 2019-12-31 戴林 Transparent encryption system for universal database
CN108664798B (en) * 2017-03-31 2021-06-29 北京京东尚科信息技术有限公司 Information encryption method and device
CN109101837B (en) * 2018-08-10 2020-09-15 苏州浪潮智能科技有限公司 Data storage method and device
US11239996B2 (en) 2019-12-18 2022-02-01 International Business Machines Corporation Weighted partial matching under homomorphic encryption
CN112583809B (en) * 2020-12-09 2022-09-30 北京国研数通软件技术有限公司 Data encryption and decryption method of non-immersion multiple encryption algorithms
CN112861192B (en) * 2021-02-25 2023-08-25 中冶南方连铸技术工程有限责任公司 Equipment tracking method and system
CN113076562A (en) * 2021-05-08 2021-07-06 北京炼石网络技术有限公司 Database encryption field fuzzy retrieval method based on GCM encryption mode
CN116756760B (en) * 2023-08-21 2023-12-12 合肥安永信息科技有限公司 Searchable database encryption system and method thereof

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1347050A (en) * 2000-09-27 2002-05-01 日本电气株式会社 Encrypted file system, method for searching encrypted file, and computer readable medium
CN101802836A (en) * 2007-09-21 2010-08-11 爱立信电话股份有限公司 Systems and methods for partial matching searches of encrypted retained data
CN104106075A (en) * 2011-11-24 2014-10-15 商业合伙有限公司 Secure database searching

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7743069B2 (en) * 2004-09-03 2010-06-22 Sybase, Inc. Database system providing SQL extensions for automated encryption and decryption of column data
US20130238646A1 (en) * 2012-03-06 2013-09-12 Evrichart, Inc. Partial-Match Searches of Encrypted Data Sets

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1347050A (en) * 2000-09-27 2002-05-01 日本电气株式会社 Encrypted file system, method for searching encrypted file, and computer readable medium
CN101802836A (en) * 2007-09-21 2010-08-11 爱立信电话股份有限公司 Systems and methods for partial matching searches of encrypted retained data
CN104106075A (en) * 2011-11-24 2014-10-15 商业合伙有限公司 Secure database searching

Also Published As

Publication number Publication date
CN105138585A (en) 2015-12-09

Similar Documents

Publication Publication Date Title
CN105138585B (en) Data base encryption field portions matching inquiry method and system
CN112800088B (en) Database ciphertext retrieval system and method based on bidirectional security index
CN106815350B (en) Dynamic ciphertext multi-keyword fuzzy search method in cloud environment
US10554385B2 (en) Method for providing encrypted data in a database and method for searching on encrypted data
CN105681280B (en) Encryption method can search for based on Chinese in a kind of cloud environment
CN103107889B (en) A kind of cloud computing environment data encryption storage system and method that can search for
CN105610793B (en) A kind of outsourcing data encryption storage and cryptogram search system and its application process
US9021259B2 (en) Encrypted database system, client terminal, encrypted database server, natural joining method, and program
US10984052B2 (en) System and method for multiple-character wildcard search over encrypted data
CN108334612A (en) A kind of nearly Chinese character full text fuzzy retrieval method of shape for ciphertext domain
CN101504668B (en) Cryptograph index supported database transparent encryption method
CN110457915B (en) Efficient searchable symmetric encryption method and system with forward and backward security
CN112800445B (en) Boolean query method for forward and backward security and verifiability of ciphertext data
CN110166466B (en) Multi-user searchable encryption method and system capable of efficiently updating permissions
US20150270958A1 (en) Decryptable index generation method for range search, search method, and decryption method
Singh et al. Database security using encryption
CN108416037B (en) Central keyword ciphertext searching method based on two-stage index in cloud environment
CN114417073B (en) Neighbor node query method and device of encryption graph and electronic equipment
CN113434739B (en) Forward-safe multi-user dynamic symmetric encryption retrieval method in cloud environment
CN104794243B (en) Third party's cipher text retrieval method based on filename
CN110765469A (en) Efficient and robust dynamic searchable symmetric encryption method and system
CN110011959A (en) Date storage method, data query method and system
CN106874379B (en) Ciphertext cloud storage-oriented multi-dimensional interval retrieval method and system
CN112187449B (en) Quantum database query method, encryption and decryption method and system
JP6493402B2 (en) Addition device, deletion device, addition request device, data search system, data search method, and computer program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant