期刊文献+

基于SHA-3的密文数据检索技术 被引量:1

A CIPHERTEXT DATA RETRIEVAL TECHNOLOGY BASED ON SHA-3
下载PDF
导出
摘要 SHA-3算法的研究和应用已成为当前学术研究的热点。针对已有密文数据检索系统检索效率低的问题,在分析和研究已有密文数据检索技术的基础上,利用AES-128算法和SHA-3算法,设计和实现了基于SHA-3的密文数据检索系统。实验证明,该系统能够实现数据库加密、密文精确检索和密文模糊检索,提高密文检索效率,保证数据库安全。二次检索模型和SHA-3算法的使用,使此系统的检索准确性和检索效率达到无索引明文检索的70%。 Research and application of SHA-3 algorithm has become the focus in current academic studies. Aiming at the low efficiency problem of existing ciphertext retrieval system and on the basis of analysing and studying the existing ciphertext data retrieval technology,we use AES-128 and SHA-3 algorithms to design and implement an SHA-3-based ciphertext data retrieval system. Experiments prove that the system can realise database encryption,precise ciphertext retrieval and fuzzy ciphertext retrieval,improves the efficiency of ciphertext retrieval and guarantees the safety of the database. The use of twice retrieval model and SHA-3 algorithm makes the retrieval accuracy and efficiency of the system reaches 70% of the plaintext retrieval without index.
出处 《计算机应用与软件》 CSCD 2015年第8期279-282,314,共5页 Computer Applications and Software
基金 国家自然科学基金项目(61370188) 北京市支持中央高校共建项目-青年英才计划 中央高校基本科研业务费专项资金课题 北京电子科技学院信息安全重点实验室课题
关键词 数据库加密 密文数据检索 AES-128算法 SHA-3算法 二次检索模型 Database encryption Ciphertext data retrieval AES-128 algorithm SHA-3 algorithm Twice retrieval model
  • 相关文献

参考文献13

  • 1NIST Tech Beat. NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition[EB/OL]. 2012-10-02. http://www. nist. gov/itl/csd/sha -100212.cfm. 被引量:1
  • 2张璇,彭朋,黄勤龙.数据库密文检索技术的设计与实现[J].云南大学学报(自然科学版),2010,32(6):646-651. 被引量:3
  • 3Boneh D,Crescenzo G D,Osttovsky R,et al. Public-key encryption withkeyword search [ C ]//Cachin C. Proceedings of Eurocrypt 2004,LNCS. Springer-Verlag, May 2004. 被引量:1
  • 4Kui R, Cong Wa, Ning C, et al. Secure Hanked Keyword Search overEncrypted Data [ C ]//2010 International Conference on DistributedComputing Systems. 被引量:1
  • 5Wang X,Liu M,Tian C,et al. Improved Nguyen-Vidick heuristic sievealgorithm for shortest vector problem [ C] //Proceedings of the 6 th ACMSymposium Information, Computer and Communications Security,2010:1 -9. 被引量:1
  • 6NIST. The SHA-3 Finalists candidates U S department of commerce na-tional information service[ EB/OL]. 2011. 被引量:1
  • 7Guido Bertoni, Joan Daemen, Michael Peeters, et al. The Keccak spongefunction family [EB/OL]. 2012-04-. http://keccak, noekeon. org/news. Html. 被引量:1
  • 8Guido Bertoni, Joan Daemen. Michael Peeters & Gillespie Van Assche.Keccak [ C ]//Advances in Cryptology-EUHOCRYPT, 2013: 313-314. 被引量:1
  • 9Dawn Xiodong Song, David Wagner, Adrian Perrig. Practieal Teehniquefor Searches on Enerypted Data[ C ] //Proeeedings of IEEE symposiumon Seeurity and Privacy,IEEE,2000. 被引量:1
  • 10郭利刚..密文全文检索系统的研究与实现[D].武汉理工大学,2011:

二级参考文献11

共引文献2

同被引文献9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部