Journal of Computer Applications ›› 2014, Vol. 34 ›› Issue (4): 1019-1024.DOI: 10.11772/j.issn.1001-9081.2014.04.1019
Previous Articles Next Articles
GU Chunsheng1,2,JING Zhengjun1,3,LI Hongwei1,YU Zhimin1
Received:
2013-10-12
Revised:
2013-11-21
Online:
2014-04-01
Published:
2014-04-29
Contact:
GU Chunsheng
Supported by:
;The natural science foundation of universities of Jiangsu province;The research fund for the graduate innovation program of Jiangsu province
通讯作者:
古春生
作者简介:
基金资助:
国家自然科学基金资助项目;江苏省高校自然科学研究项目;江苏省普通高校研究生科研创新计划项目;江苏理工学院科研基金资助项目
CLC Number:
GU Chunsheng JING Zhengjun LI Hongwei YU Zhimin. Security Analysis of Range Query with Single Assertion on Encrypted Data[J]. Journal of Computer Applications, 2014, 34(4): 1019-1024.
古春生 景征骏 李红卫 于志敏. 单断言的密文区间检索方案的安全分析[J]. 计算机应用, 2014, 34(4): 1019-1024.
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.joca.cn/EN/10.11772/j.issn.1001-9081.2014.04.1019
[1]CAI K, ZHANG M, FENG D. Secure range query with single assertion on encrypted data [J]. Chinese Journal of Computers, 2011, 34(11): 2093-2103. (蔡克,张敏,冯登国.基于单断言的安全的密文区间检索[J].计算机学报, 2011, 34(11):2093-2103.) |
[1] | Ping ZHANG, Yiqiao JIA, Jiechang WANG, Nianfeng SHI. Three-factor anonymous authentication and key agreement protocol [J]. Journal of Computer Applications, 2021, 41(11): 3281-3287. |
[2] | Xiaoqiong PANG, Ting YANG, Wenjun CHEN, Yunting WANG, Tianye LIU. Digital rights management scheme based on secret sharing in blockchain environment [J]. Journal of Computer Applications, 2021, 41(11): 3257-3265. |
[3] | Guangfu WU, Ziheng DAI. Cascaded quasi-cyclic moderate-density parity-check code based public key scheme for resisting reaction attack [J]. Journal of Computer Applications, 2021, 41(11): 3274-3280. |
[4] | Li LI, Hongfei YANG, Xiuze DONG. Hierarchical file access control scheme with identity-based multi-conditional proxy re-encryption [J]. Journal of Computer Applications, 2021, 41(11): 3251-3256. |
[5] | Lifeng GUO, Qianli WANG. Adaptive secure outsourced attribute-based encryption scheme with keyword search [J]. Journal of Computer Applications, 2021, 41(11): 3266-3273. |
[6] | Xiaoling SUN, Guang YANG, Yanping SHEN, Qiuge YANG, Tao CHEN. Searchable encryption scheme based on splittable inverted index [J]. Journal of Computer Applications, 2021, 41(11): 3288-3294. |
[7] | . Key Rcovery Attack of Blow-CAST-Fish Based on Differential Tables [J]. Journal of Computer Applications, 0, (): 0-0. |
[8] | . Deep robust watermarking algorithm based on multiscale knowledge learning [J]. Journal of Computer Applications, 0, (): 0-0. |
[9] | SHEN Ziyi, WANG Weiya, JIANG Donghua, RONG Xianwei. Visual image encryption algorithm based on Hopfield chaotic neural network and compressive sensing [J]. Journal of Computer Applications, 2021, 41(10): 2893-2899. |
[10] | WU Guangfu, WANG Yingjun. Secure storage and sharing scheme of internet of vehicles data based on hybrid architecture of blockchain and cloud-edge computing [J]. Journal of Computer Applications, 2021, 41(10): 2885-2892. |
[11] | . Efficient robust zero watermarking algorithm for 3D medical images based on ray-casting sampling and quaternion orthogonal moments [J]. Journal of Computer Applications, 0, (): 0-0. |
[12] | XU Liyun, YAN Tao, QIAN Yuhua. Audio encryption algorithm in fractional domain based on cascaded chaotic system [J]. Journal of Computer Applications, 2021, 41(9): 2623-2630. |
[13] | CHEN Hengheng, NI Zhiwei, ZHU Xuhui, JIN Yuanyuan, CHEN Qian. Differential privacy high-dimensional data publishing method via clustering analysis [J]. Journal of Computer Applications, 2021, 41(9): 2578-2585. |
[14] | ZHANG Yongbin, CHANG Wenxin, SUN Lianshan, ZHANG Hang. Detection method of domains generated by dictionary-based domain generation algorithm [J]. Journal of Computer Applications, 2021, 41(9): 2609-2614. |
[15] | GE Jihong, SHEN Tao. Energy data access control method based on blockchain [J]. Journal of Computer Applications, 2021, 41(9): 2615-2622. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||