文件索引的安全记录,并收集所有您的加密文件索引,通过它可以在一个集中的方式处理所有的在短短的安全文件索引加密文件。
The Safe File Index records and collects all your encrypted file indexes, by which you can process all your encrypted files in just the Safe File Index in a centralized way.
最终,它会对加密的数据和索引进行编码,编码的方式使得之后数据校验器能够使用存储证据来验证数据的完整性。
Finally, it encodes the encrypted data and index in such a way that the data verifier can later verify their integrity using a proof of storage.
然后它会使用可搜索的加密模式对索引进行加密,用基于属性的加密模式以恰当的手段对唯一密钥加密。
It then encrypts the index using a searchable encryption scheme and encrypts the unique key with an attribute-based encryption scheme under an appropriate policy.
而且这种加密方式依赖于数据库系统的扩展索引机制,并不能在所有数据库上实现。
Moreover, the encryption method is based on the extended index mechanism of database system, and can not be implemented on all databases.
首先为其建立索引,并使用对称的加密模式(例如aes)以唯一的密钥对其进行加密。
Begins by indexing it and encrypting it with a symmetric encryption scheme (e.g., AES) under a unique key.
这个验证器包括客户端timestamp-1(由对话密钥进行加密)和索引 ID(位于这个客户端连接的服务器表中)。
This verifier includes the client timestamp - 1 (encrypted by conversation key) and the index ID in the server table for this client connection.
库内扩展加密:通过使用视图、触发器、扩展索引等机制,实现透明加密。
Expansion of the Library: through the use of views, triggers, extensions and other mechanisms to achieve transparent encryption.
根据加密数据库的特点,分析了建立密文索引需要考虑的主要因素。
According to the characters of the ciphertext database, the major factors to create a ciphertext index are analyzed.
针对数据库中数据的保密性问题,分析了目前已有的一些加密机制,提出了一种基于密文索引的新的查询方法。
Aiming at the data secrecy problem in database, we have analyzed some present encryption mechanism and put forward a new query method based on ciphertext index.
详细阐述了其加密原理和密文索引结构,对重复性数据的加密处理和算法抗攻击性进行了分析。
The encryption principle and index structure of encryption data are developed. The encryption processing of duplicate data and algorithm exposure are analyzed.
详细阐述了其加密原理和密文索引结构,对重复性数据的加密处理和算法抗攻击性进行了分析。
The encryption principle and index structure of encryption data are developed. The encryption processing of duplicate data and algorithm exposure are analyzed.
应用推荐