Research on Database Encryption and Verification Methods

王晓峰,王尚平,秦波
DOI: https://doi.org/10.3969/j.issn.1006-4710.2002.03.011
2002-01-01
Abstract:The information encryption methods and ideas of database system are discussed. The methods of database encryption based on files or records or fields and on subkey are analyzed and the database encryption technology that generates subkey is introduced. It is proposed to apply the theory of private homomorphism to encrypt the database important or sensitive information,thus realizing direct operation of encrypted message.
What problem does this paper attempt to address?