An information protection scheme based upon number theory
The Computer Journal
Controlling the access requests in an information protection system
Information Processing and Management: an International Journal
A database encryption system with subkeys
ACM Transactions on Database Systems (TODS)
The tracker: a threat to statistical database security
ACM Transactions on Database Systems (TODS)
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
On the implementation of security measures in information systems
Communications of the ACM
Computers and Intractability: A Guide to the Theory of NP-Completeness
Computers and Intractability: A Guide to the Theory of NP-Completeness
Protection: principles and practice
AFIPS '72 (Spring) Proceedings of the May 16-18, 1972, spring joint computer conference
A knapsack-type public key cryptosystem based on arithmetic in finite fields
IEEE Transactions on Information Theory - Part 1
Hi-index | 0.00 |
The information protection of database is a crucial challenge in computer science. It ensures that any access to information kept in database is authorized, thus preventing data from unauthorized altering, destroying, and modification. We propose a novel and simple information protection scheme in this paper. The main operations of this system are ceilings and floors functions on integer. The security of our scheme is based on the difficulty on breaking a trapdoor one-way hash function. In our scheme, a database manager needs to conduct an inner product between the protected information and the enciphering key to encrypt a record of the database. On the other hand, the manager is able to decrypt the record by conducting a multiplication and a modulus operation.