2021
DOI: 10.4018/ijcini.287600
|View full text |Cite
|
Sign up to set email alerts
|

Research Review on the Application of Homomorphic Encryption in Database Privacy Protection

Abstract: With the advent and development of database applications such as big data and data mining, how to ensure the availability of data without revealing sensitive information has been a significant problem for database privacy protection. As a critical technology to solve this problem, homomorphic encryption has become a hot research area in information security at home and abroad in recent years. The paper sorted out, analyzed, and summarized the research progress of homomorphic encryption technology in database p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 101 publications
(63 reference statements)
0
2
0
Order By: Relevance
“…The calculation formula is shown in (5). PSNR indicates the degree of distortion of the image containing the watermark, and a smaller value means a greater degree of distortion of the original image; the calculation formula is shown in Equation (6).…”
Section: Performance Indexmentioning
confidence: 99%
See 1 more Smart Citation
“…The calculation formula is shown in (5). PSNR indicates the degree of distortion of the image containing the watermark, and a smaller value means a greater degree of distortion of the original image; the calculation formula is shown in Equation (6).…”
Section: Performance Indexmentioning
confidence: 99%
“…By embedding and extracting the watermark in the ciphertext domain, the information carried by the carrier image will be effectively hidden, significantly improving the carrier image's security. Moreover, homomorphic encryption can safely hand over the encrypted carrier image and watermark to a third party for processing, so there is no need to worry about security risks such as information theft and alteration [6]. The zero watermarking technique is implemented by taking advantage of the vital resources of third parties.…”
Section: Introductionmentioning
confidence: 99%