Research Article
Query-Biased Preview over Outsourced and Encrypted Data
Algorithm 1
Secure additive coding for matrix.
Input random strings of length | : | (1) check the validity of the input, continue if and for all , | , or output Ø otherwise | (2) initialize a ciphertext matrix , each element is set to | ( bits), and initialize cursors and set each ( bits) | (3) for do | (4) for do | (5) for do | (6) | (7) | (8) end for | (9) end for | (10) encrypt the ith row as | (11) end for | (12) output | Decode : | (1) initialize a temporary data row with each element | be bits, and set | (2) for each in , let the binary form of be , then | | (3) output |
|