Research Article

Query-Biased Preview over Outsourced and Encrypted Data

Algorithm 1

Secure additive coding for matrix.
Input random strings of length
:
(1) check the validity of the input, continue if and for all ,
   , or output Ø otherwise
(2) initialize a ciphertext matrix , each element is set to
  ( bits), and initialize cursors and set each ( bits)
(3) for   do
(4) for   do
(5)  for   do
(6)   
(7)   
(8)  end for
(9) end for
(10)encrypt the ith row as
(11) end for
(12) output
Decode :
(1) initialize a temporary data row with each element
be bits, and set
(2) for each in , let the binary form of be , then
(3) output