5Brian Gladman. A Specification for Rijndael,the AES Algorithm [ EB/OL ]. http://www. crypto. rub. de/praktika/escm/aesspec. pdf,2002-05.
6Rivest R L,Adleman L,Dertouzos M L.On Data Banks and Privacy Homomorphism[C]//In DeMillo R D.Foundations of Secure Computations.[s.l.]:Academic Press,1978:169-177.
7Domingo-Ferrer J.A New Privacy and Homomorphism Applications[J].Information Processing Letters,1996,60(5):277-282.
8Hacigumus H,Iyer B,Li C,et al.Executing SQL over Encrypted Data in the Database-Dervice-Provider Model[C]//In Proceedings SIGMOD 02,Madison,International Conference on Management of Data.Wisconsin,USA:[s.n.],2002:216-227.
9Fischmann M,Gunther O.Privacy Tradeoffs in Database Service Architectures[C]//In Proceedings of BIZSEC 03,the First ACM Workshop on Business Driven Security Engineering.Berlin,Germany:[s.n.],2003.
10Davida G I,Wells D H,Kam J H.A Database Encryption System with Subkeys[J].ACM Trans on Database Systems,1981(6):31-37.