Research Article

Order-Revealing Encryption Scheme with Comparison Token for Cloud Computing

Algorithm 1

Secure BF.
Input:
 hash function:
 secret keys:
 data item:
Output:
 –Bloom filter:
(1)In order to hide the frequency, DO adds a random fractional part for the data item as , where has the same number of bits with the data item and is a -bit number;
(2)DO computes prefix family of as ;
(3)for to do
(4) To remove the correlation among different nodes, DO chooses a random number which has the same size with secret keys ;
(5)for j←1 to s do
(6)  DO first computes hash value and then sets 1 on the position ;
(7)end for
(8)end for
(9)After inserting the prefix family, we have a secure Bloom filter .