Research Article
Query-Biased Preview over Outsourced and Encrypted Data
Algorithm 1
Secure additive coding for matrix.
| Input random strings of length | | : | | (1) check the validity of the input, continue if and for all , | | , or output Ø otherwise | | (2) initialize a ciphertext matrix , each element is set to | | ( bits), and initialize cursors and set each ( bits) | | (3) for do | | (4) for do | | (5) for do | | (6) | | (7) | | (8) end for | | (9) end for | | (10) encrypt the ith row as | | (11) end for | | (12) output | | Decode : | | (1) initialize a temporary data row with each element | | be bits, and set | | (2) for each in , let the binary form of be , then | | | | (3) output |
|