Tag

Encrypted Data

1 views collected around this technical thread.

Architecture Digest
Architecture Digest
Aug 6, 2024 · Information Security

How to Perform Fuzzy Queries on Encrypted Data: Approaches and Trade‑offs

This article examines why encrypted data is unfriendly to fuzzy search, categorises three implementation strategies—naïve, conventional, and advanced—analyses their advantages and disadvantages, and provides practical guidance and reference links for securely enabling fuzzy queries on encrypted fields.

Database QueryEncrypted Dataalgorithm design
0 likes · 11 min read
How to Perform Fuzzy Queries on Encrypted Data: Approaches and Trade‑offs
Top Architect
Top Architect
May 24, 2024 · Databases

How to Perform Fuzzy Search on Encrypted Data

This article examines various techniques for enabling fuzzy queries on encrypted fields, comparing naive memory‑based methods, conventional token‑based approaches that leverage database indexes, and advanced cryptographic schemes, and recommends practical solutions for real‑world applications.

Database EncryptionEncrypted DataQuery Optimization
0 likes · 12 min read
How to Perform Fuzzy Search on Encrypted Data
Architect's Guide
Architect's Guide
Oct 7, 2023 · Backend Development

Implementing Fuzzy Search on Encrypted Sensitive Fields in a Spring Boot Backend

This article explains how to enable fuzzy searches on encrypted sensitive fields such as names, phone numbers, and ID numbers in a Spring Boot backend by using a tokenized ciphertext mapping table, outlining four possible solutions, recommending the tokenized approach, and providing complete configuration and code examples.

Backend DevelopmentDatabase EncryptionEncrypted Data
0 likes · 11 min read
Implementing Fuzzy Search on Encrypted Sensitive Fields in a Spring Boot Backend
AntTech
AntTech
Dec 22, 2022 · Information Security

From Plaintext to Data‑in‑Encryption: The Emerging Era of Data “密态” and Trusted Privacy Computing

The article explores how the shift from plaintext data to fully encrypted "data‑in‑state" (密态) is reshaping data security, privacy‑preserving computation, regulatory compliance, and market commercialization, with insights from Ant Group’s VP Dr. Wei Tao on technology pathways, challenges, and future prospects.

Data SecurityEncrypted DataTrusted Computing
0 likes · 30 min read
From Plaintext to Data‑in‑Encryption: The Emerging Era of Data “密态” and Trusted Privacy Computing
Architecture Digest
Architecture Digest
Sep 28, 2022 · Information Security

Approaches to Fuzzy Search on Encrypted Data

This article examines why encrypted data hinders fuzzy queries and compares three categories of solutions—naïve in‑memory decryption, conventional database‑level techniques, and advanced algorithmic methods—highlighting their trade‑offs in security, performance, and storage overhead.

DatabaseEncrypted Datafuzzy search
0 likes · 10 min read
Approaches to Fuzzy Search on Encrypted Data