Confidentiality preserving scheme for the algorithm RAID-PIR
Prikladnaya Diskretnaya Matematika. Supplement, no. 9 (2016), pp. 87-89
Cet article a éte moissonné depuis la source Math-Net.Ru
We consider the problem of confidentiality of information in the database scheme of private information retrieval from remote servers. It is assumed that $r$ servers are used to store the database ($r$ is odd), and anonymous access to information scheme is used by RAID-PIR scheme. We built encryption method and the distribution of the database so that the encrypted data in each of the storage could not violate the privacy of the information base. Also, we built a read and a rewrite algorithms without violating data confidentiality and anonymity.
Keywords:
data anonymity, data distribution.
Mots-clés : PIR
Mots-clés : PIR
@article{PDMA_2016_9_a32,
author = {M. R. Kascheev and Y. V. Kosolapov},
title = {Confidentiality preserving scheme for the algorithm {RAID-PIR}},
journal = {Prikladnaya Diskretnaya Matematika. Supplement},
pages = {87--89},
year = {2016},
number = {9},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/PDMA_2016_9_a32/}
}
M. R. Kascheev; Y. V. Kosolapov. Confidentiality preserving scheme for the algorithm RAID-PIR. Prikladnaya Diskretnaya Matematika. Supplement, no. 9 (2016), pp. 87-89. http://geodesic.mathdoc.fr/item/PDMA_2016_9_a32/
[1] Pfitzmann A., Hansen M., A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management, , Data obrascheniya 30.03.2016 https://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.18.pdf
[2] Chor B., Goldreich O., Kushilevitz E., Sudan M., “Private information retrieval”, J. ACM, 45:6 (1998), 965–981 | DOI | MR
[3] Demmler D., Herzberg A., Schneider T., “RAID-PIR: Practical Multi-Server PIR”, Proc. 6th edition of the ACM Workshop on Cloud Computing Security, N.Y., USA, 2014, 45–56