Private information retrieval

Data processing: database and file management or data structures – Database design – Data structure types

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

707 10, 380 4, 380 25, 380 49, G06F 1730

Patent

active

058550186

ABSTRACT:
Method for retrieving data from a database, while assuring privacy, which comprises providing a database address for the data sought to be retrieved, generating at least two messages and communicating them to two or more database copies, generating two replies from the database copies, wherein one or more of said messages depends on the database address, a pseudo random or random number and wherein each reply depends on the message transmitted to the specific database copy, and the retrieved data is calculated as a function of said replies.

REFERENCES:
patent: 5123045 (1992-06-01), Ostrovsku et al.
patent: 5436972 (1995-07-01), Fischer
patent: 5530758 (1996-06-01), Marino, Jr. et al.
patent: 5614927 (1997-03-01), Gifford et al.
patent: 5630079 (1997-05-01), McLaughlin
B. Chor, et al., Private Information Retrieval, Annual Symposium on Foundations of Computer Science, 1995, vol. 36, pp.:41-50, Oct., 1995.
A.J. Menezes, et al., Advances in Cryptology -CRYPTO '90 Proceedings, Springer-Verlag, pp. 63-76.
R.L. Rivest, et al., Foundations of Secure Computation, Academic Press, Inc., N.Y. San Francisco London, pp. 169 -179, (1978).
F. Chin, Security Problems on Inference Control for SUM, MAX, and MIN Queries, Journal of the Association for Computing Machinery, vol. 33, No. 3, Jul. 1986, pp. 451-464.
M. Abadi, et al., On Hiding Information from an Oracle, Journal of Computer and System Sciences, 39, pp. 21-50, (1989).
D.E.R. Denning, Cryptography and Data Security, Addison-Wesley Publishing Company, pp. 331-340.
N.R. Adam, et al., Security-Control Methods for Statistical Databases: A Comparative Study, ACM Computing Surveys, vol. 21, No. 4, pp. 515-556; Dec. 1989.
P. Tendick, et al., A Modified Random Perturbation Method for Database Security, ACM Transactions on Database Systems, vol. 19, No. 1, pp. 47-63, Mar. 1994.
P. Pudlak, et al., Modified Ranks of Tensors and the Size of Circuits, ACM Press, pp. 523-531.
D. Beaver, et al., Hiding Instances in Multioracle Queries, Springer-Verlag, pp. 37-48.
J.D. Ullman, Principles of Database Systems, Computer Science Press, pp. 359-365.
O. Goldreich, Foundations of Cryptography (Fragments of a Book), Weizmann Institute of Science, pp. 85-91, Feb. 23, 1995.
D. Dobkin, et al., Secure Databases: Protection Against User Influence, ACM Transactions on Database Systems, vol. 4, No. 1, pp. 97-106, Mar. 1978.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Private information retrieval does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Private information retrieval, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Private information retrieval will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1430840

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.