Data processing: database and file management or data structures – Database design – Data structure types
Patent
1996-10-18
1998-12-29
Amsbury, Wayne
Data processing: database and file management or data structures
Database design
Data structure types
707 10, 380 4, 380 25, 380 49, G06F 1730
Patent
active
058550186
ABSTRACT:
Method for retrieving data from a database, while assuring privacy, which comprises providing a database address for the data sought to be retrieved, generating at least two messages and communicating them to two or more database copies, generating two replies from the database copies, wherein one or more of said messages depends on the database address, a pseudo random or random number and wherein each reply depends on the message transmitted to the specific database copy, and the retrieved data is calculated as a function of said replies.
REFERENCES:
patent: 5123045 (1992-06-01), Ostrovsku et al.
patent: 5436972 (1995-07-01), Fischer
patent: 5530758 (1996-06-01), Marino, Jr. et al.
patent: 5614927 (1997-03-01), Gifford et al.
patent: 5630079 (1997-05-01), McLaughlin
B. Chor, et al., Private Information Retrieval, Annual Symposium on Foundations of Computer Science, 1995, vol. 36, pp.:41-50, Oct., 1995.
A.J. Menezes, et al., Advances in Cryptology -CRYPTO '90 Proceedings, Springer-Verlag, pp. 63-76.
R.L. Rivest, et al., Foundations of Secure Computation, Academic Press, Inc., N.Y. San Francisco London, pp. 169 -179, (1978).
F. Chin, Security Problems on Inference Control for SUM, MAX, and MIN Queries, Journal of the Association for Computing Machinery, vol. 33, No. 3, Jul. 1986, pp. 451-464.
M. Abadi, et al., On Hiding Information from an Oracle, Journal of Computer and System Sciences, 39, pp. 21-50, (1989).
D.E.R. Denning, Cryptography and Data Security, Addison-Wesley Publishing Company, pp. 331-340.
N.R. Adam, et al., Security-Control Methods for Statistical Databases: A Comparative Study, ACM Computing Surveys, vol. 21, No. 4, pp. 515-556; Dec. 1989.
P. Tendick, et al., A Modified Random Perturbation Method for Database Security, ACM Transactions on Database Systems, vol. 19, No. 1, pp. 47-63, Mar. 1994.
P. Pudlak, et al., Modified Ranks of Tensors and the Size of Circuits, ACM Press, pp. 523-531.
D. Beaver, et al., Hiding Instances in Multioracle Queries, Springer-Verlag, pp. 37-48.
J.D. Ullman, Principles of Database Systems, Computer Science Press, pp. 359-365.
O. Goldreich, Foundations of Cryptography (Fragments of a Book), Weizmann Institute of Science, pp. 85-91, Feb. 23, 1995.
D. Dobkin, et al., Secure Databases: Protection Against User Influence, ACM Transactions on Database Systems, vol. 4, No. 1, pp. 97-106, Mar. 1978.
Chor Ben-Zion
Goldreich Oded
Kushilevitz Eyal
Amsbury Wayne
Yeda Research and Development Co. Ltd.
LandOfFree
Private information retrieval does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Private information retrieval, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Private information retrieval will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1430840