Confidentiality preserving scheme for the algorithm raid-pir
We consider the problem of confidentiality of information in the database scheme of private information retrieval from remote servers. It is assumed that r servers are used to store the database (r is odd), and anonymous access to information scheme is used by RAID-PIR scheme. We built encryption method and the distribution of the database so that the encrypted data in each of the storage could not violate the privacy of the information base. Also, we built a read and a rewrite algorithms without violating data confidentiality and anonymity.
Keywords
анонимность данных, PIR, 'распределение данных, data anonymity, PIR, data distributionAuthors
Name | Organization | |
Kascheev M. R. | South Federal University | kashcheyewm@gmail.com |
Kosolapov Y. V. | South Federal University | itaim@mail.ru |
References

Confidentiality preserving scheme for the algorithm raid-pir | Applied Discrete Mathematics. Supplement. 2016. № 9.