RUS  ENG
Full version
JOURNALS // Prikladnaya Diskretnaya Matematika. Supplement // Archive

Prikl. Diskr. Mat. Suppl., 2016 Issue 9, Pages 87–89 (Mi pdma274)

Mathematical Foundations of Computer Security

Confidentiality preserving scheme for the algorithm RAID-PIR

M. R. Kascheev, Y. V. Kosolapov

Institute of Mathematics, Mechanics and Computer Sciences, Southern Federal University, Rostov-on-Don

Abstract: We consider the problem of confidentiality of information in the database scheme of private information retrieval from remote servers. It is assumed that $r$ servers are used to store the database ($r$ is odd), and anonymous access to information scheme is used by RAID-PIR scheme. We built encryption method and the distribution of the database so that the encrypted data in each of the storage could not violate the privacy of the information base. Also, we built a read and a rewrite algorithms without violating data confidentiality and anonymity.

Keywords: data anonymity, PIR, data distribution.

UDC: 517.19

DOI: 10.17223/2226308X/9/33



© Steklov Math. Inst. of RAS, 2025