Linear spaces and transversal designs: k-anonymous combinatorial configurations for anonymous database search
نویسندگان
چکیده
Anonymous database search protocols allow users to query a database anonymously. This can be achieved by letting the users form a peerto-peer community and post queries on behalf of each other. In this article we discuss an application of combinatorial configurations (also known as regular and uniform partial linear spaces) to a protocol for anonymous database search, as defining the key-distribution within the user community that implements the protocol. The degree of anonymity that can be provided by the protocol is determined by properties of the neighborhoods and the closed neighborhoods of the points in the combinatorial configuration that is used. Combinatorial configurations with unique neighborhoods or unique closed neighborhoods are described and we show how to attack the protocol if such configurations are used. We apply k-anonymity arguments and present the combinatorial configurations with k-anonymous neighborhoods and with k-anonymous closed neighborhoods. The transversal designs and the linear spaces are presented as optimal configurations among the configurations with k-anonymous neighborhoods and k-anonymous closed neighborhoods, respectively.
منابع مشابه
Erratum to: Linear spaces and transversal designs: $$k$$ -anonymous combinatorial configurations for anonymous database search
Anonymous database search protocols allow users to query a database anonymously. This can be achieved by letting the users form a peerto-peer community and post queries on behalf of each other. In this article we discuss an application of combinatorial configurations (also known as regular and uniform partial linear spaces) to a protocol for anonymous database search, as defining the key-distri...
متن کاملOn the bound for anonymous secret sharing schemes
In anonymous secret sharing schemes, the secret can be reconstructed without knowledge of which participants hold which shares. In this paper, we derive a tighter lower bound on the size of the shares than the bound of Blundo and Stinson for anonymous (k, n)threshold schemes with 1 < k < n. Our bound is tight for k = 2. We also show a close relationship between optimum anonymous (2, n)threshold...
متن کاملمقایسه نیمرخ شخصیتی معتادان گمنام و غیر گمنام زندانی مرد
Aim: This study compared the personality profiles of inmate anonymous and non-anonymous male addicts. Method: The participants of study were anonymous and non-anonymous male addicts of the prisons of the Hamadan province in 1391. The population was 3130 addicts, including 627 anonymous and 2503 non-anonymous addicts. The 310 addicts were selected by stratified random sampling the sample size wa...
متن کاملUsing (0, 1)-geometries for collusion-free P2P-user private information retrieval
Using (0, 1)-geometries for collusion-free P2P-user private information retrieval Maria Bras-Amorós, Klara Stokes, Marcus Greferath In the previous years some effort has been done for finding systems guaranteeing private information retrieval (PIR) in front of a data base or a search engine [2]. The aim is that the server owing the information to be retrieved should not learn what are the queri...
متن کاملComparing the effects of combined cognitive behavioral therapy and methadone therapy with the association of narcotics anonymous addicts on executive functions of quitting drugs volunteer addicts in Jiroft
Introduction: Currently, a combination of drug and psychological therapies is common to treat and prevent relapse in addicts. One of the most important strategies for recovery and prevention of relapse is psychological therapy and maintenance therapy applying drugs such as methadone. Therefore, the present study compares the effect of cognitive-behavioral and methadone therapy combination thera...
متن کامل