Rocky Mountain College * Department of Computer Science * 406 208 3193 *
Privacy-Preserving Data Set Union
A. Segre, A. Wildenberg, V. Vieland and Y. Zhang,
Proceedings of the 2006 Conference on Privacy in Statistical Databases
This paper describes a cryptographic protocol for merging twodata sets
based on identifiers without divulging those identifier records;
technically, the protocol computes a blind set-theoretic union.
Applications for this protocol arise, for example, in data analysis
for biomedical application areas, where identifying fields (e.g.,
patient names) are protected by governmental privacy regulations or by
institutional research board policies.
privacy-preserving data mining, blind database union.
You know we're constantly taking. We don't make most of the
food we eat, we don't grow it, anyway. We wear clothes other
people make, we speak a language other people developed, we use
a mathematics other people evolved and spent their lives
building. I mean we're constantly taking things. It's a
wonderful ecstatic feeling to create something and put it into
the pool of human experience and knowledge. -- Steve Jobs,
Rolling Stone, November 1983.