Rocky Mountain College * Department of Computer Science * 406 208 3193 * turn on javascript to see my email

Privacy-Preserving Data Set Union

A. Segre, A. Wildenberg, V. Vieland and Y. Zhang, Proceedings of the 2006 Conference on Privacy in Statistical Databases


This paper describes a cryptographic protocol for merging twodata sets based on identifiers without divulging those identifier records; technically, the protocol computes a blind set-theoretic union. Applications for this protocol arise, for example, in data analysis for biomedical application areas, where identifying fields (e.g., patient names) are protected by governmental privacy regulations or by institutional research board policies.


privacy-preserving data mining, blind database union.


You know we're constantly taking. We don't make most of the food we eat, we don't grow it, anyway. We wear clothes other people make, we speak a language other people developed, we use a mathematics other people evolved and spent their lives building. I mean we're constantly taking things. It's a wonderful ecstatic feeling to create something and put it into the pool of human experience and knowledge. -- Steve Jobs, Rolling Stone, November 1983.