Negative representations of information

被引:23
作者
Esponda, Fernando [1 ]
Forrest, Stephanie [2 ]
Helman, Paul [1 ]
机构
[1] Univ New Mexico, Dept Comp Sci, Albuquerque, NM 87131 USA
[2] Santa Fe Inst, Santa Fe, NM 87501 USA
基金
美国国家科学基金会;
关键词
Negative databases; Immune-inspired algorithms; Privacy information hiding; Data representations;
D O I
10.1007/s10207-009-0078-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a negative representation, a set of elements (the positive representation) is depicted by its complement set. That is, the elements in the positive representation are not explicitly stored, and those in the negative representation are. The concept, feasibility, and properties of negative representations are explored in the paper; in particular, its potential to address privacy concerns. It is shown that a positive representation consisting of n l-bit strings can be represented negatively using only O(ln) strings, through the use of an additional symbol. It is also shown that membership queries for the positive representation can be processed against the negative representation in time no worse than linear in its size, while reconstructing the original positive set from its negative representation is an NP-hard problem. The paper introduces algorithms for constructing negative representations as well as operations for updating and maintaining them.
引用
收藏
页码:331 / 345
页数:15
相关论文
共 56 条
[1]  
Achlioptas D, 2000, SEVENTEENTH NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AAAI-2001) / TWELFTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE (IAAI-2000), P256
[2]  
ADAM NR, 1989, COMPUT SURV, V21, P515, DOI 10.1145/76894.76895
[3]  
Agrawal D., 2001, PROC 20 ACM SIGMOD S, P247, DOI [10.1145/375551.375602, DOI 10.1145/375551.375602]
[4]  
Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
[5]  
[Anonymous], 2000, Foundations of Cryptography: Basic Tools
[6]  
[Anonymous], 1990, Cryptology and Computational Number Theory, DOI 10.1090/psapm/042
[7]  
Benaloh J., 1994, Advances in Cryptology - EUROCRYPT '93. Workshop on the Theory and Application of Cryptographic Techniques Proceedings, P274
[8]  
Blakley G. R., 1985, Proceedings of the 1985 Symposium on Security and Privacy (Cat. No. 85CH2150-1), P116
[9]  
Blum M., 1985, P ADV CRYPTOLOGY, P289
[10]   NOTE ON THE COMPLEXITY OF CRYPTOGRAPHY [J].
BRASSARD, G .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1979, 25 (02) :232-233