2016
DOI: 10.1186/s12859-016-1256-6
|View full text |Cite
|
Sign up to set email alerts
|

A covert authentication and security solution for GMOs

Abstract: BackgroundProliferation and expansion of security risks necessitates new measures to ensure authenticity and validation of GMOs. Watermarking and other cryptographic methods are available which conceal and recover the original signature, but in the process reveal the authentication information. In many scenarios watermarking and standard cryptographic methods are necessary but not sufficient and new, more advanced, cryptographic protocols are necessary.ResultsHerein, we present a new crypto protocol, that is a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
1

Relationship

3
4

Authors

Journals

citations
Cited by 9 publications
(15 citation statements)
references
References 25 publications
0
15
0
Order By: Relevance
“…Designated confirmer signatures and ZK proofs were first suggested in Mueller (2014); Mueller et al (2016) as a basis to mitigate the problem of DNA signature transferability described above. These authors also provided an explicit description of algorithms and a specific watermarking protocol to hide a representation of the digital signature component within the GMO itself.…”
Section: A Cryptography-based Methods To Enhance Dna Signaturesmentioning
confidence: 99%
See 1 more Smart Citation
“…Designated confirmer signatures and ZK proofs were first suggested in Mueller (2014); Mueller et al (2016) as a basis to mitigate the problem of DNA signature transferability described above. These authors also provided an explicit description of algorithms and a specific watermarking protocol to hide a representation of the digital signature component within the GMO itself.…”
Section: A Cryptography-based Methods To Enhance Dna Signaturesmentioning
confidence: 99%
“…As the underlying cryptographic framework has been summarized and enhanced by Xia (2013), this now allows for a more direct description of such DNA signatures, that allows additional improvements relative to Mueller et al (2016). Thereby, enhanced DNA signatures can be based on two legs (via a cryptographic/digital protocol, and via DNA bases/physically), with the following main features.…”
Section: A Cryptography-based Methods To Enhance Dna Signaturesmentioning
confidence: 99%
“…1 gives a summary how this new paradigm evolved. While others, including the author, began to investigate these challenges almost a decade ago [ 13 , [15] , [16] , [17] , [18] , [19] ], the term cyberbiosecurity was first (informally) used in [ 20 ]. These authors warned of security issues resulting from the cyberphysical interface of the bioeconomy, as it was recognized that all biomanufacturing processes are in fact CPS (see also Fig.…”
Section: The Uniqueness and Challenge Of Cyberbio Protectionmentioning
confidence: 99%
“…What new types of data centres would be required? Still in their infancy, nucleic acid-based systems for data storage and other purposes (Mueller et al, 2016;Song and Zeng, 2018) necessitate the design and orchestration of diverse cyber-physical systems 19 for many aspects of the encoding, synthesis, storage, management, retrieval, decoding, and other steps. Unappreciated, unrecognised, and unanticipated ways in which this nascent component of the data economy could traverse the physical, digital, and biological spheres raise issues such as scalability, sustainability, (bio)safety (consequences for human, environmental, and ecosystem health), (bio)security (dual use), and (bio)privacy.…”
Section: Pedagogy-teaching Learning Investigating and Other Activimentioning
confidence: 99%