Proceedings of the 2018 on Asia Conference on Computer and Communications Security 2018
DOI: 10.1145/3196494.3196541
|View full text |Cite
|
Sign up to set email alerts
|

Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies

Abstract: We present privacy-preserving solutions for Genome-Wide Association Studies (GWAS) based on Secure Multi-Party Computation (SMPC). Using SMPC, we protect the privacy of patients when medical institutes collaborate for computing statistics on genomic data in a distributed fashion. Previous solutions for this task lack efficiency and/or use inadequate algorithms that are of limited practical value. Concretely, we optimize and implement multiple algorithms for the χ 2-, G-, and P-test in the ABY framework (Demmle… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
28
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 27 publications
(28 citation statements)
references
References 61 publications
0
28
0
Order By: Relevance
“…They are connected via a 1 Gbit/s network with an average latency of 0.1 ms. All protocols are instantiated with a symmetric security parameter of 128 bit. We intentionally exclude the evaluation part for the preprocessing (extensively discussed in [3]) and aggregation of the databases (extensively discussed in [21]).…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…They are connected via a 1 Gbit/s network with an average latency of 0.1 ms. All protocols are instantiated with a symmetric security parameter of 128 bit. We intentionally exclude the evaluation part for the preprocessing (extensively discussed in [3]) and aggregation of the databases (extensively discussed in [21]).…”
Section: Discussionmentioning
confidence: 99%
“…The privacy of other uses of genome information were also widely addressed in the literature (see, e.g., [10,21,22]).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…It is important to note that by using the outsourcing setting we achieve practical PPIL with security against malicious PPIL clients and malicious PPIL servers, whereas in the client/server setting even solutions with substantially weaker security against a semihonest client currently have impractical runtimes and communication. Furthermore, the outsourcing model with multiple STTPs is widely adopted not only in recent academic papers, e.g., for private machine learning [70,71], and genomic privacy [72,73,74,75,76,77], to name just a few, but also deployed in industrial products, see [78] for a few examples.…”
Section: A Outsourcing Schemementioning
confidence: 99%
“…In (Cho et al 2018) secure multi-party communication is used to perform GWAS using principal components to control for population structure. (Bonte et al 2018;Tkachenko et al 2018;Sim et al 2019) describe cryptographically secure protocols for computing P-values for case-control studies using contingency table chi-squared tests. All these methods are thought to be cryptographically secure, but they limit the types of computation and data exploration possible.…”
Section: Introductionmentioning
confidence: 99%