2016
DOI: 10.1093/bioinformatics/btw758
|View full text |Cite
|
Sign up to set email alerts
|

PRINCESS: Privacy-protecting Rare disease International Network Collaboration via Encryption through Software guard extensionS

Abstract: Supplementary data are available at Bioinformatics online.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
66
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 90 publications
(67 citation statements)
references
References 37 publications
1
66
0
Order By: Relevance
“…Cyber Notary, in this case, described as a traffic safety in electronic transactions over the Internet. It can occur through the form of conventional notary public function, namely authentic automatically or electronically by utilizing the existing public infrastructure and electronic signature [9], To that end, a Notary cyber said should have high qualifications apart from its legal ability as a foundation [8]. The primary function of the cyber notary is doing certification and authentification traffic in electronic transactions.…”
Section: Understanding Cyber Notarymentioning
confidence: 99%
“…Cyber Notary, in this case, described as a traffic safety in electronic transactions over the Internet. It can occur through the form of conventional notary public function, namely authentic automatically or electronically by utilizing the existing public infrastructure and electronic signature [9], To that end, a Notary cyber said should have high qualifications apart from its legal ability as a foundation [8]. The primary function of the cyber notary is doing certification and authentification traffic in electronic transactions.…”
Section: Understanding Cyber Notarymentioning
confidence: 99%
“…Data encryption implements privacy protection through applying encryption techniques to the raw data, which can still supports certain computations for learning [24][25][26][27][28][29][30]. Although data encryption has a strong capability to protect privacy, it is at the cost of high computation complexity.…”
Section: Related Workmentioning
confidence: 99%
“…where l Pr[O (1) j ] is the expected number of rows with exactly one write request applied to them, computed as before, and 2l Pr[O (2) j ] is the expected number of rows with exactly two write requests applied to them. Computing Pr[O (2) j ] = m 2 1 l 2 (1 − 1 l ) m−2 , we obtain the value of the expected success rate as:…”
Section: Recovering From Collisionsmentioning
confidence: 99%
“…Their construction is based on a combination of a novel genomic edit distance approximation algorithm and new construction of private set difference size protocols. Also, Chen et al [6] introduce a framework using Intel's Software Guard Extension and hardware for trustworthy computations. This way, secure and distributed computation over encrypted data can be performed, respecting institutional policies and regulations for protected health information.…”
Section: Related Workmentioning
confidence: 99%