2015
DOI: 10.1007/978-3-319-16295-9_1
|View full text |Cite
|
Sign up to set email alerts
|

Private Computation on Encrypted Genomic Data

Abstract: A number of databases around the world currently host a wealth of genomic data that is invaluable to researchers conducting a variety of genomic studies. However, patients who volunteer their genomic data run the risk of privacy invasion. In this work, we give a cryptographic solution to this problem: to maintain patient privacy, we propose encrypting all genomic data in the database. To allow meaningful computation on the encrypted data, we propose using a homomorphic encryption scheme.Specifically, we take b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
105
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 111 publications
(105 citation statements)
references
References 29 publications
0
105
0
Order By: Relevance
“…We chose 7 because, in practice, numerous applications use algorithms of multiplicative depth smaller than 7 (see e.g. [33,42]). In what follows we compare the results we obtain using Trivium, Kreyvium and also the LowMC cipher.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…We chose 7 because, in practice, numerous applications use algorithms of multiplicative depth smaller than 7 (see e.g. [33,42]). In what follows we compare the results we obtain using Trivium, Kreyvium and also the LowMC cipher.…”
Section: Resultsmentioning
confidence: 99%
“…Because they allow arbitrary computations on encrypted data, FHE schemes suddenly opened the way to exciting new applications, in particular cloud-based services in several areas (see e.g. [46,33,42]). …”
Section: Introductionmentioning
confidence: 99%
“…More recently, Lauter et al [6] conducted a study which demonstrates the application of homomorphic encryption in the analysis of genomic data. The study shows that statistical algorithms (Pearson Goodness-of-Fit Test, r 2 -measures of LD, Estimation Maximization (EM) algorithm for haplotyping, etc) peculiar to genetic studies can be replicated over encrypted data.…”
Section: Related Workmentioning
confidence: 99%
“…We adopt data packing technique to help manage the data expansion challenge that comes with encrypting the genes. Our encoded data storage and retrieval design makes it easier to dynamically compute the contingency table parameters necessary for computing the statistical measures, which shows a significant improvement from existing works [6], [7] that adopted homomorphic techniques.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation