2022
DOI: 10.1016/j.imu.2022.100988
|View full text |Cite
|
Sign up to set email alerts
|

PrivGenDB: Efficient and privacy-preserving query executions over encrypted SNP-Phenotype database

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 31 publications
0
2
0
Order By: Relevance
“…Threat Model. Gyosa adopts the standard SGX threat model supported by existing research [20,9,17]. We consider a scenario where a client seeks to use sensitive genomic data and perform computation on top of it at third-party infrastructures.…”
Section: Designmentioning
confidence: 99%
See 1 more Smart Citation
“…Threat Model. Gyosa adopts the standard SGX threat model supported by existing research [20,9,17]. We consider a scenario where a client seeks to use sensitive genomic data and perform computation on top of it at third-party infrastructures.…”
Section: Designmentioning
confidence: 99%
“…HE enables arithmetic operations (e.g., sums and aggregations) over encrypted data, thus protecting sensitive content when stored and processed. Despite its recent advances, it has been shown that for GWAS, this technique still imposes a high penalty on execution time and can only support a limited number of algorithmic operations [17]. SMPC enables secure data storage and computation even across multiple entities that do not trust each other.…”
Section: Introductionmentioning
confidence: 99%