“…A number of technical solutions (Ayday et al, 2013;Bos et al, 2014;Cheon et al, 2015;Jiang et al, 2014;Kamm et al, 2013;Lauter et al, 2014;Naveed et al, 2014;Wang et al, 2014;Xie et al, 2014;Yu and Ji, 2014) have been proposed to protect genome privacy in data analysis. Existing studies can be categorized into two groups: (i) protecting the computation process (Cheon et al, 2015;Humbert et al, 2013;Lauter et al, 2014) in genome data analysis, and (ii) protecting the genome data before computation (Wang et al, 2014;Zhao et al, 2015) or research outcomes after computation (Yu and Ji, 2014).…”