2022
DOI: 10.26599/tst.2021.9010006
|View full text |Cite
|
Sign up to set email alerts
|

Secure scheme for locating disease-causing genes based on multi-key homomorphic encryption

Abstract: Genes have great significance for the prevention and treatment of some diseases. A vital consideration is the need to find a way to locate pathogenic genes by analyzing the genetic data obtained from different medical institutions while protecting the privacy of patients' genetic data. In this paper, we present a secure scheme for locating disease-causing genes based on Multi-Key Homomorphic Encryption (MKHE), which reduces the risk of leaking genetic data. First, we combine MKHE with a frequency-based pathoge… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…Third, we construct a directed decryption protocol in which the users involved in the homomorphic evaluation can appoint a target user who can obtain the final decryption result. Our experimental results show that compared to the JWB+17 scheme published in the journal Science, our scheme can be used to diagnose polygenic diseases, and the participants only need to upload their encrypted genetic data once, which reduces the communication traffic by a few hundred-fold [16].…”
Section: ) Secure Scheme For Locating Disease-causing Genes Based On ...mentioning
confidence: 97%
“…Third, we construct a directed decryption protocol in which the users involved in the homomorphic evaluation can appoint a target user who can obtain the final decryption result. Our experimental results show that compared to the JWB+17 scheme published in the journal Science, our scheme can be used to diagnose polygenic diseases, and the participants only need to upload their encrypted genetic data once, which reduces the communication traffic by a few hundred-fold [16].…”
Section: ) Secure Scheme For Locating Disease-causing Genes Based On ...mentioning
confidence: 97%
“…In particular, both types can be categorised further into single or multikey FHE/PHE schemes, where data contributed by multiple users are encrypted under a single key (cloud or DR key) or multiple keys (DO's public key), respectively. Some related works [40], [41], [42], [43] implement secure multiplication and division over encrypted data based on single/multi-key FHE. However, the high computation cost of these methods make them impractical for IoT wearable devices.…”
Section: Related Workmentioning
confidence: 99%
“…The attention layer is used to obtain sentencelevel information, which can extract long-distance dependency information and integrate the coding layer information. The attention layer mainly calculates the attention weight vector r i , which is defined as shown in formula (13).…”
Section: Attention Layermentioning
confidence: 99%
“…Ontology refers to the formal, explicit, and shared conceptual explanation of real world [11]. An ontology is a formal representation of a set of concepts and their relationships in a particular domain [12,13], which is suitable for semantic information representation and inference. Ontology defines constraints that control the simultaneous training of classifiers [14].…”
Section: Introductionmentioning
confidence: 99%