2019
DOI: 10.1109/jbhi.2018.2881086
|View full text |Cite
|
Sign up to set email alerts
|

Secure Similar Patients Query on Encrypted Genomic Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…There are many other works that discuss secure similarity comparisons of genetic data, typically in the context of approximating edit distance [3][4][5][6]. Aziz et al [3] used shingle set intersection as an alternative method of the similarity metric.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…There are many other works that discuss secure similarity comparisons of genetic data, typically in the context of approximating edit distance [3][4][5][6]. Aziz et al [3] used shingle set intersection as an alternative method of the similarity metric.…”
Section: Related Workmentioning
confidence: 99%
“…Zhu et al [ 6 ] focused on looking at small edit sets (VCFs) from shorter sequences and did not look at whole genome similarity, which is what our approach aims to look at. The method by Mahdi et al [ 4 ] aimed to securely compute the Hamming distance to search for the most similar sequences in a database using prefix tree queries. However, the method used a trusted party to encrypt the data and distributes decryption keys to researchers, but the expectation of the existence of a trusted party is not practical.…”
Section: Introductionmentioning
confidence: 99%
“…The primary aim of data encryption is to secure the genomic data (Mahdi et al 2018). Encryption works by encoding data using a secret private key.…”
Section: Encryptionmentioning
confidence: 99%