scispace - formally typeset
Proceedings ArticleDOI

Privacy preserving error resilient dna searching through oblivious automata

TLDR
A new error-resilient privacy-preserving string searching protocol that allows to execute any finite state machine in an oblivious manner, requiring a communication complexity which is linear both in the number of states and the length of the input string.
Abstract
Human Desoxyribo-Nucleic Acid (DNA) sequences offer a wealth of information that reveal, among others, predisposition to various diseases and paternity relations. The breadth and personalized nature of this information highlights the need for privacy-preserving protocols. In this paper, we present a new error-resilient privacy-preserving string searching protocol that is suitable for running private DNA queries. This protocol checks if a short template (e.g., a string that describes a mutation leading to a disease), known to one party, is present inside a DNA sequence owned by another party, accounting for possible errors and without disclosing to each party the other party's input. Each query is formulated as a regular expression over a finite alphabet and implemented as an automaton. As the main technical contribution, we provide a protocol that allows to execute any finite state machine in an oblivious manner, requiring a communication complexity which is linear both in the number of states and the length of the input string.

read more

Citations
More filters
Journal ArticleDOI

Inference Attacks against Kin Genomic Privacy

TL;DR: Methods attackers use to infer genomic information, as well as recent proposals for enhancing genomic privacy, are discussed.
Proceedings ArticleDOI

Privacy Preserving String Matching for Cloud Computing

TL;DR: This work presents the first ever symmetric key based approach to support privacy preserving string matching in cloud computing, and describes an efficient and accurate indexing structure, the PASS tree, which can execute a string pattern query in logarithmic time complexity over a set of data items.
Journal ArticleDOI

Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective

TL;DR: In this article, the current knowledge on privacy-enhancing technologies used for testing, storing, and sharing genomic data, using a representative sample of the work published in the past decade.
Journal ArticleDOI

Transreceiving of encrypted medical image – a cognitive approach

TL;DR: The novel medical image encryption algorithm is proposed to encrypt the DICOM (Digital Imaging and Communications in Medicine) image effectively and the spectrum sensing technique is carried out via Universal Software Radio Peripheral (USRP) to sense the unused frequency band to transmit the encrypted bio signal.
Book ChapterDOI

Multi-party Threshold Private Set Intersection with Sublinear Communication

TL;DR: This work solves one of the open problems in the work of Ghosh and Simkin (CRYPTO 2019) by designing a two-party protocol with communication cost Õ(T ) from assumptions weaker than FHE, and achieves the first “regular” multi-party PSI protocol where the communication complexity only grows with the size of the set difference and does not depend on thesize of the input sets.
References
More filters
Book

Dynamic Programming

TL;DR: The more the authors study the information processing aspects of the mind, the more perplexed and impressed they become, and it will be a very long time before they understand these processes sufficiently to reproduce them.
Book

Introduction to Automata Theory, Languages, and Computation

TL;DR: This book is a rigorous exposition of formal languages and models of computation, with an introduction to computational complexity, appropriate for upper-level computer science undergraduates who are comfortable with mathematical arguments.
Journal ArticleDOI

A general method applicable to the search for similarities in the amino acid sequence of two proteins

TL;DR: A computer adaptable method for finding similarities in the amino acid sequences of two proteins has been developed and it is possible to determine whether significant homology exists between the proteins to trace their possible evolutionary development.