scispace - formally typeset
Proceedings ArticleDOI

Privacy preserving error resilient dna searching through oblivious automata

TLDR
A new error-resilient privacy-preserving string searching protocol that allows to execute any finite state machine in an oblivious manner, requiring a communication complexity which is linear both in the number of states and the length of the input string.
Abstract
Human Desoxyribo-Nucleic Acid (DNA) sequences offer a wealth of information that reveal, among others, predisposition to various diseases and paternity relations. The breadth and personalized nature of this information highlights the need for privacy-preserving protocols. In this paper, we present a new error-resilient privacy-preserving string searching protocol that is suitable for running private DNA queries. This protocol checks if a short template (e.g., a string that describes a mutation leading to a disease), known to one party, is present inside a DNA sequence owned by another party, accounting for possible errors and without disclosing to each party the other party's input. Each query is formulated as a regular expression over a finite alphabet and implemented as an automaton. As the main technical contribution, we provide a protocol that allows to execute any finite state machine in an oblivious manner, requiring a communication complexity which is linear both in the number of states and the length of the input string.

read more

Citations
More filters
Book ChapterDOI

Publicly Verifiable Private Set Intersection from Homomorphic Encryption

TL;DR: Wang et al. as discussed by the authors proposed a new publicly verifiable private set intersection protocol in the malicious setting, based on oblivious pseudo-random function (OPRF), fully homomorphic encryption (FHE), and verifiable computation (VC).
Posted ContentDOI

Privacy-Preserving Microbiome Analysis Using Secure Computation

TL;DR: This work augments an existing categorization of genomic-privacy attacks to incorporate microbiome sequencing and provides an implementation of metagenomic analyses using secure computation that allows researchers to perform analysis over combined data without revealing individual patient attributes.
Book ChapterDOI

Information leaks in genomic data: Inference attacks

TL;DR: This chapter will focus on inference attacks on genomic data by considering (i) inference attacks on statistical genomic databases, (ii) inference attackson genomic data-sharing beacons, (iii) inference attack on kin genomic privacy, and (iv) inference attacked using genotype–phenotype associations.
Journal ArticleDOI

Privacy-preserving evaluation techniques and their application in genetic tests

TL;DR: Through comparison of performance and security metrics, this work aims to make recommendations for efficient and secure multiparty computation protocols for various genetic tests including edit distance, disease susceptibility, identity/paternity/common ancestry testing, medicine and treatment efficacy for personalized medicine, and genetic compatibility.
Posted Content

Secure Fingerprint Identification of High Accuracy

TL;DR: This work designs a data-oblivious algorithm that results in the most accurate outcome of fingerprint matching through a more complex minutia pairing approach based on maximum flow in bipartite graphs, which leads to secure fingerprint matching solutions of high security standards.
References
More filters
Book

Dynamic Programming

TL;DR: The more the authors study the information processing aspects of the mind, the more perplexed and impressed they become, and it will be a very long time before they understand these processes sufficiently to reproduce them.
Book

Introduction to Automata Theory, Languages, and Computation

TL;DR: This book is a rigorous exposition of formal languages and models of computation, with an introduction to computational complexity, appropriate for upper-level computer science undergraduates who are comfortable with mathematical arguments.
Journal ArticleDOI

A general method applicable to the search for similarities in the amino acid sequence of two proteins

TL;DR: A computer adaptable method for finding similarities in the amino acid sequences of two proteins has been developed and it is possible to determine whether significant homology exists between the proteins to trace their possible evolutionary development.