Proceedings ArticleDOI
Privacy preserving error resilient dna searching through oblivious automata
Juan Ramón Troncoso-Pastoriza,Stefan Katzenbeisser,Mehmet U. Celik +2 more
- pp 519-528
TLDR
A new error-resilient privacy-preserving string searching protocol that allows to execute any finite state machine in an oblivious manner, requiring a communication complexity which is linear both in the number of states and the length of the input string.Abstract:
Human Desoxyribo-Nucleic Acid (DNA) sequences offer a wealth of information that reveal, among others, predisposition to various diseases and paternity relations. The breadth and personalized nature of this information highlights the need for privacy-preserving protocols. In this paper, we present a new error-resilient privacy-preserving string searching protocol that is suitable for running private DNA queries. This protocol checks if a short template (e.g., a string that describes a mutation leading to a disease), known to one party, is present inside a DNA sequence owned by another party, accounting for possible errors and without disclosing to each party the other party's input. Each query is formulated as a regular expression over a finite alphabet and implemented as an automaton. As the main technical contribution, we provide a protocol that allows to execute any finite state machine in an oblivious manner, requiring a communication complexity which is linear both in the number of states and the length of the input string.read more
Citations
More filters
Book ChapterDOI
Publicly Verifiable Private Set Intersection from Homomorphic Encryption
TL;DR: Wang et al. as discussed by the authors proposed a new publicly verifiable private set intersection protocol in the malicious setting, based on oblivious pseudo-random function (OPRF), fully homomorphic encryption (FHE), and verifiable computation (VC).
Posted ContentDOI
Privacy-Preserving Microbiome Analysis Using Secure Computation
TL;DR: This work augments an existing categorization of genomic-privacy attacks to incorporate microbiome sequencing and provides an implementation of metagenomic analyses using secure computation that allows researchers to perform analysis over combined data without revealing individual patient attributes.
Book ChapterDOI
Information leaks in genomic data: Inference attacks
Erman Ayday,Erman Ayday +1 more
TL;DR: This chapter will focus on inference attacks on genomic data by considering (i) inference attacks on statistical genomic databases, (ii) inference attackson genomic data-sharing beacons, (iii) inference attack on kin genomic privacy, and (iv) inference attacked using genotype–phenotype associations.
Journal ArticleDOI
Privacy-preserving evaluation techniques and their application in genetic tests
Tamara M. Dugan,Xukai Zou +1 more
TL;DR: Through comparison of performance and security metrics, this work aims to make recommendations for efficient and secure multiparty computation protocols for various genetic tests including edit distance, disease susceptibility, identity/paternity/common ancestry testing, medicine and treatment efficacy for personalized medicine, and genetic compatibility.
Posted Content
Secure Fingerprint Identification of High Accuracy
Marina Blanton,Siddharth Saraph +1 more
TL;DR: This work designs a data-oblivious algorithm that results in the most accurate outcome of fingerprint matching through a more complex minutia pairing approach based on maximum flow in bipartite graphs, which leads to secure fingerprint matching solutions of high security standards.
References
More filters
Book
Dynamic Programming
TL;DR: The more the authors study the information processing aspects of the mind, the more perplexed and impressed they become, and it will be a very long time before they understand these processes sufficiently to reproduce them.
Book
Introduction to Automata Theory, Languages, and Computation
TL;DR: This book is a rigorous exposition of formal languages and models of computation, with an introduction to computational complexity, appropriate for upper-level computer science undergraduates who are comfortable with mathematical arguments.
Journal ArticleDOI
A general method applicable to the search for similarities in the amino acid sequence of two proteins
TL;DR: A computer adaptable method for finding similarities in the amino acid sequences of two proteins has been developed and it is possible to determine whether significant homology exists between the proteins to trace their possible evolutionary development.