Filters








98 Hits in 5.1 sec

Dynamic attribute-based privacy-preserving genomic susceptibility testing

Mina Namazi, Cihan Eryonucu, Erman Ayday, Fernando Pérez-González
2019 Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing - SAC '19  
Moreover, we exceed the computation performance of the susceptibility testing over the encrypted genomic data while we manage attributes and embedded access policies.  ...  Due to the need for privacyenhancing methods to protect these sensitive pieces of information, cryptographic solutions are deployed and enabled scientists to work on encrypted genomic data.  ...  We develop a privacy-preserving genomic susceptibility testing method by leveraging an attribute-based homomorphic cryptosystem based on mathematical hardness problems over lattices.  ... 
doi:10.1145/3297280.3297428 dblp:conf/sac/NamaziEAP19 fatcat:tbdqdgoszbeyldmouf7p4dvap4

Secure Evaluation Protocol for Personalized Medicine

Mentari Djatmiko, Arik Friedman, Roksana Boreli, Felix Lawrence, Brian Thorne, Stephen Hardy
2014 Proceedings of the 13th Workshop on Privacy in the Electronic Society - WPES '14  
In this paper, we propose a secure evaluation algorithm to compute genomic tests that are based on a linear combination of genome data values (we use the Warfarin dosing algorithm as a representative example  ...  Our proposal relies on a combination of partially homomorphic Paillier encryption and private information retrieval.  ...  They propose a scheme based on linear algebra techniques using lattices, where the security is based on the hardness of the differential hidden lattice problem.  ... 
doi:10.1145/2665943.2665967 dblp:conf/wpes/DjatmikoFBLTH14 fatcat:pfcjfeol6bearbnovpduf7wvse

A secure SNP panel scheme using homomorphically encrypted K-mers without SNP calling on the user side

Sungjoon Park, Minsu Kim, Seokjun Seo, Seungwan Hong, Kyoohyung Han, Keewoo Lee, Jung Hee Cheon, Sun Kim
2019 BMC Genomics  
Thus, we designed and implemented a novel secure SNP panel scheme utilizing the computationally feasible equality test on two homomorphically encrypted K-mers.  ...  For example, the targeted cancer therapy is primarily based on the information which clinically important SNPs are detectable from the tumor.  ...  Acknowledgements Authors are grateful to anonymous reviewers for their useful comments on the manuscript.  ... 
doi:10.1186/s12864-019-5473-z fatcat:dggamayp5nf55n7atkjjhtpuli

Citizen-Centered, Auditable, and Privacy-Preserving Population Genomics [article]

Dennis Grishin, Jean Louis Raisaro, Juan Ramón Troncoso-Pastoriza, Kamal Obbad, Kevin Quinn, Mickaël Misbach, Jared Gollhardt, Joao Sa, Jacques Fellay, George M. Church, Jean-Pierre Hubaux
2019 bioRxiv   pre-print
Our open-source implementation supports queries on the encrypted genomic data of hundreds of thousands of individuals, with minimal overhead.  ...  encryption and secure multi-party computation, with the auditability of blockchains.  ...  We also thank Claire Redin from Lausanne University Hospital and John Aach from Harvard Medical School for their useful feedback and constructive comments on the manuscript.  ... 
doi:10.1101/799999 fatcat:hhwjh2t5ljh6zon5pd77eh6rhi

Controlled Functional Encryption

Muhammad Naveed, Shashank Agrawal, Manoj Prabhakaran, XiaoFeng Wang, Erman Ayday, Jean-Pierre Hubaux, Carl Gunter
2014 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14  
We obtain efficient solutions by carefully combining CCA2 secure public-key encryption (or rerandomizable RCCA secure public-key encryption, depending on the nature of security desired) with Yao's garbled  ...  Motivated by privacy and usability requirements in various scenarios where existing cryptographic tools (like secure multi-party computation and functional encryption) are not adequate, we introduce a  ...  Later, when a medical unit wants to do some disease susceptibility test, it obtains the encrypted genome and asks the authority for a one-time function key corresponding to the required disease-susceptibility  ... 
doi:10.1145/2660267.2660291 dblp:conf/ccs/NaveedAPWAHG14 fatcat:v5aalr2t6faj3kzcdvigqd5z6u

A Cryptographic System Based upon the Principles of Gene Expression

Harry Shaw
2017 Cryptography  
These codes then serve as the basis for a cryptographic model based on the processes of gene expression.  ...  The security is based upon unique knowledge of the DNA coding process, all of the regulatory codes required for expression, and their interactions.  ...  Lattice-based signatures are also vulnerable to fault attacks as demonstrated by Bindel et al. in 2016 [6] . 4 . General timing attacks on modular exponential algorithms.  ... 
doi:10.3390/cryptography1030021 fatcat:cyk2lrpxxzfhpoplraldsqpsi4

Privacy and Integrity Preserving Computations with CRISP [article]

Sylvain Chatel, Apostolos Pyrgelis, Juan R. Troncoso-Pastoriza, Jean-Pierre Hubaux
2021 arXiv   pre-print
Based on lattice-based homomorphic encryption and commitments, as well as zero-knowledge proofs, our construction enables a service provider to process and reuse third-party signed data in a privacy-friendly  ...  We evaluate our solution on different use cases such as smart-metering, disease susceptibility, and location-based activity tracking, thus showing its versatility.  ...  We are also grateful to Henry Corrigan-Gibbs, Wouter Lueks, and the members of the EPFL Laboratory for Data Security for their helpful comments and suggestions.  ... 
arXiv:2007.04025v4 fatcat:oyies26u2jhxtf4kywovec4ssm

Cryptographic Solutions for Credibility and Liability Issues of Genomic Data

Erman Ayday, Qiang Tang, Arif Yilmaz
2017 IEEE Transactions on Dependable and Secure Computing  
We propose two schemes based on homomorphic signature and aggregate signature that links the information about the legitimacy of the data to the consent and the phenotype of the individual.  ...  In this work, we consider a scenario that includes an individual sharing his genomic data (or results obtained from his genomic data) with a service provider.  ...  on cryptography, in which the use of homomorphic encryption, secure hardware, or secure multiparty computation are proposed for privacy-preserving genomic research [14, 8] , and (iii) techniques based  ... 
doi:10.1109/tdsc.2017.2690422 fatcat:5yh4zhhbc5hejamgz6kfzagrfa

Another Look at Tightness II: Practical Issues in Cryptography [chapter]

Sanjit Chatterjee, Neal Koblitz, Alfred Menezes, Palash Sarkar
2017 Lecture Notes in Computer Science  
We discuss nontightness in connection with complexity leveraging, HMAC, lattice-based cryptography, identity-based encryption, and hybrid encryption.  ...  How to deal with large tightness gaps in security proofs is a vexing issue in cryptography.  ...  Acknowledgments We wish to thank Greg Zaverucha for extensive help with Appendix A as well as useful comments on the other sections, Michael Naehrig for reviewing and commenting on §6, Somindu C.  ... 
doi:10.1007/978-3-319-61273-7_3 fatcat:auyw65hh2rfh3k3hphhrf6mcra

Verifiable Encodings for Secure Homomorphic Analytics [article]

Sylvain Chatel, Christian Knabenhans, Apostolos Pyrgelis, Jean-Pierre Hubaux
2022 arXiv   pre-print
Our authenticators operate on top of trending ring learning with errors based fully homomorphic encryption schemes over the integers.  ...  Homomorphic encryption, which enables the execution of arithmetic operations directly on ciphertexts, is a promising solution for protecting privacy of cloud-delegated computations on sensitive data.  ...  In this work, we opt for a lattice-based HE scheme for integer arithmetic, namely, BFV [53] ( §II-B); its security relies on the hardness of the RLWE problem.  ... 
arXiv:2207.14071v1 fatcat:zxo6estt5bfezguldfg37elitq

FPGA-based Digital Quantum Coprocessor

Valerii Hlukhov, Lviv Polytechnic National University, Computer Engineering Department, Bohdan Havano
2018 Advances in Cyber-Physical Systems  
NTRU: A type of lattice based cryptographic public key cipher.  ...  One-time pad: An unconditionally secure encryption method, where a plaintext is encrypted with a random secret key (or pad) of same length as the message.  ...  [HPS98] as the first practical lattice-based cryptosystem. It is based on the assumptions that lattice problems are hard to solve within a specific family of lattices -the NTRU lattices.  ... 
doi:10.23939/acps2018.02.067 fatcat:7txboogyr5f5vgc5c5zzbovv34

Cryptographic Approaches to Privacy in Forensic DNA Databases [chapter]

Philip Bohannon, Markus Jakobsson, Sukamol Srikwan
2000 Lecture Notes in Computer Science  
Our framework and techniques are applicable to the general problem of encrypting information based on partially known or partially correct keys, and its security is based on standard cryptographic assumptions  ...  Advances in DNA sequencing technology and human genetics are leading to the availability of inexpensive genetic tests, notably tests for individual predisposition to certain diseases.  ...  We thank Daniel Bleichenbacher and Phong Nguyen for helpful discussions on lattice based attacks.  ... 
doi:10.1007/978-3-540-46588-1_25 fatcat:gjcx474zvrcyxgjq2br563ystm

An Image Encryption Scheme based on DNA Computing and Multiple Chaotic Systems

Muhammad Samiullah, Waqar Aslam, Hira Nazir, M. Ikramullah Lali, Basit Shahzad, Muhammad Rafiq Mufti, Humaira Afzal
2020 IEEE Access  
Our encryption algorithm is based on three chaotic systems (PWLCM, Lorenz and 4D Lorenz-type), a Secure Hash Algorithm, a scrambler, a chaotic generator and DNA sequence based Linear Feedback Shift Register  ...  INDEX TERMS Bit scrambling, chaotic generator, DNA sequence based linear feedback shift register, DNA encoding, hypechaos, secure hash algorithm.  ...  A highly secured encryption system can be achieved by combining two chaotic systems and four cryptographic phases, namely, diffusion based on XOR, substitution based on S-boxes, diffusion based on a chaotic  ... 
doi:10.1109/access.2020.2970981 fatcat:y76u22kvhzhkno4o7trmpvn7nu

Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities

Joseph I. Choi, Kevin R. B. Butler
2019 Security and Communication Networks  
When two or more parties need to compute a common result while safeguarding their sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled circuits.  ...  This is especially true for techniques based on fully homomorphic encryption [5] or secret sharing [6, 7] .  ...  (iii) Privacy requirements vary depending on context. For example, quick access to accurate genomic data is needed in life-threatening situations; genetic testing is far more delay-tolerant.  ... 
doi:10.1155/2019/1368905 fatcat:izynm6msrvehfa3ghkw7tykk34

Survey of Promising Technologies for Quantum Drones and Networks

Adarsh Kumar, Surbhi Bhatia, Keshav Kaushik, Manjula Gandhi, Gayathri Devi, Diego Pacheco, Arwa Mashat
2021 IEEE Access  
[239] discussed the basics of lattice-based cryptosystem and focused on NTRU public-key encryption approach.  ...  in Lattice-based PKE/KEMs.  ... 
doi:10.1109/access.2021.3109816 fatcat:gkyevfoqrfertef7j7gjzcstii
« Previous Showing results 1 — 15 out of 98 results