Secure Relative Detection in (Forensic) Database with Homomorphic Encryption

被引:1
|
作者
Chen, Jingwei [1 ,2 ]
Miao, Weijie [1 ,2 ]
Wu, Wenyuan [1 ,2 ]
Yang, Linhan [1 ,3 ]
Yuan, Haonan [1 ,2 ]
机构
[1] Chinese Acad Sci, Chongqing Inst Green & Intelligent Technol, Chongqing Key Lab Secure Comp Biol, Chongqing, Peoples R China
[2] Univ Chinese Acad Sci, Chongqing Sch, Chongqing, Peoples R China
[3] Chongqing Jiaotong Univ, Sch Informat Sci & Engn, Chongqing, Peoples R China
来源
BIOINFORMATICS RESEARCH AND APPLICATIONS, PT II, ISBRA 2024 | 2024年 / 14955卷
关键词
Relative detection; Privacy-preserving computation; Homomorphic encryption; iDASH; KINSHIP;
D O I
10.1007/978-981-97-5131-0_35
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Although relative (kinship) detection has important applications in biological research, forensic identification, and many other fields, the privacy of genotype data used in the process is often overlooked. Homomorphic encryption allows for computing on encrypted genotype data directly without decryption, making it particularly suitable for privacy-preserving relative detection. Therefore, it became the competition topic for iDASH-2023 Track 1. However, combining existing kinship estimation with homomorphic encryption has two challenges: the high-dimensional matrix multiplication over encrypted data and the more time-consuming comparison over encrypted data. In this paper, we propose a secure relative detection protocol that uses homomorphic encryption to estimate the kinship between samples from two parties while protecting data privacy. We devise two new kinship estimation methods avoiding ciphertext comparisons while reducing matrix multiplication to matrix-vector multiplication. Additionally, we convert high-dimensional matrix-vector multiplication to multiple small-dimensional matrix-vector multiplications using binary dividing, which can then be processed with Halevi and Shoup's algorithm. We test the accuracy and efficiency of the protocol on the iDASH-2023 dataset. Experimental results indicate that the presented protocol outperforms existing methods with similar setups.
引用
收藏
页码:410 / 422
页数:13
相关论文
共 50 条
  • [1] Private detection of relatives in forensic genomics using homomorphic encryption
    de Souza, Fillipe D. M.
    de Lassus, Hubert
    Cammarota, Ro
    BMC MEDICAL GENOMICS, 2024, 17 (01)
  • [2] HEDup: Secure Deduplication with Homomorphic Encryption
    Miguel, Rodel
    Aung, Khin Mi Mi
    Mediana
    PROCEEDINGS OF THE 2015 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE AND STORAGE (NAS), 2015, : 215 - 223
  • [3] Secure Fingerprint Authentication with Homomorphic Encryption
    Yang, Wencheng
    Wang, Song
    Yu, Kan
    Kang, James Jin
    Johnstone, Michael N.
    2020 DIGITAL IMAGE COMPUTING: TECHNIQUES AND APPLICATIONS (DICTA), 2020,
  • [4] Secure Fully Homomorphic Authenticated Encryption
    Kim, Jeongsu
    Yun, Aaram
    IEEE ACCESS, 2021, 9 : 107279 - 107297
  • [5] Circular Secure Homomorphic Encryption Scheme
    Zhao X.
    Fu Y.
    Song W.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57 (10): : 2117 - 2124
  • [6] SADHE: Secure Anomaly Detection for GPS Trajectory Based on Homomorphic Encryption
    Singh, Priyanka
    Rathi, Jash
    Patel, Priyankaben Babulal
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 139 - 141
  • [7] Database secure manipulation based on paillier's homomorphic encryption (DSM-PHE)
    Prakancharoen S.
    International Journal of Interactive Mobile Technologies, 2019, (12) : 136 - 151
  • [8] Secure genotype imputation using homomorphic encryption
    Zhou, Junwei
    Lei, Botian
    Lang, Huile
    Panaousis, Emmanouil
    Liang, Kaitai
    Xiang, Jianwen
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 72
  • [9] Secure Multilayer Perceptron Based on Homomorphic Encryption
    Bellafqira, Reda
    Coatrieux, Gouenou
    Genin, Emmanuelle
    Cozic, Michel
    DIGITAL FORENSICS AND WATERMARKING, IWDW 2018, 2019, 11378 : 322 - 336
  • [10] Secure data storage in the cloud with homomorphic encryption
    Bensitel, Yasmina
    Romadi, Rahal
    2016 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2016, : 1 - 6