Secure Relative Detection in (Forensic) Database with Homomorphic Encryption

被引:1
|
作者
Chen, Jingwei [1 ,2 ]
Miao, Weijie [1 ,2 ]
Wu, Wenyuan [1 ,2 ]
Yang, Linhan [1 ,3 ]
Yuan, Haonan [1 ,2 ]
机构
[1] Chinese Acad Sci, Chongqing Inst Green & Intelligent Technol, Chongqing Key Lab Secure Comp Biol, Chongqing, Peoples R China
[2] Univ Chinese Acad Sci, Chongqing Sch, Chongqing, Peoples R China
[3] Chongqing Jiaotong Univ, Sch Informat Sci & Engn, Chongqing, Peoples R China
来源
BIOINFORMATICS RESEARCH AND APPLICATIONS, PT II, ISBRA 2024 | 2024年 / 14955卷
关键词
Relative detection; Privacy-preserving computation; Homomorphic encryption; iDASH; KINSHIP;
D O I
10.1007/978-981-97-5131-0_35
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Although relative (kinship) detection has important applications in biological research, forensic identification, and many other fields, the privacy of genotype data used in the process is often overlooked. Homomorphic encryption allows for computing on encrypted genotype data directly without decryption, making it particularly suitable for privacy-preserving relative detection. Therefore, it became the competition topic for iDASH-2023 Track 1. However, combining existing kinship estimation with homomorphic encryption has two challenges: the high-dimensional matrix multiplication over encrypted data and the more time-consuming comparison over encrypted data. In this paper, we propose a secure relative detection protocol that uses homomorphic encryption to estimate the kinship between samples from two parties while protecting data privacy. We devise two new kinship estimation methods avoiding ciphertext comparisons while reducing matrix multiplication to matrix-vector multiplication. Additionally, we convert high-dimensional matrix-vector multiplication to multiple small-dimensional matrix-vector multiplications using binary dividing, which can then be processed with Halevi and Shoup's algorithm. We test the accuracy and efficiency of the protocol on the iDASH-2023 dataset. Experimental results indicate that the presented protocol outperforms existing methods with similar setups.
引用
收藏
页码:410 / 422
页数:13
相关论文
共 50 条
  • [21] Threshold Homomorphic Encryption From Provably Secure NTRU
    Xu, Kexin
    Hong Meng Tan, Benjamin
    Wang, Li-Ping
    Mi Mi Aung, Khin
    Wang, Huaxiong
    COMPUTER JOURNAL, 2023, 66 (12) : 2861 - 2873
  • [22] EFFICIENTLY SECURE MULTIPARTY COMPUTATION BASED ON HOMOMORPHIC ENCRYPTION
    Yao, Yuangang
    Wei, Jinxia
    Liu, Jianyi
    Zhang, Ru
    PROCEEDINGS OF 2016 4TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (IEEE CCIS 2016), 2016, : 343 - 349
  • [23] Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation
    Barbosa, Manuel
    Farshim, Pooya
    TOPICS IN CRYPTOLOGY - CT-RSA 2012, 2012, 7178 : 296 - +
  • [24] Secure generalized Vickrey auction using homomorphic encryption
    Suzuki, K
    Yokoo, M
    FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2003, 2742 : 239 - 249
  • [25] Securing Database Server Using Homomorphic Encryption and Re-encryption
    Greeshma, Sarath
    Jayapriya, R.
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 277 - 289
  • [26] A comprehensive survey on secure healthcare data processing with homomorphic encryption: attacks and defenses
    Chian Hui Lee
    King Hann Lim
    Sivaraman Eswaran
    Discover Public Health, 22 (1)
  • [27] Research on Database Ciphertext Retrieval Based on Homomorphic Encryption
    Gong, Zhibin
    Xiao, Youan
    Long, Yihong
    Yang, Yanli
    PROCEEDINGS OF 2017 IEEE 7TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC), 2017, : 149 - 152
  • [28] Secure Image processing using LWE Based Homomorphic Encryption
    Challa, RatnaKumari
    VijayaKumari, G.
    Sunny, B.
    2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION TECHNOLOGIES, 2015,
  • [29] Secure searching of biomarkers through hybrid homomorphic encryption scheme
    Kim, Miran
    Song, Yongsoo
    Cheon, Jung Hee
    BMC MEDICAL GENOMICS, 2017, 10
  • [30] A homomorphic encryption-based secure electronic voting scheme
    Huszti, Andrea
    PUBLICATIONES MATHEMATICAE-DEBRECEN, 2011, 79 (3-4): : 479 - 496