Secure Relative Detection in (Forensic) Database with Homomorphic Encryption

被引:1
|
作者
Chen, Jingwei [1 ,2 ]
Miao, Weijie [1 ,2 ]
Wu, Wenyuan [1 ,2 ]
Yang, Linhan [1 ,3 ]
Yuan, Haonan [1 ,2 ]
机构
[1] Chinese Acad Sci, Chongqing Inst Green & Intelligent Technol, Chongqing Key Lab Secure Comp Biol, Chongqing, Peoples R China
[2] Univ Chinese Acad Sci, Chongqing Sch, Chongqing, Peoples R China
[3] Chongqing Jiaotong Univ, Sch Informat Sci & Engn, Chongqing, Peoples R China
来源
BIOINFORMATICS RESEARCH AND APPLICATIONS, PT II, ISBRA 2024 | 2024年 / 14955卷
关键词
Relative detection; Privacy-preserving computation; Homomorphic encryption; iDASH; KINSHIP;
D O I
10.1007/978-981-97-5131-0_35
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Although relative (kinship) detection has important applications in biological research, forensic identification, and many other fields, the privacy of genotype data used in the process is often overlooked. Homomorphic encryption allows for computing on encrypted genotype data directly without decryption, making it particularly suitable for privacy-preserving relative detection. Therefore, it became the competition topic for iDASH-2023 Track 1. However, combining existing kinship estimation with homomorphic encryption has two challenges: the high-dimensional matrix multiplication over encrypted data and the more time-consuming comparison over encrypted data. In this paper, we propose a secure relative detection protocol that uses homomorphic encryption to estimate the kinship between samples from two parties while protecting data privacy. We devise two new kinship estimation methods avoiding ciphertext comparisons while reducing matrix multiplication to matrix-vector multiplication. Additionally, we convert high-dimensional matrix-vector multiplication to multiple small-dimensional matrix-vector multiplications using binary dividing, which can then be processed with Halevi and Shoup's algorithm. We test the accuracy and efficiency of the protocol on the iDASH-2023 dataset. Experimental results indicate that the presented protocol outperforms existing methods with similar setups.
引用
收藏
页码:410 / 422
页数:13
相关论文
共 50 条
  • [31] Practical homomorphic encryption over the integers for secure computation in the cloud
    Dyer, James
    Dyer, Martin
    Xu, Jie
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (05) : 549 - 579
  • [32] Secure Neuroimaging Analysis using Federated Learning with Homomorphic Encryption
    Stripelis, Dimitris
    Saleem, Hamza
    Ghai, Tanmay
    Dhinagar, Nikhil J.
    Gupta, Umang
    Anastasiou, Chrysovalantis
    Ver Steeg, Greg
    Ravi, Srivatsan
    Naveed, Muhammad
    Thompson, Paul M.
    Ambite, Jose Luis
    17TH INTERNATIONAL SYMPOSIUM ON MEDICAL INFORMATION PROCESSING AND ANALYSIS, 2021, 12088
  • [33] Secure Voting in the Cloud using Homomorphic Encryption and Mobile Agents
    Will, Mark A.
    Nicholson, Brandon
    Tiehuis, Marc
    Ko, Ryan K. L.
    2015 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING RESEARCH AND INNOVATION (ICCCRI), 2015, : 173 - 184
  • [34] Secure Centralized Kalman Filter for Network Environments by Homomorphic Encryption
    Ladan, Sadeghikhorami
    Akbar, Safavi Ali
    2021 7TH INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION AND AUTOMATION (ICCIA), 2021, : 183 - 187
  • [35] Faster Secure Data Mining via Distributed Homomorphic Encryption
    Li, Junyi
    Huang, Heng
    KDD '20: PROCEEDINGS OF THE 26TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2020, : 2706 - 2714
  • [36] An intelligent homomorphic audio signal encryption algorithm for secure interacting
    Yingjie Hu
    Qiuyu Zhang
    Qiwen Zhang
    Yujiao Ba
    Multimedia Tools and Applications, 2024, 83 : 25675 - 25693
  • [37] Homomorphic Encryption and Collaborative Machine Learning for Secure Healthcare Analytics
    Gandhi, Bhomik M.
    Vaghadia, Shruti B.
    Kumhar, Malaram
    Gupta, Rajesh
    Jadav, Nilesh Kumar
    Bhatia, Jitendra
    Tanwar, Sudeep
    Alabdulatif, Abdulatif
    SECURITY AND PRIVACY, 2025, 8 (01):
  • [38] An intelligent homomorphic audio signal encryption algorithm for secure interacting
    Hu, Yingjie
    Zhang, Qiuyu
    Zhang, Qiwen
    Ba, Yujiao
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (09) : 25675 - 25693
  • [39] Practical homomorphic encryption over the integers for secure computation in the cloud
    James Dyer
    Martin Dyer
    Jie Xu
    International Journal of Information Security, 2019, 18 : 549 - 579
  • [40] Secure Logistic Regression Based on Homomorphic Encryption: Design and Evaluation
    Kim, Miran
    Song, Yongsoo
    Wang, Shuang
    Xia, Yuhou
    Jiang, Xiaoqian
    JMIR MEDICAL INFORMATICS, 2018, 6 (02) : 245 - 255