Secure Relative Detection in (Forensic) Database with Homomorphic Encryption

被引:1
|
作者
Chen, Jingwei [1 ,2 ]
Miao, Weijie [1 ,2 ]
Wu, Wenyuan [1 ,2 ]
Yang, Linhan [1 ,3 ]
Yuan, Haonan [1 ,2 ]
机构
[1] Chinese Acad Sci, Chongqing Inst Green & Intelligent Technol, Chongqing Key Lab Secure Comp Biol, Chongqing, Peoples R China
[2] Univ Chinese Acad Sci, Chongqing Sch, Chongqing, Peoples R China
[3] Chongqing Jiaotong Univ, Sch Informat Sci & Engn, Chongqing, Peoples R China
来源
BIOINFORMATICS RESEARCH AND APPLICATIONS, PT II, ISBRA 2024 | 2024年 / 14955卷
关键词
Relative detection; Privacy-preserving computation; Homomorphic encryption; iDASH; KINSHIP;
D O I
10.1007/978-981-97-5131-0_35
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Although relative (kinship) detection has important applications in biological research, forensic identification, and many other fields, the privacy of genotype data used in the process is often overlooked. Homomorphic encryption allows for computing on encrypted genotype data directly without decryption, making it particularly suitable for privacy-preserving relative detection. Therefore, it became the competition topic for iDASH-2023 Track 1. However, combining existing kinship estimation with homomorphic encryption has two challenges: the high-dimensional matrix multiplication over encrypted data and the more time-consuming comparison over encrypted data. In this paper, we propose a secure relative detection protocol that uses homomorphic encryption to estimate the kinship between samples from two parties while protecting data privacy. We devise two new kinship estimation methods avoiding ciphertext comparisons while reducing matrix multiplication to matrix-vector multiplication. Additionally, we convert high-dimensional matrix-vector multiplication to multiple small-dimensional matrix-vector multiplications using binary dividing, which can then be processed with Halevi and Shoup's algorithm. We test the accuracy and efficiency of the protocol on the iDASH-2023 dataset. Experimental results indicate that the presented protocol outperforms existing methods with similar setups.
引用
收藏
页码:410 / 422
页数:13
相关论文
共 50 条
  • [41] HeSUN: Homomorphic Encryption for Secure Unbounded Neural Network Inference
    Duy Tung Khanh Nguyen
    Dung Hoang Duong
    Susilo, Willy
    Chow, Yang-Wai
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, PT I, SECURECOMM 2023, 2025, 567 : 413 - 438
  • [42] Secure searching of biomarkers through hybrid homomorphic encryption scheme
    Miran Kim
    Yongsoo Song
    Jung Hee Cheon
    BMC Medical Genomics, 10
  • [43] HeFUN: Homomorphic Encryption for Unconstrained Secure Neural Network Inference
    Nguyen, Duy Tung Khanh
    Duong, Dung Hoang
    Susilo, Willy
    Chow, Yang-Wai
    Ta, The Anh
    FUTURE INTERNET, 2023, 15 (12)
  • [44] Comprehensive and Improved Secure Biometric System Using Homomorphic Encryption
    Mandal, Avradip
    Roy, Arnab
    Yasuda, Masaya
    DATA PRIVACY MANAGEMENT, AND SECURITY ASSURANCE, 2016, 9481 : 183 - 198
  • [45] Secure Convolution Neural Network Inference Based on Homomorphic Encryption
    Song, Chen
    Huang, Ruwei
    APPLIED SCIENCES-BASEL, 2023, 13 (10):
  • [46] SeCPlat: A Secure Computation Platform Based on Homomorphic Encryption in Cloud
    Zhao, Fanyou
    Teng, Yiping
    Yang, Zheng
    Xie, Yuyang
    Liu, Jiayv
    Qi, Jiawei
    WEB AND BIG DATA, PT IV, APWEB-WAIM 2023, 2024, 14334 : 513 - 518
  • [47] A Mixed Homomorphic Encryption Scheme for Secure Data Storage in Cloud
    Kangavalli, R.
    Vagdevi, S.
    2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 1062 - 1066
  • [48] Is Homomorphic Encryption-Based Deep Learning Secure Enough?
    Shin, Jinmyeong
    Choi, Seok-Hwan
    Choi, Yoon-Ho
    SENSORS, 2021, 21 (23)
  • [49] Secure Power Scheduling Auction for Smart Grids Using Homomorphic Encryption
    Shajaiah, Haya
    Abdelhadi, Ahmed
    Clancy, Charles
    2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 4507 - 4512
  • [50] Secure data aggregation in wireless sensor networks using homomorphic encryption
    Kumar, Manish
    Verma, Shekhar
    Lata, Kusum
    INTERNATIONAL JOURNAL OF ELECTRONICS, 2015, 102 (04) : 690 - 702