Private queries on encrypted genomic data

被引:22
作者
Cetin, Gizem S. [1 ]
Chen, Hao [2 ]
Laine, Kim [2 ]
Lauter, Kristin [2 ]
Rindal, Peter [3 ]
Xia, Yuhou [4 ]
机构
[1] Worcester Polytech Inst, 100 Inst Rd, Worcester, MA 01609 USA
[2] Microsoft Res, 14820 NE 36th St, Redmond, WA 98052 USA
[3] Oregon State Univ, 2500 NW Monroe Ave, Corvallis, OR 97331 USA
[4] Princeton Univ, 304 Washington Rd, Princeton, NJ 08544 USA
关键词
Cryptography; Homomorphic encryption; Genome privacy; FULLY HOMOMORPHIC ENCRYPTION; ERRORS;
D O I
10.1186/s12920-017-0276-z
中图分类号
Q3 [遗传学];
学科分类号
071007 ; 090102 ;
摘要
Background: One of the tasks in the iDASH Secure Genome Analysis Competition in 2016 was to demonstrate the feasibility of privacy-preserving queries on homomorphically encrypted genomic data. More precisely, given a list of up to 100,000 mutations, the task was to encrypt the data using homomorphic encryption in a way that allows it to be stored securely in the cloud, and enables the data owner to query the dataset for the presence of specific mutations, without revealing any information about the dataset or the queries to the cloud. Methods: We devise a novel string matching protocol to enable privacy-preserving queries on homomorphically encrypted data. Our protocol combines state-of-the-art techniques from homomorphic encryption and private set intersection protocols to minimize the computational and communication cost. Results: We implemented our protocol using the homomorphic encryption library SEAL v2.1, and applied it to obtain an efficient solution to the iDASH competition task. For example, using 8 threads, our protocol achieves a running time of only 4 s, and a communication cost of 2 MB, when querying for the presence of 5 mutations from an encrypted dataset of 100,000 mutations. Conclusions: We demonstrate that homomorphic encryption can be used to enable an efficient privacy-preserving mechanism for querying the presence of particular mutations in realistic size datasets. Beyond its applications to genomics, our protocol can just as well be applied to any kind of data, and is therefore of independent interest to the homomorphic encryption community.
引用
收藏
页数:14
相关论文
共 35 条
  • [1] NFLlib: NTT-Based Fast Lattice Library
    Aguilar-Melchor, Carlos
    Barrier, Joris
    Guelton, Serge
    Guinet, Adrien
    Killijian, Marc-Olivier
    Lepoint, Tancrede
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 : 341 - 356
  • [2] On the concrete hardness of Learning with Errors
    Albrecht, Martin R.
    Player, Rachel
    Scott, Sam
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2015, 9 (03) : 169 - 203
  • [3] [Anonymous], SCALABLE PRIVATE SET
  • [4] [Anonymous], 2016781
  • [5] [Anonymous], THESIS
  • [6] [Anonymous], 1978, FDN SEC COMPUT
  • [7] [Anonymous], 2016, SIMPLE ENCRYPTED ARI
  • [8] Backyard Cuckoo Hashing: Constant Worst-Case Operations with a Succinct Representation
    Arbitman, Yuriy
    Naor, Moni
    Segev, Gil
    [J]. 2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2010, : 787 - 796
  • [9] Armknecht F., 2015, IACR Cryptol. ePrint Arch
  • [10] Bos Joppe W., 2013, Cryptography and Coding. 14th IMA International Conference, IMACC 2013. Proceedings: LNCS 8308, P45, DOI 10.1007/978-3-642-45239-0_4