Homomorphic Computation of Edit Distance

被引:76
作者
Cheon, Jung Hee [1 ]
Kim, Miran [1 ]
Lauter, Kristin [2 ]
机构
[1] Seoul Natl Univ, Seoul, South Korea
[2] Microsoft Res, Redmond, WA USA
来源
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015) | 2015年 / 8976卷
关键词
Edit distance; Homomorphic encryption; Arithmetic circuit;
D O I
10.1007/978-3-662-48051-9_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
These days genomic sequence analysis provides a key way of understanding the biology of an organism. However, since these sequences contain much private information, it can be very dangerous to reveal any part of them. It is desirable to protect this sensitive information when performing sequence analysis in public. As a first step in this direction, we present a method to perform the edit distance algorithm on encrypted data to obtain an encrypted result. In our approach, the genomic data owner provides only the encrypted sequence, and the public commercial cloud can perform the sequence analysis without decryption. The result can be decrypted only by the data owner or designated representative holding the decryption key. In this paper, we describe how to calculate edit distance on encrypted data with a somewhat homomorphic encryption scheme and analyze its performance. More precisely, given two encrypted sequences of lengths n and m, we show that a somewhat homomorphic scheme of depth O((n + m) log log(n + m)) can evaluate the edit distance algorithm in O(nm log(n + m)) homomorphic computations. In the case of n = m, the depth can be brought down to O(n) using our optimization technique. Finally, we present the estimated performance of the edit distance algorithm and verify it by implementing it for short DNA sequences.
引用
收藏
页码:194 / 212
页数:19
相关论文
共 22 条
  • [1] [Anonymous], 2013, 10211 HARV U DAT PRI
  • [2] Atallah M.J., 2003, ACM WPES 2003, P39
  • [3] Ayday E., 2013, P 12 ACM WORKSHOP PR, P95
  • [4] Brakerski Zvika, 2014, ACM Transactions on Computation Theory, V6, DOI 10.1145/2633600
  • [5] Cheon JH, 2013, LECT NOTES COMPUT SC, V7881, P315, DOI 10.1007/978-3-642-38348-9_20
  • [6] De Cristofaro E, 2013, P 12 ACM WORKSH PRIV, P107, DOI DOI 10.1145/2517840.2517849
  • [7] Erlich Y., 2013, ARXIV13103197
  • [8] Homomorphic Evaluation of the AES Circuit
    Gentry, Craig
    Halevi, Shai
    Smart, Nigel P.
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 850 - 867
  • [9] Identifying Personal Genomes by Surname Inference
    Gymrek, Melissa
    McGuire, Amy L.
    Golan, David
    Halperin, Eran
    Erlich, Yaniv
    [J]. SCIENCE, 2013, 339 (6117) : 321 - 324
  • [10] Halev S., 2013, TECHNICAL REPORT