On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data

Tadanori Teruya, Koji Nuida, Kana Shimizu, Goichiro Hanaoka

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The human genome can identify an individual and determine the individual’s biological characteristics, and hence has to be securely protected in order to prevent privacy issues. In this paper we point out, however, that current standard privacy-preserving cryptographic protocols may be insufficient to protect genome privacy. This is mainly due to typical characteristics of genome information; it is immutable, and an individual’s genome has correlations to those of the individual’s progeny. Then, as an alternative, we propose to protect genome privacy by cryptographic protocols with everlasting security, which provides an appropriate mixture of computational and information-theoretic security. We construct a concrete example of a protocol with everlasting security, and discuss its practical efficiency.

Original languageEnglish
Title of host publicationAdvances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings
PublisherSpringer Verlag
Pages242-261
Number of pages20
Volume9241
ISBN (Print)9783319224244
DOIs
Publication statusPublished - 2015
Externally publishedYes
Event10th International Workshop on Security, IWSEC 2015 - Nara, Japan
Duration: 2015 Aug 262015 Aug 28

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9241
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other10th International Workshop on Security, IWSEC 2015
CountryJapan
CityNara
Period15/8/2615/8/28

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Fingerprint Dive into the research topics of 'On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data'. Together they form a unique fingerprint.

Cite this