On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data

Tadanori Teruya, Koji Nuida, Kana Shimizu, Goichiro Hanaoka

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The human genome can identify an individual and determine the individual’s biological characteristics, and hence has to be securely protected in order to prevent privacy issues. In this paper we point out, however, that current standard privacy-preserving cryptographic protocols may be insufficient to protect genome privacy. This is mainly due to typical characteristics of genome information; it is immutable, and an individual’s genome has correlations to those of the individual’s progeny. Then, as an alternative, we propose to protect genome privacy by cryptographic protocols with everlasting security, which provides an appropriate mixture of computational and information-theoretic security. We construct a concrete example of a protocol with everlasting security, and discuss its practical efficiency.

Original languageEnglish
Title of host publicationAdvances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings
PublisherSpringer Verlag
Pages242-261
Number of pages20
Volume9241
ISBN (Print)9783319224244
DOIs
Publication statusPublished - 2015
Externally publishedYes
Event10th International Workshop on Security, IWSEC 2015 - Nara, Japan
Duration: 2015 Aug 262015 Aug 28

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9241
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other10th International Workshop on Security, IWSEC 2015
CountryJapan
CityNara
Period15/8/2615/8/28

Fingerprint

Cryptographic Protocols
Privacy Preserving
Genomics
Genome
Genes
Alternatives
Privacy
Information-theoretic Security
Security of data

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Teruya, T., Nuida, K., Shimizu, K., & Hanaoka, G. (2015). On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data. In Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings (Vol. 9241, pp. 242-261). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 9241). Springer Verlag. https://doi.org/10.1007/978-3-319-22425-1_15

On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data. / Teruya, Tadanori; Nuida, Koji; Shimizu, Kana; Hanaoka, Goichiro.

Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings. Vol. 9241 Springer Verlag, 2015. p. 242-261 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 9241).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Teruya, T, Nuida, K, Shimizu, K & Hanaoka, G 2015, On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data. in Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings. vol. 9241, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 9241, Springer Verlag, pp. 242-261, 10th International Workshop on Security, IWSEC 2015, Nara, Japan, 15/8/26. https://doi.org/10.1007/978-3-319-22425-1_15
Teruya T, Nuida K, Shimizu K, Hanaoka G. On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data. In Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings. Vol. 9241. Springer Verlag. 2015. p. 242-261. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-319-22425-1_15
Teruya, Tadanori ; Nuida, Koji ; Shimizu, Kana ; Hanaoka, Goichiro. / On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data. Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings. Vol. 9241 Springer Verlag, 2015. pp. 242-261 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{021b445c227447dcafce59bb4fd1ba59,
title = "On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data",
abstract = "The human genome can identify an individual and determine the individual’s biological characteristics, and hence has to be securely protected in order to prevent privacy issues. In this paper we point out, however, that current standard privacy-preserving cryptographic protocols may be insufficient to protect genome privacy. This is mainly due to typical characteristics of genome information; it is immutable, and an individual’s genome has correlations to those of the individual’s progeny. Then, as an alternative, we propose to protect genome privacy by cryptographic protocols with everlasting security, which provides an appropriate mixture of computational and information-theoretic security. We construct a concrete example of a protocol with everlasting security, and discuss its practical efficiency.",
author = "Tadanori Teruya and Koji Nuida and Kana Shimizu and Goichiro Hanaoka",
year = "2015",
doi = "10.1007/978-3-319-22425-1_15",
language = "English",
isbn = "9783319224244",
volume = "9241",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "242--261",
booktitle = "Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings",
address = "Germany",

}

TY - GEN

T1 - On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data

AU - Teruya, Tadanori

AU - Nuida, Koji

AU - Shimizu, Kana

AU - Hanaoka, Goichiro

PY - 2015

Y1 - 2015

N2 - The human genome can identify an individual and determine the individual’s biological characteristics, and hence has to be securely protected in order to prevent privacy issues. In this paper we point out, however, that current standard privacy-preserving cryptographic protocols may be insufficient to protect genome privacy. This is mainly due to typical characteristics of genome information; it is immutable, and an individual’s genome has correlations to those of the individual’s progeny. Then, as an alternative, we propose to protect genome privacy by cryptographic protocols with everlasting security, which provides an appropriate mixture of computational and information-theoretic security. We construct a concrete example of a protocol with everlasting security, and discuss its practical efficiency.

AB - The human genome can identify an individual and determine the individual’s biological characteristics, and hence has to be securely protected in order to prevent privacy issues. In this paper we point out, however, that current standard privacy-preserving cryptographic protocols may be insufficient to protect genome privacy. This is mainly due to typical characteristics of genome information; it is immutable, and an individual’s genome has correlations to those of the individual’s progeny. Then, as an alternative, we propose to protect genome privacy by cryptographic protocols with everlasting security, which provides an appropriate mixture of computational and information-theoretic security. We construct a concrete example of a protocol with everlasting security, and discuss its practical efficiency.

UR - http://www.scopus.com/inward/record.url?scp=84944768916&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84944768916&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-22425-1_15

DO - 10.1007/978-3-319-22425-1_15

M3 - Conference contribution

AN - SCOPUS:84944768916

SN - 9783319224244

VL - 9241

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 242

EP - 261

BT - Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings

PB - Springer Verlag

ER -