On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data

Tadanori Teruya, Koji Nuida, Kana Shimizu, Goichiro Hanaoka

研究成果: Conference contribution

抜粋

The human genome can identify an individual and determine the individual’s biological characteristics, and hence has to be securely protected in order to prevent privacy issues. In this paper we point out, however, that current standard privacy-preserving cryptographic protocols may be insufficient to protect genome privacy. This is mainly due to typical characteristics of genome information; it is immutable, and an individual’s genome has correlations to those of the individual’s progeny. Then, as an alternative, we propose to protect genome privacy by cryptographic protocols with everlasting security, which provides an appropriate mixture of computational and information-theoretic security. We construct a concrete example of a protocol with everlasting security, and discuss its practical efficiency.

元の言語English
ホスト出版物のタイトルAdvances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings
出版者Springer Verlag
ページ242-261
ページ数20
9241
ISBN(印刷物)9783319224244
DOI
出版物ステータスPublished - 2015
外部発表Yes
イベント10th International Workshop on Security, IWSEC 2015 - Nara, Japan
継続期間: 2015 8 262015 8 28

出版物シリーズ

名前Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
9241
ISSN(印刷物)03029743
ISSN(電子版)16113349

Other

Other10th International Workshop on Security, IWSEC 2015
Japan
Nara
期間15/8/2615/8/28

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

フィンガープリント On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data' の研究トピックを掘り下げます。これらはともに一意のフィンガープリントを構成します。

  • これを引用

    Teruya, T., Nuida, K., Shimizu, K., & Hanaoka, G. (2015). On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data. : Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings (巻 9241, pp. 242-261). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 9241). Springer Verlag. https://doi.org/10.1007/978-3-319-22425-1_15