On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data

Tadanori Teruya, Koji Nuida, Kana Shimizu, Goichiro Hanaoka

研究成果: Conference contribution

抄録

The human genome can identify an individual and determine the individual’s biological characteristics, and hence has to be securely protected in order to prevent privacy issues. In this paper we point out, however, that current standard privacy-preserving cryptographic protocols may be insufficient to protect genome privacy. This is mainly due to typical characteristics of genome information; it is immutable, and an individual’s genome has correlations to those of the individual’s progeny. Then, as an alternative, we propose to protect genome privacy by cryptographic protocols with everlasting security, which provides an appropriate mixture of computational and information-theoretic security. We construct a concrete example of a protocol with everlasting security, and discuss its practical efficiency.

元の言語English
ホスト出版物のタイトルAdvances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings
出版者Springer Verlag
ページ242-261
ページ数20
9241
ISBN(印刷物)9783319224244
DOI
出版物ステータスPublished - 2015
外部発表Yes
イベント10th International Workshop on Security, IWSEC 2015 - Nara, Japan
継続期間: 2015 8 262015 8 28

出版物シリーズ

名前Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
9241
ISSN(印刷物)03029743
ISSN(電子版)16113349

Other

Other10th International Workshop on Security, IWSEC 2015
Japan
Nara
期間15/8/2615/8/28

Fingerprint

Cryptographic Protocols
Privacy Preserving
Genomics
Genome
Genes
Alternatives
Privacy
Information-theoretic Security
Security of data

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

これを引用

Teruya, T., Nuida, K., Shimizu, K., & Hanaoka, G. (2015). On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data. : Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings (巻 9241, pp. 242-261). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 9241). Springer Verlag. https://doi.org/10.1007/978-3-319-22425-1_15

On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data. / Teruya, Tadanori; Nuida, Koji; Shimizu, Kana; Hanaoka, Goichiro.

Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings. 巻 9241 Springer Verlag, 2015. p. 242-261 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻 9241).

研究成果: Conference contribution

Teruya, T, Nuida, K, Shimizu, K & Hanaoka, G 2015, On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data. : Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings. 巻. 9241, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 巻. 9241, Springer Verlag, pp. 242-261, 10th International Workshop on Security, IWSEC 2015, Nara, Japan, 15/8/26. https://doi.org/10.1007/978-3-319-22425-1_15
Teruya T, Nuida K, Shimizu K, Hanaoka G. On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data. : Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings. 巻 9241. Springer Verlag. 2015. p. 242-261. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-319-22425-1_15
Teruya, Tadanori ; Nuida, Koji ; Shimizu, Kana ; Hanaoka, Goichiro. / On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data. Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings. 巻 9241 Springer Verlag, 2015. pp. 242-261 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{021b445c227447dcafce59bb4fd1ba59,
title = "On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data",
abstract = "The human genome can identify an individual and determine the individual’s biological characteristics, and hence has to be securely protected in order to prevent privacy issues. In this paper we point out, however, that current standard privacy-preserving cryptographic protocols may be insufficient to protect genome privacy. This is mainly due to typical characteristics of genome information; it is immutable, and an individual’s genome has correlations to those of the individual’s progeny. Then, as an alternative, we propose to protect genome privacy by cryptographic protocols with everlasting security, which provides an appropriate mixture of computational and information-theoretic security. We construct a concrete example of a protocol with everlasting security, and discuss its practical efficiency.",
author = "Tadanori Teruya and Koji Nuida and Kana Shimizu and Goichiro Hanaoka",
year = "2015",
doi = "10.1007/978-3-319-22425-1_15",
language = "English",
isbn = "9783319224244",
volume = "9241",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "242--261",
booktitle = "Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings",
address = "Germany",

}

TY - GEN

T1 - On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data

AU - Teruya, Tadanori

AU - Nuida, Koji

AU - Shimizu, Kana

AU - Hanaoka, Goichiro

PY - 2015

Y1 - 2015

N2 - The human genome can identify an individual and determine the individual’s biological characteristics, and hence has to be securely protected in order to prevent privacy issues. In this paper we point out, however, that current standard privacy-preserving cryptographic protocols may be insufficient to protect genome privacy. This is mainly due to typical characteristics of genome information; it is immutable, and an individual’s genome has correlations to those of the individual’s progeny. Then, as an alternative, we propose to protect genome privacy by cryptographic protocols with everlasting security, which provides an appropriate mixture of computational and information-theoretic security. We construct a concrete example of a protocol with everlasting security, and discuss its practical efficiency.

AB - The human genome can identify an individual and determine the individual’s biological characteristics, and hence has to be securely protected in order to prevent privacy issues. In this paper we point out, however, that current standard privacy-preserving cryptographic protocols may be insufficient to protect genome privacy. This is mainly due to typical characteristics of genome information; it is immutable, and an individual’s genome has correlations to those of the individual’s progeny. Then, as an alternative, we propose to protect genome privacy by cryptographic protocols with everlasting security, which provides an appropriate mixture of computational and information-theoretic security. We construct a concrete example of a protocol with everlasting security, and discuss its practical efficiency.

UR - http://www.scopus.com/inward/record.url?scp=84944768916&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84944768916&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-22425-1_15

DO - 10.1007/978-3-319-22425-1_15

M3 - Conference contribution

AN - SCOPUS:84944768916

SN - 9783319224244

VL - 9241

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 242

EP - 261

BT - Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings

PB - Springer Verlag

ER -