Homomorphic encryption for machine learning in medicine and bioinformatics
Machine learning and statistical techniques are powerful tools for analyzing large amounts
of medical and genomic data. On the other hand, ethical concerns and privacy regulations …
of medical and genomic data. On the other hand, ethical concerns and privacy regulations …
Realizing the potential of blockchain technologies in genomics
Genomics data introduce a substantial computational burden as well as data privacy and
ownership issues. Data sets generated by high-throughput sequencing platforms require …
ownership issues. Data sets generated by high-throughput sequencing platforms require …
Order-revealing encryption: New constructions, applications, and lower bounds
In the last few years, there has been significant interest in develo** methods to search
over encrypted data. In the case of range queries, a simple solution is to encrypt the contents …
over encrypted data. In the case of range queries, a simple solution is to encrypt the contents …
Private computation on encrypted genomic data
A number of databases around the world currently host a wealth of genomic data that is
invaluable to researchers conducting a variety of genomic studies. However, patients who …
invaluable to researchers conducting a variety of genomic studies. However, patients who …
Private genome analysis through homomorphic encryption
Background The rapid development of genome sequencing technology allows researchers
to access large genome datasets. However, outsourcing the data processing o the cloud …
to access large genome datasets. However, outsourcing the data processing o the cloud …
Homomorphic computation of edit distance
These days genomic sequence analysis provides a key way of understanding the biology of
an organism. However, since these sequences contain much private information, it can be …
an organism. However, since these sequences contain much private information, it can be …
SHIELD: scalable homomorphic implementation of encrypted data-classifiers
Homomorphic encryption (HE) systems enable computations on encrypted data, without
decrypting and without knowledge of the secret key. In this work, we describe an optimized …
decrypting and without knowledge of the secret key. In this work, we describe an optimized …
Securing multimodal biometric template using local random projection and homomorphic encryption
DK Vallabhadas, M Sandhya - Journal of Information Security and …, 2022 - Elsevier
Due to the rapid advancement of technology, biometrics is widely used in authenticating a
person. The primary issue in biometric authentication is template protection, which protects …
person. The primary issue in biometric authentication is template protection, which protects …
Constant-weight {PIR}: Single-round keyword {PIR} via constant-weight equality operators
RA Mahdavi, F Kerschbaum - 31st USENIX Security Symposium …, 2022 - usenix.org
Equality operators are an essential building block in tasks over secure computation such as
private information retrieval. In private information retrieval (PIR), a user queries a database …
private information retrieval. In private information retrieval (PIR), a user queries a database …
Using fully homomorphic encryption for statistical analysis of categorical, ordinal and numerical data
In recent years, there has been a growing trend towards outsourcing of computational tasks
with the development of cloud services. The Gentry's pioneering work of fully homomorphic …
with the development of cloud services. The Gentry's pioneering work of fully homomorphic …