Homomorphic encryption for machine learning in medicine and bioinformatics

A Wood, K Najarian, D Kahrobaei - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Machine learning and statistical techniques are powerful tools for analyzing large amounts
of medical and genomic data. On the other hand, ethical concerns and privacy regulations …

Realizing the potential of blockchain technologies in genomics

HI Ozercan, AM Ileri, E Ayday, C Alkan - Genome research, 2018 - genome.cshlp.org
Genomics data introduce a substantial computational burden as well as data privacy and
ownership issues. Data sets generated by high-throughput sequencing platforms require …

Order-revealing encryption: New constructions, applications, and lower bounds

K Lewi, DJ Wu - Proceedings of the 2016 ACM SIGSAC Conference on …, 2016 - dl.acm.org
In the last few years, there has been significant interest in develo** methods to search
over encrypted data. In the case of range queries, a simple solution is to encrypt the contents …

Private computation on encrypted genomic data

K Lauter, A López-Alt, M Naehrig - International Conference on Cryptology …, 2014 - Springer
A number of databases around the world currently host a wealth of genomic data that is
invaluable to researchers conducting a variety of genomic studies. However, patients who …

Private genome analysis through homomorphic encryption

M Kim, K Lauter - BMC medical informatics and decision making, 2015 - Springer
Background The rapid development of genome sequencing technology allows researchers
to access large genome datasets. However, outsourcing the data processing o the cloud …

Homomorphic computation of edit distance

JH Cheon, M Kim, K Lauter - … Cryptography and Data Security: FC 2015 …, 2015 - Springer
These days genomic sequence analysis provides a key way of understanding the biology of
an organism. However, since these sequences contain much private information, it can be …

SHIELD: scalable homomorphic implementation of encrypted data-classifiers

A Khedr, G Gulak… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Homomorphic encryption (HE) systems enable computations on encrypted data, without
decrypting and without knowledge of the secret key. In this work, we describe an optimized …

Securing multimodal biometric template using local random projection and homomorphic encryption

DK Vallabhadas, M Sandhya - Journal of Information Security and …, 2022 - Elsevier
Due to the rapid advancement of technology, biometrics is widely used in authenticating a
person. The primary issue in biometric authentication is template protection, which protects …

Constant-weight {PIR}: Single-round keyword {PIR} via constant-weight equality operators

RA Mahdavi, F Kerschbaum - 31st USENIX Security Symposium …, 2022 - usenix.org
Equality operators are an essential building block in tasks over secure computation such as
private information retrieval. In private information retrieval (PIR), a user queries a database …

Using fully homomorphic encryption for statistical analysis of categorical, ordinal and numerical data

W Lu, S Kawasaki, J Sakuma - Cryptology ePrint Archive, 2016 - eprint.iacr.org
In recent years, there has been a growing trend towards outsourcing of computational tasks
with the development of cloud services. The Gentry's pioneering work of fully homomorphic …