TY - GEN
T1 - On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data
AU - Teruya, Tadanori
AU - Nuida, Koji
AU - Shimizu, Kana
AU - Hanaoka, Goichiro
N1 - Publisher Copyright:
� Springer International Publishing Switzerland 2015.
PY - 2015
Y1 - 2015
N2 - The human genome can identify an individual and determine the individual’s biological characteristics, and hence has to be securely protected in order to prevent privacy issues. In this paper we point out, however, that current standard privacy-preserving cryptographic protocols may be insufficient to protect genome privacy. This is mainly due to typical characteristics of genome information; it is immutable, and an individual’s genome has correlations to those of the individual’s progeny. Then, as an alternative, we propose to protect genome privacy by cryptographic protocols with everlasting security, which provides an appropriate mixture of computational and information-theoretic security. We construct a concrete example of a protocol with everlasting security, and discuss its practical efficiency.
AB - The human genome can identify an individual and determine the individual’s biological characteristics, and hence has to be securely protected in order to prevent privacy issues. In this paper we point out, however, that current standard privacy-preserving cryptographic protocols may be insufficient to protect genome privacy. This is mainly due to typical characteristics of genome information; it is immutable, and an individual’s genome has correlations to those of the individual’s progeny. Then, as an alternative, we propose to protect genome privacy by cryptographic protocols with everlasting security, which provides an appropriate mixture of computational and information-theoretic security. We construct a concrete example of a protocol with everlasting security, and discuss its practical efficiency.
UR - http://www.scopus.com/inward/record.url?scp=84944768916&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84944768916&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-22425-1_15
DO - 10.1007/978-3-319-22425-1_15
M3 - Conference contribution
AN - SCOPUS:84944768916
SN - 9783319224244
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 242
EP - 261
BT - Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings
A2 - Tanaka, Keisuke
A2 - Suga, Yuji
PB - Springer Verlag
T2 - 10th International Workshop on Security, IWSEC 2015
Y2 - 26 August 2015 through 28 August 2015
ER -