On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data

Tadanori Teruya, Koji Nuida, Kana Shimizu, Goichiro Hanaoka

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

The human genome can identify an individual and determine the individual’s biological characteristics, and hence has to be securely protected in order to prevent privacy issues. In this paper we point out, however, that current standard privacy-preserving cryptographic protocols may be insufficient to protect genome privacy. This is mainly due to typical characteristics of genome information; it is immutable, and an individual’s genome has correlations to those of the individual’s progeny. Then, as an alternative, we propose to protect genome privacy by cryptographic protocols with everlasting security, which provides an appropriate mixture of computational and information-theoretic security. We construct a concrete example of a protocol with everlasting security, and discuss its practical efficiency.

Original languageEnglish
Title of host publicationAdvances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings
EditorsKeisuke Tanaka, Yuji Suga
PublisherSpringer Verlag
Pages242-261
Number of pages20
ISBN (Print)9783319224244
DOIs
Publication statusPublished - 2015
Externally publishedYes
Event10th International Workshop on Security, IWSEC 2015 - Nara, Japan
Duration: Aug 26 2015Aug 28 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9241
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference10th International Workshop on Security, IWSEC 2015
Country/TerritoryJapan
CityNara
Period8/26/158/28/15

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data'. Together they form a unique fingerprint.

Cite this