Secure Relative Detection in (Forensic) Database with Homomorphic Encryption

被引:1
|
作者
Chen, Jingwei [1 ,2 ]
Miao, Weijie [1 ,2 ]
Wu, Wenyuan [1 ,2 ]
Yang, Linhan [1 ,3 ]
Yuan, Haonan [1 ,2 ]
机构
[1] Chinese Acad Sci, Chongqing Inst Green & Intelligent Technol, Chongqing Key Lab Secure Comp Biol, Chongqing, Peoples R China
[2] Univ Chinese Acad Sci, Chongqing Sch, Chongqing, Peoples R China
[3] Chongqing Jiaotong Univ, Sch Informat Sci & Engn, Chongqing, Peoples R China
关键词
Relative detection; Privacy-preserving computation; Homomorphic encryption; iDASH; KINSHIP;
D O I
10.1007/978-981-97-5131-0_35
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Although relative (kinship) detection has important applications in biological research, forensic identification, and many other fields, the privacy of genotype data used in the process is often overlooked. Homomorphic encryption allows for computing on encrypted genotype data directly without decryption, making it particularly suitable for privacy-preserving relative detection. Therefore, it became the competition topic for iDASH-2023 Track 1. However, combining existing kinship estimation with homomorphic encryption has two challenges: the high-dimensional matrix multiplication over encrypted data and the more time-consuming comparison over encrypted data. In this paper, we propose a secure relative detection protocol that uses homomorphic encryption to estimate the kinship between samples from two parties while protecting data privacy. We devise two new kinship estimation methods avoiding ciphertext comparisons while reducing matrix multiplication to matrix-vector multiplication. Additionally, we convert high-dimensional matrix-vector multiplication to multiple small-dimensional matrix-vector multiplications using binary dividing, which can then be processed with Halevi and Shoup's algorithm. We test the accuracy and efficiency of the protocol on the iDASH-2023 dataset. Experimental results indicate that the presented protocol outperforms existing methods with similar setups.
引用
收藏
页码:410 / 422
页数:13
相关论文
共 50 条
  • [1] A Secure Database System using Homomorphic Encryption Schemes
    Gahi, Youssef
    Guennoun, Mouhcine
    El-Khatib, Khalil
    DBKDA 2011: THE THIRD INTERNATIONAL CONFERENCE ON ADVANCES IN DATABASES, KNOWLEDGE, AND DATA APPLICATIONS, 2011, : 54 - 58
  • [2] Private detection of relatives in forensic genomics using homomorphic encryption
    de Souza, Fillipe D. M.
    de Lassus, Hubert
    Cammarota, Ro
    BMC MEDICAL GENOMICS, 2024, 17 (01)
  • [3] Distributed Secure Data Mining with Updating Database Using Fully Homomorphic Encryption
    Yamamoto, Yuri
    Oguchi, Masato
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION MANAGEMENT AND COMMUNICATION (IMCOM) 2019, 2019, 935 : 937 - 949
  • [4] A secure kNN query processing algorithm using homomorphic encryption on outsourced database
    Kim, Hyeong-Il
    Kim, Hyeong-Jin
    Chang, Jae-Woo
    DATA & KNOWLEDGE ENGINEERING, 2019, 123
  • [5] Circular Secure Homomorphic Encryption Scheme
    Zhao X.
    Fu Y.
    Song W.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57 (10): : 2117 - 2124
  • [6] HEDup: Secure Deduplication with Homomorphic Encryption
    Miguel, Rodel
    Aung, Khin Mi Mi
    Mediana
    PROCEEDINGS OF THE 2015 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE AND STORAGE (NAS), 2015, : 215 - 223
  • [7] Secure Fingerprint Authentication with Homomorphic Encryption
    Yang, Wencheng
    Wang, Song
    Yu, Kan
    Kang, James Jin
    Johnstone, Michael N.
    2020 DIGITAL IMAGE COMPUTING: TECHNIQUES AND APPLICATIONS (DICTA), 2020,
  • [8] A Secure Processor Using Homomorphic Encryption
    Echandouri, Bouchra
    Gahi, Youssef
    Guennoun, Mouhcine
    Omary, Fouzia
    Networked Systems, NETYS 2016, 2016, 9944 : 376 - 376
  • [9] Secure Fully Homomorphic Authenticated Encryption
    Kim, Jeongsu
    Yun, Aaram
    IEEE ACCESS, 2021, 9 : 107279 - 107297
  • [10] SADHE: Secure Anomaly Detection for GPS Trajectory Based on Homomorphic Encryption
    Singh, Priyanka
    Rathi, Jash
    Patel, Priyankaben Babulal
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 139 - 141