Secure Relative Detection in (Forensic) Database with Homomorphic Encryption

被引:1
|
作者
Chen, Jingwei [1 ,2 ]
Miao, Weijie [1 ,2 ]
Wu, Wenyuan [1 ,2 ]
Yang, Linhan [1 ,3 ]
Yuan, Haonan [1 ,2 ]
机构
[1] Chinese Acad Sci, Chongqing Inst Green & Intelligent Technol, Chongqing Key Lab Secure Comp Biol, Chongqing, Peoples R China
[2] Univ Chinese Acad Sci, Chongqing Sch, Chongqing, Peoples R China
[3] Chongqing Jiaotong Univ, Sch Informat Sci & Engn, Chongqing, Peoples R China
关键词
Relative detection; Privacy-preserving computation; Homomorphic encryption; iDASH; KINSHIP;
D O I
10.1007/978-981-97-5131-0_35
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Although relative (kinship) detection has important applications in biological research, forensic identification, and many other fields, the privacy of genotype data used in the process is often overlooked. Homomorphic encryption allows for computing on encrypted genotype data directly without decryption, making it particularly suitable for privacy-preserving relative detection. Therefore, it became the competition topic for iDASH-2023 Track 1. However, combining existing kinship estimation with homomorphic encryption has two challenges: the high-dimensional matrix multiplication over encrypted data and the more time-consuming comparison over encrypted data. In this paper, we propose a secure relative detection protocol that uses homomorphic encryption to estimate the kinship between samples from two parties while protecting data privacy. We devise two new kinship estimation methods avoiding ciphertext comparisons while reducing matrix multiplication to matrix-vector multiplication. Additionally, we convert high-dimensional matrix-vector multiplication to multiple small-dimensional matrix-vector multiplications using binary dividing, which can then be processed with Halevi and Shoup's algorithm. We test the accuracy and efficiency of the protocol on the iDASH-2023 dataset. Experimental results indicate that the presented protocol outperforms existing methods with similar setups.
引用
收藏
页码:410 / 422
页数:13
相关论文
共 50 条
  • [21] Enhanced Database Security Using Homomorphic Encryption
    Roset, Connor
    Warren, Van
    Chiang, Chia-Chu
    INFORMATION SCIENCE AND APPLICATIONS 2017, ICISA 2017, 2017, 424 : 377 - 387
  • [22] A secure database encryption scheme
    Sesay, S
    Yang, ZK
    Chen, JW
    Xu, D
    CCNC: 2005 2ND IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, 2005, : 49 - 53
  • [23] Secure Genomic String Search with Parallel Homomorphic Encryption
    Aziz, Md Momin Al
    Tamal, Md Toufique Morshed
    Mohammed, Noman
    INFORMATION, 2024, 15 (01)
  • [24] Secure matrix multiplication based on fully homomorphic encryption
    Huang, Hai
    Zong, Haoran
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (05): : 5064 - 5085
  • [25] Secure motion-copying via homomorphic encryption
    Takanashi, Haruki
    Teranishi, Kaoru
    Kogiso, Kiminao
    SICE JOURNAL OF CONTROL MEASUREMENT AND SYSTEM INTEGRATION, 2024, 17 (01) : 297 - 307
  • [26] Secure generalized Vickrey auction using homomorphic encryption
    Suzuki, K
    Yokoo, M
    FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2003, 2742 : 239 - 249
  • [27] Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption
    Katz, Jonathan
    Thiruvengadam, Aishwarya
    Zhou, Hong-Sheng
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 14 - 31
  • [28] Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation
    Barbosa, Manuel
    Farshim, Pooya
    TOPICS IN CRYPTOLOGY - CT-RSA 2012, 2012, 7178 : 296 - +
  • [29] A Secure Distributed Learning Framework Using Homomorphic Encryption
    Ly, Stephen
    Cheng, Yuan
    Chen, Haiquan
    Krovetz, Ted
    2023 20TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PST, 2023, : 258 - 266
  • [30] Secure Collapsing Method Based on Fully Homomorphic Encryption
    Niyitegeka, David
    Bellafqira, Reda
    Genin, Emmanuelle
    Coatrieux, Gouenou
    DIGITAL PERSONALIZED HEALTH AND MEDICINE, 2020, 270 : 412 - 416