Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation
Autor: | Fattaneh Bayatbabolghani, Marina Blanton |
---|---|
Rok vydání: | 2016 |
Předmět: |
Computer science
Computation media_common.quotation_subject garbled circuits 0102 computer and information sciences 02 engineering and technology Certification Computer security computer.software_genre 01 natural sciences 0202 electrical engineering electronic engineering information engineering Function (engineering) General Environmental Science media_common Ethics genomic computation business.industry server-aided computation Genetic compatibility Information technology QA75.5-76.95 Information security Computer security model BJ1-1725 certified inputs 010201 computation theory & mathematics Electronic computers. Computer science General Earth and Planetary Sciences 020201 artificial intelligence & image processing State (computer science) business computer |
Zdroj: | Proceedings on Privacy Enhancing Technologies, Vol 2016, Iss 4, Pp 144-164 (2016) |
ISSN: | 2299-0984 |
DOI: | 10.1515/popets-2016-0033 |
Popis: | Computation based on genomic data is becoming increasingly popular today, be it for medical or other purposes. Non-medical uses of genomic data in a computation often take place in a server-mediated setting where the server offers the ability for joint genomic testing between the users. Undeniably, genomic data is highly sensitive, which in contrast to other biometry types, discloses a plethora of information not only about the data owner, but also about his or her relatives. Thus, there is an urgent need to protect genomic data. This is particularly true when the data is used in computation for what we call recreational non-health-related purposes. Towards this goal, in this work we put forward a framework for server-aided secure two-party computation with the security model motivated by genomic applications. One particular security setting that we treat in this work provides stronger security guarantees with respect to malicious users than the traditional malicious model. In particular, we incorporate certified inputs into secure computation based on garbled circuit evaluation to guarantee that a malicious user is unable to modify her inputs in order to learn unauthorized information about the other user’s data. Our solutions are general in the sense that they can be used to securely evaluate arbitrary functions and offer attractive performance compared to the state of the art. We apply the general constructions to three specific types of genomic tests: paternity, genetic compatibility, and ancestry testing and implement the constructions. The results show that all such private tests can be executed within a matter of seconds or less despite the large size of one’s genomic data. |
Databáze: | OpenAIRE |
Externí odkaz: |