Secure Relative Detection in (Forensic) Database with Homomorphic Encryption

被引:1
|
作者
Chen, Jingwei [1 ,2 ]
Miao, Weijie [1 ,2 ]
Wu, Wenyuan [1 ,2 ]
Yang, Linhan [1 ,3 ]
Yuan, Haonan [1 ,2 ]
机构
[1] Chinese Acad Sci, Chongqing Inst Green & Intelligent Technol, Chongqing Key Lab Secure Comp Biol, Chongqing, Peoples R China
[2] Univ Chinese Acad Sci, Chongqing Sch, Chongqing, Peoples R China
[3] Chongqing Jiaotong Univ, Sch Informat Sci & Engn, Chongqing, Peoples R China
关键词
Relative detection; Privacy-preserving computation; Homomorphic encryption; iDASH; KINSHIP;
D O I
10.1007/978-981-97-5131-0_35
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Although relative (kinship) detection has important applications in biological research, forensic identification, and many other fields, the privacy of genotype data used in the process is often overlooked. Homomorphic encryption allows for computing on encrypted genotype data directly without decryption, making it particularly suitable for privacy-preserving relative detection. Therefore, it became the competition topic for iDASH-2023 Track 1. However, combining existing kinship estimation with homomorphic encryption has two challenges: the high-dimensional matrix multiplication over encrypted data and the more time-consuming comparison over encrypted data. In this paper, we propose a secure relative detection protocol that uses homomorphic encryption to estimate the kinship between samples from two parties while protecting data privacy. We devise two new kinship estimation methods avoiding ciphertext comparisons while reducing matrix multiplication to matrix-vector multiplication. Additionally, we convert high-dimensional matrix-vector multiplication to multiple small-dimensional matrix-vector multiplications using binary dividing, which can then be processed with Halevi and Shoup's algorithm. We test the accuracy and efficiency of the protocol on the iDASH-2023 dataset. Experimental results indicate that the presented protocol outperforms existing methods with similar setups.
引用
收藏
页码:410 / 422
页数:13
相关论文
共 50 条
  • [41] Secure Outsourced Matrix Multiplication with Fully Homomorphic Encryption
    Zhu, Lin
    Hua, Qiang-sheng
    Chen, Yi
    Jin, Hai
    COMPUTER SECURITY - ESORICS 2023, PT I, 2024, 14344 : 249 - 269
  • [42] Implementing homomorphic encryption based secure feedback control
    Tran, Julian
    Farokhi, Farhad
    Cantoni, Michael
    Shames, Iman
    CONTROL ENGINEERING PRACTICE, 2020, 97
  • [43] Optimizing Homomorphic Encryption based Secure Image Analytics
    Jain, Nayna
    Nandakumar, Karthik
    Ratha, Nalini
    Pankanti, Sharath
    Kumar, Uttam
    IEEE MMSP 2021: 2021 IEEE 23RD INTERNATIONAL WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING (MMSP), 2021,
  • [44] Scalable and Secure Logistic Regression via Homomorphic Encryption
    Aono, Yoshinori
    Hayashi, Takuya
    Le Trieu Phong
    Wang, Lihua
    CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, : 142 - 144
  • [45] Homomorphic Encryption for Secure Information Retrieval from the Cloud
    Anand, V.
    Satapathy, Suresh Chandra
    FIRST INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, TECHNOLOGY AND SCIENCE - ICETETS 2016, 2016,
  • [46] Secure Similarity Joins Using Fully Homomorphic Encryption
    Cruz, Mateus S. H.
    Amagasa, Toshiyuki
    Watanabe, Chiemi
    Lu, Wenjie
    Kitagawa, Hiroyuki
    19TH INTERNATIONAL CONFERENCE ON INFORMATION INTEGRATION AND WEB-BASED APPLICATIONS & SERVICES (IIWAS2017), 2017, : 224 - 233
  • [47] Chosen-Ciphertext Secure Fully Homomorphic Encryption
    Canetti, Ran
    Raghuraman, Srinivasan
    Richelson, Silas
    Vaikuntanathan, Vinod
    PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II, 2017, 10175 : 213 - 240
  • [48] Application of a circular secure variant of LWE in the homomorphic encryption
    Yang, Xiaoyuan
    Zhou, Tanping
    Zhang, Wei
    Wu, Liqiang
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (06): : 1389 - 1393
  • [49] Secure Control Using Homomorphic Encryption and Efficiency Analysis
    Pan J.
    Sui T.
    Liu W.
    Wang J.
    Kong L.
    Zhao Y.
    Security and Communication Networks, 2023, 2023
  • [50] Making cloud computing more secure: Homomorphic encryption
    Naone, Erica
    Technology Review, 2011, 114 (03) : 50 - 51