Modern privacy-preserving record linkage techniques: An overview

A Gkoulalas-Divanis, D Vatsalan… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Record linkage is the challenging task of deciding which records, coming from disparate
data sources, refer to the same entity. Established back in 1946 by Halbert L. Dunn, the area …

A pragmatic introduction to secure multi-party computation

D Evans, V Kolesnikov, M Rosulek - Foundations and Trends® …, 2018 - nowpublishers.com
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …

Machine learning and genomics: precision medicine versus patient privacy

CA Azencott - … Transactions of the Royal Society A …, 2018 - royalsocietypublishing.org
Machine learning can have a major societal impact in computational biology applications. In
particular, it plays a central role in the development of precision medicine, whereby …

Secure multi-party computation: theory, practice and applications

C Zhao, S Zhao, M Zhao, Z Chen, CZ Gao, H Li… - Information Sciences, 2019 - Elsevier
Abstract Secure Multi-Party Computation (SMPC) is a generic cryptographic primitive that
enables distributed parties to jointly compute an arbitrary functionality without revealing their …

Scaling ORAM for secure computation

J Doerner, A Shelat - Proceedings of the 2017 ACM SIGSAC Conference …, 2017 - dl.acm.org
We design and implement a Distributed Oblivious Random Access Memory (DORAM) data
structure that is optimized for use in two-party secure computation protocols. We improve …

Efficient and privacy-preserving similarity range query over encrypted time series data

Y Zheng, R Lu, Y Guan, J Shao… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Similarity query over time series data plays a significant role in various applications, such as
signal processing, speech recognition, and disease diagnosis. Meanwhile, driven by the …

The evolving privacy and security concerns for genomic data analysis and sharing as observed from the iDASH competition

TT Kuo, X Jiang, H Tang, XF Wang… - Journal of the …, 2022 - academic.oup.com
Concerns regarding inappropriate leakage of sensitive personal information as well as
unauthorized data use are increasing with the growth of genomic data repositories …

Privacy-preserving techniques of genomic data—a survey

MMA Aziz, MN Sadat, D Alhadidi, S Wang… - Briefings in …, 2019 - academic.oup.com
Genomic data hold salient information about the characteristics of a living organism.
Throughout the past decade, pinnacle developments have given us more accurate and …

Privacy-preserving search of similar patients in genomic data

G Asharov, S Halevi, Y Lindell… - Proceedings on Privacy …, 2018 - petsymposium.org
The growing availability of genomic data holds great promise for advancing medicine and
research, but unlocking its full potential requires adequate methods for protecting the privacy …

Protecting privacy and security of genomic data in i2b2 with homomorphic encryption and differential privacy

JL Raisaro, G Choi, S Pradervand… - … ACM transactions on …, 2018 - ieeexplore.ieee.org
Re-use of patients' health records can provide tremendous benefits for clinical research. Yet,
when researchers need to access sensitive/identifying data, such as genomic data, in order …