[HTML][HTML] Privacy preserving processing of genomic data: A survey

M Akgün, AO Bayrak, B Ozer, MŞ Sağıroğlu - Journal of biomedical …, 2015 - Elsevier
Recently, the rapid advance in genome sequencing technology has led to production of
huge amount of sensitive genomic data. However, a serious privacy challenge is confronted …

EasySMPC: a simple but powerful no-code tool for practical secure multiparty computation

FN Wirth, T Kussel, A Müller, K Hamacher, F Prasser - BMC bioinformatics, 2022 - Springer
Background Modern biomedical research is data-driven and relies heavily on the re-use and
sharing of data. Biomedical data, however, is subject to strict data protection requirements …

Secure genomic testing with size-and position-hiding private substring matching

E De Cristofaro, S Faber, G Tsudik - … of the 12th ACM workshop on …, 2013 - dl.acm.org
Recent progress in genomics and bioinformatics is bringing complete and on-demand
sequencing of human (and other) genomes closer and closer to reality. Despite exciting new …

Improving the DGK comparison protocol

T Veugen - 2012 IEEE International Workshop on Information …, 2012 - ieeexplore.ieee.org
When processing signals in the encrypted domain, homomorphic encryption can be used to
enable linear operations on encrypted data. Comparison of encrypted data however …

Toward privacy-preserving healthcare monitoring based on time-series activities over cloud

Y Zheng, R Lu, S Zhang, Y Guan… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The thriving of the Internet of Things (IoT) has become the enabler of smart eHealthcare,
which greatly benefits patients by providing various data-driven healthcare monitoring …

BLOOM: BLoom filter based oblivious outsourced matchings

JH Ziegeldorf, J Pennekamp, D Hellmanns… - BMC Medical …, 2017 - Springer
Background Whole genome sequencing has become fast, accurate, and cheap, paving the
way towards the large-scale collection and processing of human genome data …

Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model

M Aliasgari, M Blanton, F Bayatbabolghani - International Journal of …, 2017 - Springer
Hidden Markov model (HMM) is a popular statistical tool with a large number of applications
in pattern recognition. In some of these applications, such as speaker recognition, the …

A survey of secure multiparty computation protocols for privacy preserving genetic tests

T Dugan, X Zou - 2016 IEEE First International Conference on …, 2016 - ieeexplore.ieee.org
We discuss several protocols that apply secure multiparty computation to privacy preserving
genetic testing. We categorize methods into those using oblivious finite automata, additive …

Privacy-preserving whole genome sequence processing through proxy-aided ORAM

N Karvelas, A Peter, S Katzenbeisser, E Tews… - Proceedings of the 13th …, 2014 - dl.acm.org
Widespread use and low prices of genomic sequencing bring us into the area of
personalized medicine and biostatistics of large cohorts. As the processed genomic data is …

Processing encrypted floating point signals

M Franz, S Katzenbeisser - … of the thirteenth ACM multimedia workshop …, 2011 - dl.acm.org
An important problem in the context of signal processing in the encrypted domain (SPEED)
is to perform secure computations on real-valued signals. This paper presents a first …