메뉴 건너뛰기




Volumn , Issue , 2013, Pages 107-117

Secure genomic testing with size- and position-hiding private substring matching

Author keywords

cryptographic protocols; genomics; privacy

Indexed keywords

CRYPTOGRAPHIC PROTOCOLS; EFFICIENT PROTOCOLS; ETHICAL CONCERNS; GENOME SEQUENCING; GENOMIC INFORMATION; GENOMICS; PERSONALIZED MEDICINES; SUBSTRING MATCHES;

EID: 84889057699     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2517840.2517849     Document Type: Conference Paper
Times cited : (51)

References (55)
  • 1
    • 0242363251 scopus 로고    scopus 로고
    • Special section on human genetics: With your genes? Take one of these, three times a day
    • A. Abbott. Special section on human genetics: With your genes? Take one of these, three times a day. Nature, 425(6960), 2003.
    • (2003) Nature , vol.425 , Issue.6960
    • Abbott, A.1
  • 2
    • 84871964242 scopus 로고    scopus 로고
    • (If) Size Matters: Size-Hiding Private Set Intersection
    • G. Ateniese, E. De Cristofaro, and G. Tsudik. (If) Size Matters: Size-Hiding Private Set Intersection. In PKC, 2011.
    • (2011) PKC
    • Ateniese, G.1    De Cristofaro, E.2    Tsudik, G.3
  • 3
    • 84901019884 scopus 로고    scopus 로고
    • The Chills and Thrills of Whole Genome Sequencing
    • To Appear in Available from
    • E. Ayday, E. De Cristofaro, J.-P. Hubaux, and G. Tsudik. The Chills and Thrills of Whole Genome Sequencing. To Appear in IEEE Computer. Available from http://arxiv.org/abs/1306.1264, 2013.
    • (2013) IEEE Computer
    • Ayday, E.1    De Cristofaro, E.2    Hubaux, J.-P.3    Tsudik, G.4
  • 4
    • 80755143980 scopus 로고    scopus 로고
    • Countering GATTACA: Efficient and Secure Testing of Fully-Sequenced Human Genomes
    • P. Baldi, R. Baronio, E. De Cristofaro, P. Gasti, and G. Tsudik. Countering GATTACA: Efficient and Secure Testing of Fully-Sequenced Human Genomes. In CCS, 2011.
    • (2011) CCS
    • Baldi, P.1    Baronio, R.2    De Cristofaro, E.3    Gasti, P.4    Tsudik, G.5
  • 6
    • 80755173767 scopus 로고    scopus 로고
    • Secure outsourcing of dna searching via finite automata
    • M. Blanton and M. Aliasgari. Secure outsourcing of dna searching via finite automata. In DBSec, 2010.
    • (2010) DBSec
    • Blanton, M.1    Aliasgari, M.2
  • 7
    • 84869174850 scopus 로고    scopus 로고
    • PRISM: Privacy-Preserving Searches in MapReduce
    • E. Blass, R. D. Pietro, R. Molva, and M. Onen. PRISM: Privacy-Preserving Searches in MapReduce. In PETS, 2012.
    • (2012) PETS
    • Blass, E.1    Pietro, R.D.2    Molva, R.3    Onen, M.4
  • 12
    • 84895115809 scopus 로고    scopus 로고
    • Large-Scale Privacy-Preserving Mapping of Human Genomic Sequences on Hybrid Clouds
    • Y. Chen, B. Peng, X. Wang, and H. Tang. Large-Scale Privacy-Preserving Mapping of Human Genomic Sequences on Hybrid Clouds. In NDSS, 2012.
    • (2012) NDSS
    • Chen, Y.1    Peng, B.2    Wang, X.3    Tang, H.4
  • 14
    • 0035819474 scopus 로고    scopus 로고
    • Implications of the Human Genome Project for medical science
    • F. Collins and V. McKusick. Implications of the Human Genome Project for medical science. Jama, 285(5), 2001.
    • (2001) Jama , vol.285 , Issue.5
    • Collins, F.1    McKusick, V.2
  • 15
    • 0002908662 scopus 로고    scopus 로고
    • A generalisation, a simplification and some applications of Paillier's probabilistic public-key system
    • I. Damgård and M. Jurik. A generalisation, a simplification and some applications of Paillier's probabilistic public-key system. In PKC, 2001.
    • (2001) PKC
    • Damgård, I.1    Jurik, M.2
  • 16
    • 84945896337 scopus 로고    scopus 로고
    • GenoDroid: Are Privacy-Preserving Genomic Tests Ready for Prime Time?
    • E. De Cristofaro, S. Faber, P. Gasti, and G. Tsudik. GenoDroid: Are Privacy-Preserving Genomic Tests Ready for Prime Time? In WPES, 2012.
    • (2012) WPES
    • De Cristofaro, E.1    Faber, S.2    Gasti, P.3    Tsudik, G.4
  • 18
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE transactions on Information Theory, 31(4), 1985.
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.4
    • ElGamal, T.1
  • 19
    • 33745129227 scopus 로고    scopus 로고
    • Threshold cryptosystems secure against chosen-ciphertext attacks
    • P.-A. Fouque and D. Pointcheval. Threshold cryptosystems secure against chosen-ciphertext attacks. In ASIACRYPT, 2001.
    • (2001) ASIACRYPT
    • Fouque, P.-A.1    Pointcheval, D.2
  • 21
    • 12244263240 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • M. Freedman, K. Nissim, and B. Pinkas. Efficient private matching and set intersection. In EUROCRYPT, 2004.
    • (2004) EUROCRYPT
    • Freedman, M.1    Nissim, K.2    Pinkas, B.3
  • 22
    • 80755159818 scopus 로고    scopus 로고
    • Text Search Protocols with Simulation Based Security
    • R. Gennaro, C. Hazay, and J. Sorensen. Text Search Protocols with Simulation Based Security. In PKC, 2010.
    • (2010) PKC
    • Gennaro, R.1    Hazay, C.2    Sorensen, J.3
  • 23
    • 84884790397 scopus 로고    scopus 로고
    • Patenting and Personal Genomics: 23andMe Receives its First Patent, and Plenty of Questions
    • Genomics Law Report. Patenting and Personal Genomics: 23andMe Receives its First Patent, and Plenty of Questions. http://preview.tinyurl.com/7ebpft9, 2012.
    • (2012) Genomics Law Report
  • 24
    • 84889031689 scopus 로고    scopus 로고
    • Some Thoughts on Myriad After the Supreme Court Argument
    • Genomics Law Report. Some Thoughts on Myriad After the Supreme Court Argument. http://preview.tinyurl.com/bqy25wz, 2012.
    • (2012) Genomics Law Report
  • 25
    • 70449465250 scopus 로고    scopus 로고
    • Genomic and personalized medicine: Foundations and applications
    • G. Ginsburg and H. Willard. Genomic and personalized medicine: foundations and applications. Translational Research, 154(6), 2009.
    • (2009) Translational Research , vol.154 , Issue.6
    • Ginsburg, G.1    Willard, H.2
  • 26
    • 84889047030 scopus 로고    scopus 로고
    • GMP. http://gmplib.org/.
  • 27
    • 84855281324 scopus 로고    scopus 로고
    • Genomics and privacy: Implications of the new reality of closed data for the field
    • D. Greenbaum, A. Sboner, X. Mu, and M. Gerstein. Genomics and privacy: Implications of the new reality of closed data for the field. PLoS Computational Biology, 7(12), 2011.
    • (2011) PLoS Computational Biology , vol.7 , Issue.12
    • Greenbaum, D.1    Sboner, A.2    Mu, X.3    Gerstein, M.4
  • 28
    • 84872459720 scopus 로고    scopus 로고
    • Identifying personal genomes by surname inference
    • M. Gymrek, A. L. McGuire, D. Golan, E. Halperin, and Y. Erlich. Identifying personal genomes by surname inference. Science, 339(6117):321-324, 2013.
    • (2013) Science , vol.339 , Issue.6117 , pp. 321-324
    • Gymrek, M.1    McGuire, A.L.2    Golan, D.3    Halperin, E.4    Erlich, Y.5
  • 29
    • 62549165432 scopus 로고    scopus 로고
    • Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
    • C. Hazay and Y. Lindell. Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In TCC, 2008.
    • (2008) TCC
    • Hazay, C.1    Lindell, Y.2
  • 30
    • 80755173761 scopus 로고    scopus 로고
    • Computationally secure pattern matching in the presence of malicious adversaries
    • C. Hazay and T. Toft. Computationally secure pattern matching in the presence of malicious adversaries. ASIACRYPT, 2010.
    • (2010) ASIACRYPT
    • Hazay, C.1    Toft, T.2
  • 31
    • 50849101381 scopus 로고    scopus 로고
    • Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays
    • N. Homer et al. Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays. PLoS Genetics, 4(8), 2008.
    • (2008) PLoS Genetics , vol.4 , Issue.8
    • Homer, N.1
  • 33
    • 84888999950 scopus 로고    scopus 로고
    • Evaluating branching programs on encrypted data
    • Y. Ishai and A. Paskin. Evaluating branching programs on encrypted data. In TCC, 2007.
    • (2007) TCC
    • Ishai, Y.1    Paskin, A.2
  • 34
    • 50249177701 scopus 로고    scopus 로고
    • Towards practical privacy for genomic computation
    • S. Jha, L. Kruger, and V. Shmatikov. Towards practical privacy for genomic computation. In S&P, 2008.
    • (2008) S&P
    • Jha, S.1    Kruger, L.2    Shmatikov, V.3
  • 36
    • 78649989154 scopus 로고    scopus 로고
    • Secure text processing with applications to private dna matching
    • J. Katz and J. Malka. Secure text processing with applications to private dna matching. In CCS, 2010.
    • (2010) CCS
    • Katz, J.1    Malka, J.2
  • 38
    • 11144348715 scopus 로고    scopus 로고
    • An evaluation of the current state of genomic data privacy protection technology and a roadmap for the future
    • B. Malin. An evaluation of the current state of genomic data privacy protection technology and a roadmap for the future. Journal of the American Medical Informatics Association, 12(1), 2005.
    • (2005) Journal of the American Medical Informatics Association , vol.12 , Issue.1
    • Malin, B.1
  • 39
    • 85023166810 scopus 로고    scopus 로고
    • PIRMAP: Efficient Private information Retrieval for MapReduce
    • T. Mayberry, E.-O. Blass, and A. H. Chan. PIRMAP: Efficient Private information Retrieval for MapReduce. In FC, 2013.
    • (2013) FC
    • Mayberry, T.1    Blass, E.-O.2    Chan, A.H.3
  • 41
    • 0001412930 scopus 로고    scopus 로고
    • A new public-key cryptosystem as secure as factoring
    • T. Okamoto and S. Uchiyama. A new public-key cryptosystem as secure as factoring. In EUROCRYPT, 1998.
    • (1998) EUROCRYPT
    • Okamoto, T.1    Uchiyama, S.2
  • 42
    • 84889033744 scopus 로고    scopus 로고
    • OpenSSL. http://www.openssl.org/.
  • 43
    • 0000277371 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT, 1999.
    • (1999) EUROCRYPT
    • Paillier, P.1
  • 45
    • 51149092061 scopus 로고    scopus 로고
    • The role of hormonal therapy in the management of hormonal-receptor- positive breast cancer with co-expression of her2
    • A. Prat and J. Baselga. The role of hormonal therapy in the management of hormonal-receptor-positive breast cancer with co-expression of her2. Nature Clinical Practice Oncology, 5(9), 2008.
    • (2008) Nature Clinical Practice Oncology , vol.5 , Issue.9
    • Prat, A.1    Baselga, J.2
  • 46
    • 84872450521 scopus 로고    scopus 로고
    • Presidential Commission for the Study of Bioethical Issues
    • Presidential Commission for the Study of Bioethical Issues. PRIVACY and PROGRESS in Whole Genome Sequencing. http://www.bioethics.gov/cms/sites/default/ files/PrivacyProgress508.pdf, 2012.
    • (2012) PRIVACY and PROGRESS in Whole Genome Sequencing
  • 48
    • 77953446523 scopus 로고    scopus 로고
    • The human gene mutation database: 2008 update
    • P. Stenson et al. The human gene mutation database: 2008 update. Genome Medicine, 1(1), 2009.
    • (2009) Genome Medicine , vol.1 , Issue.1
    • Stenson, P.1
  • 49
    • 57049083569 scopus 로고    scopus 로고
    • Privacy preserving error resilient dna searching through oblivious automata
    • J. Troncoso-Pastoriza, S. Katzenbeisser, and M. Celik. Privacy preserving error resilient dna searching through oblivious automata. In CCS, 2007.
    • (2007) CCS
    • Troncoso-Pastoriza, J.1    Katzenbeisser, S.2    Celik, M.3
  • 51
    • 74049130896 scopus 로고    scopus 로고
    • Learning your identity and disease from research papers: Information leaks in Genome Wide Association Study
    • R. Wang et al. Learning your identity and disease from research papers: information leaks in Genome Wide Association Study. In CCS, 2009.
    • (2009) CCS
    • Wang, R.1
  • 52
    • 74049087814 scopus 로고    scopus 로고
    • Privacy-preserving genomic computation through program specialization
    • R. Wang, X. Wang, Z. Li, H. Tang, M. Reiter, and Z. Dong. Privacy-preserving genomic computation through program specialization. In CCS, 2009.
    • (2009) CCS
    • Wang, R.1    Wang, X.2    Li, Z.3    Tang, H.4    Reiter, M.5    Dong, Z.6
  • 55
    • 84869166261 scopus 로고    scopus 로고
    • To Release Or Not To Release: Evaluating Information Leaks in Aggregate Human-Genome Data
    • X. Zhou, B. Peng, Y. Li, Y. Chen, H. Tang, and X. Wang. To Release Or Not To Release: Evaluating Information Leaks in Aggregate Human-Genome Data. In ESORICS, 2011.
    • (2011) ESORICS
    • Zhou, X.1    Peng, B.2    Li, Y.3    Chen, Y.4    Tang, H.5    Wang, X.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.