Manual for Using Homomorphic Encryption for Bioinformatics
Biological data science is an emerging field facing multiple challenges for hosting, sharing, computing on, and interacting with large data sets. Privacy regulations and concerns about the risks of leaking sensitive personal health and genomic data add another layer of complexity to the problem. Rec...
Saved in:
Published in | Proceedings of the IEEE Vol. 105; no. 3; pp. 552 - 567 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.03.2017
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Biological data science is an emerging field facing multiple challenges for hosting, sharing, computing on, and interacting with large data sets. Privacy regulations and concerns about the risks of leaking sensitive personal health and genomic data add another layer of complexity to the problem. Recent advances in cryptography over the last five years have yielded a tool, homomorphic encryption, which can be used to encrypt data in such a way that storage can be outsourced to an untrusted cloud, and the data can be computed on in a meaningful way in encrypted form, without access to decryption keys. This paper introduces homomorphic encryption to the bioinformatics community, and presents an informal "manual" for using the Simple Encrypted Arithmetic Library (SEAL), which we have made publicly available for bioinformatic, genomic, and other research purposes. |
---|---|
AbstractList | Biological data science is an emerging field facing multiple challenges for hosting, sharing, computing on, and interacting with large data sets. Privacy regulations and concerns about the risks of leaking sensitive personal health and genomic data add another layer of complexity to the problem. Recent advances in cryptography over the last five years have yielded a tool, homomorphic encryption, which can be used to encrypt data in such a way that storage can be outsourced to an untrusted cloud, and the data can be computed on in a meaningful way in encrypted form, without access to decryption keys. This paper introduces homomorphic encryption to the bioinformatics community, and presents an informal “manual” for using the Simple Encrypted Arithmetic Library (SEAL), which we have made publicly available for bioinformatic, genomic, and other research purposes. |
Author | Laine, Kim Gilad-Bachrach, Ran Lauter, Kristin Naehrig, Michael Wernsing, John Dowlin, Nathan |
Author_xml | – sequence: 1 givenname: Nathan surname: Dowlin fullname: Dowlin, Nathan organization: Columbia University, New York, NY, USA – sequence: 2 givenname: Ran surname: Gilad-Bachrach fullname: Gilad-Bachrach, Ran organization: Microsoft Research, Herzliya, Israel – sequence: 3 givenname: Kim surname: Laine fullname: Laine, Kim organization: Microsoft Research, Redmond, WA, USA – sequence: 4 givenname: Kristin surname: Lauter fullname: Lauter, Kristin email: klauter@microsoft.com organization: Microsoft Research, Redmond, WA, USA – sequence: 5 givenname: Michael surname: Naehrig fullname: Naehrig, Michael organization: Microsoft Research, Redmond, WA, USA – sequence: 6 givenname: John surname: Wernsing fullname: Wernsing, John organization: Microsoft Research, Redmond, WA, USA |
BookMark | eNo9kE9LAzEQxYNUsK1-Ab0seN46STa7WW9aqlUqFbHnkCZZTWmTNdke-u2b_kHmMPPgvXnwG6Ce884gdIthhDHUD--fX_PxiAAuR6QkhGB-gfqYMZ4Twsoe6gNgntcE11doEOMKACgraR89fki3leus8SFbROt-sqnfpAntr1XZxKmwazvr3dHwbL116djIzqp4jS4buY7m5ryHaPEy-R5P89n89W38NMtV6u5ytiQEGGs0FJIxUBRqDVoBNLpS0pCkKqkUNUvAxbJSDLRmWjHCOGjWFHSI7k9_2-D_tiZ2YuW3waVKQXBVFAWmnCcXOblU8DEG04g22I0MO4FBHBiJIyNxYCTOjFLo7hSyxpj_QMULWuKS7gFZMmRF |
CODEN | IEEPAD |
CitedBy_id | crossref_primary_10_1016_j_ins_2021_06_017 crossref_primary_10_3390_app11167360 crossref_primary_10_1186_s12859_022_04959_6 crossref_primary_10_1109_TDSC_2020_3029899 crossref_primary_10_1109_JIOT_2023_3329660 crossref_primary_10_1145_3563044 crossref_primary_10_1109_TNSE_2019_2901887 crossref_primary_10_1155_2018_4635715 crossref_primary_10_1109_ACCESS_2020_2996000 crossref_primary_10_1155_2021_8952219 crossref_primary_10_1109_ACCESS_2023_3315655 crossref_primary_10_1109_TDSC_2022_3181667 crossref_primary_10_1007_s00500_016_2296_6 crossref_primary_10_1109_TDSC_2022_3208706 |
Cites_doi | 10.2337/diacare.25.11.1999 10.1007/978-3-662-53018-4_6 10.1145/2213977.2214086 10.1006/jsco.1996.0125 10.1145/2046660.2046682 10.1145/1536414.1536440 10.1016/j.jbi.2014.04.003 10.1161/CIRCULATIONAHA.104.512079 10.1145/2488608.2488680 10.1145/1536414.1536461 10.1109/FOCS.2011.12 10.1186/1472-6947-15-S5-S3 10.1007/978-3-642-45239-0_4 10.1145/1568318.1568324 10.1007/978-3-662-48051-9_15 10.1145/2090236.2090262 10.1145/2554797.2554799 10.1007/s10623-012-9720-4 10.1145/2535925 10.1007/978-3-642-45239-0_17 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017 |
DBID | 97E RIA RIE AAYXX CITATION 7SP 8FD L7M |
DOI | 10.1109/JPROC.2016.2622218 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005-present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library Online CrossRef Electronics & Communications Abstracts Technology Research Database Advanced Technologies Database with Aerospace |
DatabaseTitle | CrossRef Technology Research Database Advanced Technologies Database with Aerospace Electronics & Communications Abstracts |
DatabaseTitleList | Technology Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Biology |
EISSN | 1558-2256 |
EndPage | 567 |
ExternalDocumentID | 10_1109_JPROC_2016_2622218 7843616 |
Genre | orig-research |
GroupedDBID | -DZ -~X .DC 0R~ 123 1OL 29P 3EH 4.4 6IK 85S 97E 9M8 AAJGR AAYOK ABFSI ABJNI ABQJQ ABTAH ACBEA ACGFS AENEX AETIX AFOGA AGNAY AIBXA ALLEH ALMA_UNASSIGNED_HOLDINGS AZLTO BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD FA8 HZ~ H~9 IAAWW IBMZZ ICLAB IDIHD IFIPE IFJZH IPLJI JAVBF LAI M43 MVM O9- OCL RIA RIE RIG RIU RNS TAE TN5 TWZ UDY UHB UKR UQL VOH WHG XJT XOL YNT ZCA ZXP ZY4 ~02 AAYXX CITATION F20 7SP 8FD L7M |
ID | FETCH-LOGICAL-c225t-5b22055fd04a550c309d0dc00fd7cae29d07acc3eb014b7c50dd5dc52580d5f43 |
IEDL.DBID | RIE |
ISSN | 0018-9219 |
IngestDate | Thu Oct 10 17:31:40 EDT 2024 Thu Sep 26 17:30:36 EDT 2024 Mon Nov 04 11:48:13 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c225t-5b22055fd04a550c309d0dc00fd7cae29d07acc3eb014b7c50dd5dc52580d5f43 |
PQID | 2174441388 |
PQPubID | 85453 |
PageCount | 16 |
ParticipantIDs | proquest_journals_2174441388 ieee_primary_7843616 crossref_primary_10_1109_JPROC_2016_2622218 |
PublicationCentury | 2000 |
PublicationDate | 2017-03-01 |
PublicationDateYYYYMMDD | 2017-03-01 |
PublicationDate_xml | – month: 03 year: 2017 text: 2017-03-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | Proceedings of the IEEE |
PublicationTitleAbbrev | JPROC |
PublicationYear | 2017 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref37 ref15 ref36 ref31 ref33 ref11 lepoint (ref28) 2014 kirchner (ref10) 2016 bos (ref6) 2013 ref1 ref17 ref38 brakerski (ref2) 2011 gilad-bachrach (ref13) 2016 lindner (ref30) 2011 gentry (ref19) 0; 8042 van dijk (ref14) 2010; 6110 gentry (ref4) 2012 stehlé (ref5) 2011 ref24 lauter (ref34) 2014 brakerski (ref21) 2013 ref25 laine (ref12) 2016 fan (ref8) 2012; 2012 ref20 ref22 (ref35) 2015 albrecht (ref9) 2016 cheon (ref23) 2015 ref27 ref29 ref7 fan (ref16) 2012 ref3 micciancio (ref26) 2012 (ref32) 2015 brakerski (ref18) 0; 7417 |
References_xml | – ident: ref38 doi: 10.2337/diacare.25.11.1999 – year: 2016 ident: ref10 article-title: Comparison between subfield and straightforward attacks on NTRU contributor: fullname: kirchner – start-page: 850 year: 2012 ident: ref4 article-title: Homomorphic evaluation of the AES circuit publication-title: Adv Cryptology contributor: fullname: gentry – year: 2012 ident: ref16 article-title: Somewhat practical fully homomorphic encryption contributor: fullname: fan – start-page: 27 year: 2011 ident: ref5 article-title: Making NTRU as secure as worst-case problems over ideal lattices publication-title: Adv Cryptology contributor: fullname: stehlé – start-page: 3 year: 2014 ident: ref34 article-title: Private computation on encrypted genomic data publication-title: Progress in Cryptology contributor: fullname: lauter – start-page: 201 year: 2016 ident: ref13 article-title: CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy publication-title: Proc 33rd Int Conf Mach Learn contributor: fullname: gilad-bachrach – volume: 7417 start-page: 868 year: 0 ident: ref18 article-title: Fully homomorphic encryption without modulus switching from classical GapSVP publication-title: Adv Cryptology contributor: fullname: brakerski – year: 2016 ident: ref9 article-title: A subfield lattice attack on overstretched NTRU assumptions: Cryptanalysis of some FHE and graded encoding schemes doi: 10.1007/978-3-662-53018-4_6 contributor: fullname: albrecht – ident: ref17 doi: 10.1145/2213977.2214086 – ident: ref36 doi: 10.1006/jsco.1996.0125 – year: 2015 ident: ref32 article-title: R: A Language and Environment for Statistical Computing – ident: ref7 doi: 10.1145/2046660.2046682 – ident: ref1 doi: 10.1145/1536414.1536440 – ident: ref31 doi: 10.1016/j.jbi.2014.04.003 – ident: ref37 doi: 10.1161/CIRCULATIONAHA.104.512079 – ident: ref27 doi: 10.1145/2488608.2488680 – start-page: 700 year: 2012 ident: ref26 article-title: Trapdoors for lattices: Simpler, tighter, faster, smaller publication-title: Adv Cryptology contributor: fullname: micciancio – ident: ref25 doi: 10.1145/1536414.1536461 – ident: ref15 doi: 10.1109/FOCS.2011.12 – volume: 6110 start-page: 24 year: 2010 ident: ref14 article-title: Fully homomorphic encryption over the integers publication-title: Advances in Cryptology contributor: fullname: van dijk – start-page: 505 year: 2011 ident: ref2 article-title: Fully homomorphic encryption from ring-LWE and security for key dependent messages publication-title: Adv Cryptology contributor: fullname: brakerski – ident: ref33 doi: 10.1186/1472-6947-15-S5-S3 – start-page: 1 year: 2013 ident: ref21 article-title: Packed ciphertexts in LWE-based homomorphic encryption publication-title: Proc Public Key Cryptography contributor: fullname: brakerski – start-page: 319 year: 2011 ident: ref30 article-title: Better key sizes (and attacks) for LWE-based encryption publication-title: Topics in Cryptology-CT-RSA contributor: fullname: lindner – start-page: 45 year: 2013 ident: ref6 article-title: Improved security for a ring-based fully homomorphic encryption scheme publication-title: Cryptography and Coding doi: 10.1007/978-3-642-45239-0_4 contributor: fullname: bos – ident: ref24 doi: 10.1145/1568318.1568324 – year: 2015 ident: ref35 publication-title: Secure Genome Analysis Competition – volume: 2012 start-page: 144 year: 2012 ident: ref8 article-title: Somewhat practical fully homomorphic encryption publication-title: IACR Cryptology ePrint contributor: fullname: fan – year: 2015 ident: ref23 article-title: Homomorphic computation of edit distance doi: 10.1007/978-3-662-48051-9_15 contributor: fullname: cheon – ident: ref3 doi: 10.1145/2090236.2090262 – ident: ref20 doi: 10.1145/2554797.2554799 – ident: ref22 doi: 10.1007/s10623-012-9720-4 – ident: ref11 doi: 10.1145/2535925 – ident: ref29 doi: 10.1007/978-3-642-45239-0_17 – year: 2016 ident: ref12 article-title: Simple Encrypted Arithmetic Library-Seal (V2.1) contributor: fullname: laine – start-page: 318 year: 2014 ident: ref28 article-title: A comparison of the homomorphic encryption schemes FV and YASHE publication-title: Progress in Cryptology-AFRICACRYPT contributor: fullname: lepoint – volume: 8042 start-page: 75 year: 0 ident: ref19 article-title: Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based publication-title: Adv Cryptology contributor: fullname: gentry |
SSID | ssj0003563 |
Score | 2.4897048 |
Snippet | Biological data science is an emerging field facing multiple challenges for hosting, sharing, computing on, and interacting with large data sets. Privacy... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Publisher |
StartPage | 552 |
SubjectTerms | Bioinformatics Biology Cryptography data privacy Encryption Genomics homomorphic encryption Public key |
Title | Manual for Using Homomorphic Encryption for Bioinformatics |
URI | https://ieeexplore.ieee.org/document/7843616 https://www.proquest.com/docview/2174441388 |
Volume | 105 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFH9sA0EPfmyK0yk9eNN2WZO0jTeRjTGYijjYreSrIGInszvMv94kbcdQD9JLCmlI38v7at_7PYArTpUJG-TAF6HmPgmR8HmsiI8xoYoaC544uKbpQzSekcmczhtws6mF0Vq75DMd2KH7l68WcmU_lfXjhOBoEDWhGTNW1mpttC6mVde0gRFgI4Z1gQxi_cnT8-O9zeKKgjAy9tA2-NgyQq6ryi9V7OzL6ACm9c7KtJK3YFWIQH79AG3879YPYb9yNL278mQcQUPnbdgpW0-u27C3BUTYgdspt9CknvFgPZdE4I0X7-YyTHiV3jCXy7VTLW6CWaOCW7UQz8cwGw1f7sd-1VXBl0Z2C58KW1tLM4UIN-GJxIgppCRCmYol16G5i7mUWAsTPYlYUqQUVZKGNEGKZgSfQCtf5PoUPOt8CKYiSagkmVIJYlqygXlRwRMR8i5c12ROP0rwjNQFHYiljimpZUpaMaULHUu3zcyKZF3o1ZxJK_n6TG0gZRw5nCRnfz91DruhNcAuW6wHrWK50hfGfSjEpTs33_TFwIc |
link.rule.ids | 315,783,787,799,27936,27937,55086 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8JAEJ4gxqgHH6gRRe3BmxaWdrcPb4ZAEAGNgYRbs68mxggG4YC_3tltIUQ9mF7aZNtsZ3Z2vmlnvgG45kxh2CDrrvA0d6lHhMtDRV3fp0wx9OCRpWvq9YP2kHZGbFSA21UtjNbaJp_pqjm1__LVRM7Np7JaGFE_qAcbsIm4Ogqyaq3VvuuzvG9aHU0YDXFZIkPiWuf55alh8riCqhegRzQtPtbckO2r8mszth6mtQ-95dyyxJK36nwmqvLrB23jfyd_AHs51HTus7VxCAU9LsFW1nxyUYLdNSrCI7jrcUNO6iCGdWwagdOevOOBaniVTnMspwu7udgB-IyccNWQPB_DsNUcNNpu3lfBlWi9M5cJU13LUkUoR0FKn8SKKElIqkLJtYdXIZfS1wLjJxFKRpRiSjKPRUSxlPonUBxPxvoUHAM_RKwCSZmkqVIRibWM6_iigkfC42W4WYo5-cjoMxIbdpA4sUpJjFKSXCllODJyW43MRVaGylIzSW5hn4kJpRDK-VF09vddV7DdHvS6Sfeh_3gOO55xxzZ3rALF2XSuLxBMzMSlXUPfM4XD0g |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Manual+for+Using+Homomorphic+Encryption+for+Bioinformatics&rft.jtitle=Proceedings+of+the+IEEE&rft.au=Dowlin%2C+Nathan&rft.au=Gilad-Bachrach%2C+Ran&rft.au=Laine%2C+Kim&rft.au=Lauter%2C+Kristin&rft.date=2017-03-01&rft.issn=0018-9219&rft.eissn=1558-2256&rft.spage=1&rft.epage=16&rft_id=info:doi/10.1109%2FJPROC.2016.2622218&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_JPROC_2016_2622218 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9219&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9219&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9219&client=summon |