Manual for Using Homomorphic Encryption for Bioinformatics

Biological data science is an emerging field facing multiple challenges for hosting, sharing, computing on, and interacting with large data sets. Privacy regulations and concerns about the risks of leaking sensitive personal health and genomic data add another layer of complexity to the problem. Rec...

Full description

Saved in:
Bibliographic Details
Published inProceedings of the IEEE Vol. 105; no. 3; pp. 552 - 567
Main Authors Dowlin, Nathan, Gilad-Bachrach, Ran, Laine, Kim, Lauter, Kristin, Naehrig, Michael, Wernsing, John
Format Journal Article
LanguageEnglish
Published New York IEEE 01.03.2017
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Biological data science is an emerging field facing multiple challenges for hosting, sharing, computing on, and interacting with large data sets. Privacy regulations and concerns about the risks of leaking sensitive personal health and genomic data add another layer of complexity to the problem. Recent advances in cryptography over the last five years have yielded a tool, homomorphic encryption, which can be used to encrypt data in such a way that storage can be outsourced to an untrusted cloud, and the data can be computed on in a meaningful way in encrypted form, without access to decryption keys. This paper introduces homomorphic encryption to the bioinformatics community, and presents an informal "manual" for using the Simple Encrypted Arithmetic Library (SEAL), which we have made publicly available for bioinformatic, genomic, and other research purposes.
AbstractList Biological data science is an emerging field facing multiple challenges for hosting, sharing, computing on, and interacting with large data sets. Privacy regulations and concerns about the risks of leaking sensitive personal health and genomic data add another layer of complexity to the problem. Recent advances in cryptography over the last five years have yielded a tool, homomorphic encryption, which can be used to encrypt data in such a way that storage can be outsourced to an untrusted cloud, and the data can be computed on in a meaningful way in encrypted form, without access to decryption keys. This paper introduces homomorphic encryption to the bioinformatics community, and presents an informal “manual” for using the Simple Encrypted Arithmetic Library (SEAL), which we have made publicly available for bioinformatic, genomic, and other research purposes.
Author Laine, Kim
Gilad-Bachrach, Ran
Lauter, Kristin
Naehrig, Michael
Wernsing, John
Dowlin, Nathan
Author_xml – sequence: 1
  givenname: Nathan
  surname: Dowlin
  fullname: Dowlin, Nathan
  organization: Columbia University, New York, NY, USA
– sequence: 2
  givenname: Ran
  surname: Gilad-Bachrach
  fullname: Gilad-Bachrach, Ran
  organization: Microsoft Research, Herzliya, Israel
– sequence: 3
  givenname: Kim
  surname: Laine
  fullname: Laine, Kim
  organization: Microsoft Research, Redmond, WA, USA
– sequence: 4
  givenname: Kristin
  surname: Lauter
  fullname: Lauter, Kristin
  email: klauter@microsoft.com
  organization: Microsoft Research, Redmond, WA, USA
– sequence: 5
  givenname: Michael
  surname: Naehrig
  fullname: Naehrig, Michael
  organization: Microsoft Research, Redmond, WA, USA
– sequence: 6
  givenname: John
  surname: Wernsing
  fullname: Wernsing, John
  organization: Microsoft Research, Redmond, WA, USA
BookMark eNo9kE9LAzEQxYNUsK1-Ab0seN46STa7WW9aqlUqFbHnkCZZTWmTNdke-u2b_kHmMPPgvXnwG6Ce884gdIthhDHUD--fX_PxiAAuR6QkhGB-gfqYMZ4Twsoe6gNgntcE11doEOMKACgraR89fki3leus8SFbROt-sqnfpAntr1XZxKmwazvr3dHwbL116djIzqp4jS4buY7m5ryHaPEy-R5P89n89W38NMtV6u5ytiQEGGs0FJIxUBRqDVoBNLpS0pCkKqkUNUvAxbJSDLRmWjHCOGjWFHSI7k9_2-D_tiZ2YuW3waVKQXBVFAWmnCcXOblU8DEG04g22I0MO4FBHBiJIyNxYCTOjFLo7hSyxpj_QMULWuKS7gFZMmRF
CODEN IEEPAD
CitedBy_id crossref_primary_10_1016_j_ins_2021_06_017
crossref_primary_10_3390_app11167360
crossref_primary_10_1186_s12859_022_04959_6
crossref_primary_10_1109_TDSC_2020_3029899
crossref_primary_10_1109_JIOT_2023_3329660
crossref_primary_10_1145_3563044
crossref_primary_10_1109_TNSE_2019_2901887
crossref_primary_10_1155_2018_4635715
crossref_primary_10_1109_ACCESS_2020_2996000
crossref_primary_10_1155_2021_8952219
crossref_primary_10_1109_ACCESS_2023_3315655
crossref_primary_10_1109_TDSC_2022_3181667
crossref_primary_10_1007_s00500_016_2296_6
crossref_primary_10_1109_TDSC_2022_3208706
Cites_doi 10.2337/diacare.25.11.1999
10.1007/978-3-662-53018-4_6
10.1145/2213977.2214086
10.1006/jsco.1996.0125
10.1145/2046660.2046682
10.1145/1536414.1536440
10.1016/j.jbi.2014.04.003
10.1161/CIRCULATIONAHA.104.512079
10.1145/2488608.2488680
10.1145/1536414.1536461
10.1109/FOCS.2011.12
10.1186/1472-6947-15-S5-S3
10.1007/978-3-642-45239-0_4
10.1145/1568318.1568324
10.1007/978-3-662-48051-9_15
10.1145/2090236.2090262
10.1145/2554797.2554799
10.1007/s10623-012-9720-4
10.1145/2535925
10.1007/978-3-642-45239-0_17
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017
DBID 97E
RIA
RIE
AAYXX
CITATION
7SP
8FD
L7M
DOI 10.1109/JPROC.2016.2622218
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005-present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library Online
CrossRef
Electronics & Communications Abstracts
Technology Research Database
Advanced Technologies Database with Aerospace
DatabaseTitle CrossRef
Technology Research Database
Advanced Technologies Database with Aerospace
Electronics & Communications Abstracts
DatabaseTitleList Technology Research Database

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Biology
EISSN 1558-2256
EndPage 567
ExternalDocumentID 10_1109_JPROC_2016_2622218
7843616
Genre orig-research
GroupedDBID -DZ
-~X
.DC
0R~
123
1OL
29P
3EH
4.4
6IK
85S
97E
9M8
AAJGR
AAYOK
ABFSI
ABJNI
ABQJQ
ABTAH
ACBEA
ACGFS
AENEX
AETIX
AFOGA
AGNAY
AIBXA
ALLEH
ALMA_UNASSIGNED_HOLDINGS
AZLTO
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
FA8
HZ~
H~9
IAAWW
IBMZZ
ICLAB
IDIHD
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
MVM
O9-
OCL
RIA
RIE
RIG
RIU
RNS
TAE
TN5
TWZ
UDY
UHB
UKR
UQL
VOH
WHG
XJT
XOL
YNT
ZCA
ZXP
ZY4
~02
AAYXX
CITATION
F20
7SP
8FD
L7M
ID FETCH-LOGICAL-c225t-5b22055fd04a550c309d0dc00fd7cae29d07acc3eb014b7c50dd5dc52580d5f43
IEDL.DBID RIE
ISSN 0018-9219
IngestDate Thu Oct 10 17:31:40 EDT 2024
Thu Sep 26 17:30:36 EDT 2024
Mon Nov 04 11:48:13 EST 2024
IsPeerReviewed true
IsScholarly true
Issue 3
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c225t-5b22055fd04a550c309d0dc00fd7cae29d07acc3eb014b7c50dd5dc52580d5f43
PQID 2174441388
PQPubID 85453
PageCount 16
ParticipantIDs proquest_journals_2174441388
ieee_primary_7843616
crossref_primary_10_1109_JPROC_2016_2622218
PublicationCentury 2000
PublicationDate 2017-03-01
PublicationDateYYYYMMDD 2017-03-01
PublicationDate_xml – month: 03
  year: 2017
  text: 2017-03-01
  day: 01
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle Proceedings of the IEEE
PublicationTitleAbbrev JPROC
PublicationYear 2017
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref37
ref15
ref36
ref31
ref33
ref11
lepoint (ref28) 2014
kirchner (ref10) 2016
bos (ref6) 2013
ref1
ref17
ref38
brakerski (ref2) 2011
gilad-bachrach (ref13) 2016
lindner (ref30) 2011
gentry (ref19) 0; 8042
van dijk (ref14) 2010; 6110
gentry (ref4) 2012
stehlé (ref5) 2011
ref24
lauter (ref34) 2014
brakerski (ref21) 2013
ref25
laine (ref12) 2016
fan (ref8) 2012; 2012
ref20
ref22
(ref35) 2015
albrecht (ref9) 2016
cheon (ref23) 2015
ref27
ref29
ref7
fan (ref16) 2012
ref3
micciancio (ref26) 2012
(ref32) 2015
brakerski (ref18) 0; 7417
References_xml – ident: ref38
  doi: 10.2337/diacare.25.11.1999
– year: 2016
  ident: ref10
  article-title: Comparison between subfield and straightforward attacks on NTRU
  contributor:
    fullname: kirchner
– start-page: 850
  year: 2012
  ident: ref4
  article-title: Homomorphic evaluation of the AES circuit
  publication-title: Adv Cryptology
  contributor:
    fullname: gentry
– year: 2012
  ident: ref16
  article-title: Somewhat practical fully homomorphic encryption
  contributor:
    fullname: fan
– start-page: 27
  year: 2011
  ident: ref5
  article-title: Making NTRU as secure as worst-case problems over ideal lattices
  publication-title: Adv Cryptology
  contributor:
    fullname: stehlé
– start-page: 3
  year: 2014
  ident: ref34
  article-title: Private computation on encrypted genomic data
  publication-title: Progress in Cryptology
  contributor:
    fullname: lauter
– start-page: 201
  year: 2016
  ident: ref13
  article-title: CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy
  publication-title: Proc 33rd Int Conf Mach Learn
  contributor:
    fullname: gilad-bachrach
– volume: 7417
  start-page: 868
  year: 0
  ident: ref18
  article-title: Fully homomorphic encryption without modulus switching from classical GapSVP
  publication-title: Adv Cryptology
  contributor:
    fullname: brakerski
– year: 2016
  ident: ref9
  article-title: A subfield lattice attack on overstretched NTRU assumptions: Cryptanalysis of some FHE and graded encoding schemes
  doi: 10.1007/978-3-662-53018-4_6
  contributor:
    fullname: albrecht
– ident: ref17
  doi: 10.1145/2213977.2214086
– ident: ref36
  doi: 10.1006/jsco.1996.0125
– year: 2015
  ident: ref32
  article-title: R: A Language and Environment for Statistical Computing
– ident: ref7
  doi: 10.1145/2046660.2046682
– ident: ref1
  doi: 10.1145/1536414.1536440
– ident: ref31
  doi: 10.1016/j.jbi.2014.04.003
– ident: ref37
  doi: 10.1161/CIRCULATIONAHA.104.512079
– ident: ref27
  doi: 10.1145/2488608.2488680
– start-page: 700
  year: 2012
  ident: ref26
  article-title: Trapdoors for lattices: Simpler, tighter, faster, smaller
  publication-title: Adv Cryptology
  contributor:
    fullname: micciancio
– ident: ref25
  doi: 10.1145/1536414.1536461
– ident: ref15
  doi: 10.1109/FOCS.2011.12
– volume: 6110
  start-page: 24
  year: 2010
  ident: ref14
  article-title: Fully homomorphic encryption over the integers
  publication-title: Advances in Cryptology
  contributor:
    fullname: van dijk
– start-page: 505
  year: 2011
  ident: ref2
  article-title: Fully homomorphic encryption from ring-LWE and security for key dependent messages
  publication-title: Adv Cryptology
  contributor:
    fullname: brakerski
– ident: ref33
  doi: 10.1186/1472-6947-15-S5-S3
– start-page: 1
  year: 2013
  ident: ref21
  article-title: Packed ciphertexts in LWE-based homomorphic encryption
  publication-title: Proc Public Key Cryptography
  contributor:
    fullname: brakerski
– start-page: 319
  year: 2011
  ident: ref30
  article-title: Better key sizes (and attacks) for LWE-based encryption
  publication-title: Topics in Cryptology-CT-RSA
  contributor:
    fullname: lindner
– start-page: 45
  year: 2013
  ident: ref6
  article-title: Improved security for a ring-based fully homomorphic encryption scheme
  publication-title: Cryptography and Coding
  doi: 10.1007/978-3-642-45239-0_4
  contributor:
    fullname: bos
– ident: ref24
  doi: 10.1145/1568318.1568324
– year: 2015
  ident: ref35
  publication-title: Secure Genome Analysis Competition
– volume: 2012
  start-page: 144
  year: 2012
  ident: ref8
  article-title: Somewhat practical fully homomorphic encryption
  publication-title: IACR Cryptology ePrint
  contributor:
    fullname: fan
– year: 2015
  ident: ref23
  article-title: Homomorphic computation of edit distance
  doi: 10.1007/978-3-662-48051-9_15
  contributor:
    fullname: cheon
– ident: ref3
  doi: 10.1145/2090236.2090262
– ident: ref20
  doi: 10.1145/2554797.2554799
– ident: ref22
  doi: 10.1007/s10623-012-9720-4
– ident: ref11
  doi: 10.1145/2535925
– ident: ref29
  doi: 10.1007/978-3-642-45239-0_17
– year: 2016
  ident: ref12
  article-title: Simple Encrypted Arithmetic Library-Seal (V2.1)
  contributor:
    fullname: laine
– start-page: 318
  year: 2014
  ident: ref28
  article-title: A comparison of the homomorphic encryption schemes FV and YASHE
  publication-title: Progress in Cryptology-AFRICACRYPT
  contributor:
    fullname: lepoint
– volume: 8042
  start-page: 75
  year: 0
  ident: ref19
  article-title: Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based
  publication-title: Adv Cryptology
  contributor:
    fullname: gentry
SSID ssj0003563
Score 2.4897048
Snippet Biological data science is an emerging field facing multiple challenges for hosting, sharing, computing on, and interacting with large data sets. Privacy...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Publisher
StartPage 552
SubjectTerms Bioinformatics
Biology
Cryptography
data privacy
Encryption
Genomics
homomorphic encryption
Public key
Title Manual for Using Homomorphic Encryption for Bioinformatics
URI https://ieeexplore.ieee.org/document/7843616
https://www.proquest.com/docview/2174441388
Volume 105
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFH9sA0EPfmyK0yk9eNN2WZO0jTeRjTGYijjYreSrIGInszvMv94kbcdQD9JLCmlI38v7at_7PYArTpUJG-TAF6HmPgmR8HmsiI8xoYoaC544uKbpQzSekcmczhtws6mF0Vq75DMd2KH7l68WcmU_lfXjhOBoEDWhGTNW1mpttC6mVde0gRFgI4Z1gQxi_cnT8-O9zeKKgjAy9tA2-NgyQq6ryi9V7OzL6ACm9c7KtJK3YFWIQH79AG3879YPYb9yNL278mQcQUPnbdgpW0-u27C3BUTYgdspt9CknvFgPZdE4I0X7-YyTHiV3jCXy7VTLW6CWaOCW7UQz8cwGw1f7sd-1VXBl0Z2C58KW1tLM4UIN-GJxIgppCRCmYol16G5i7mUWAsTPYlYUqQUVZKGNEGKZgSfQCtf5PoUPOt8CKYiSagkmVIJYlqygXlRwRMR8i5c12ROP0rwjNQFHYiljimpZUpaMaULHUu3zcyKZF3o1ZxJK_n6TG0gZRw5nCRnfz91DruhNcAuW6wHrWK50hfGfSjEpTs33_TFwIc
link.rule.ids 315,783,787,799,27936,27937,55086
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8JAEJ4gxqgHH6gRRe3BmxaWdrcPb4ZAEAGNgYRbs68mxggG4YC_3tltIUQ9mF7aZNtsZ3Z2vmlnvgG45kxh2CDrrvA0d6lHhMtDRV3fp0wx9OCRpWvq9YP2kHZGbFSA21UtjNbaJp_pqjm1__LVRM7Np7JaGFE_qAcbsIm4Ogqyaq3VvuuzvG9aHU0YDXFZIkPiWuf55alh8riCqhegRzQtPtbckO2r8mszth6mtQ-95dyyxJK36nwmqvLrB23jfyd_AHs51HTus7VxCAU9LsFW1nxyUYLdNSrCI7jrcUNO6iCGdWwagdOevOOBaniVTnMspwu7udgB-IyccNWQPB_DsNUcNNpu3lfBlWi9M5cJU13LUkUoR0FKn8SKKElIqkLJtYdXIZfS1wLjJxFKRpRiSjKPRUSxlPonUBxPxvoUHAM_RKwCSZmkqVIRibWM6_iigkfC42W4WYo5-cjoMxIbdpA4sUpJjFKSXCllODJyW43MRVaGylIzSW5hn4kJpRDK-VF09vddV7DdHvS6Sfeh_3gOO55xxzZ3rALF2XSuLxBMzMSlXUPfM4XD0g
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Manual+for+Using+Homomorphic+Encryption+for+Bioinformatics&rft.jtitle=Proceedings+of+the+IEEE&rft.au=Dowlin%2C+Nathan&rft.au=Gilad-Bachrach%2C+Ran&rft.au=Laine%2C+Kim&rft.au=Lauter%2C+Kristin&rft.date=2017-03-01&rft.issn=0018-9219&rft.eissn=1558-2256&rft.spage=1&rft.epage=16&rft_id=info:doi/10.1109%2FJPROC.2016.2622218&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_JPROC_2016_2622218
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9219&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9219&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9219&client=summon