Background: As genome sequencing technology develops rapidly, there has lately been an increasing need to keep genomic data secure even when stored in the cloud and still used for research. We are interested in designing a protocol for the secure outsourcing matching problem on encrypted data. Method: We propose an efficient method to securely search a matching position with the query data and extract some information at the position. After decryption, only a small amount of comparisons with the query information should be performed in plaintext state. We apply this method to find a set of biomarkers in encrypted genomes. The important feature of our method is to encode a genomic database as a single element of polynomial ring. Result: Sinc...
Whole genome sequencing has become fast, accurate, and cheap, paving the way towards the large-scale...
A number of databases around the world currently host a wealth of genomic data that is invaluable to...
Additively homomorphic encryption is a public-key primitive allowing a sum to be computed on encrypt...
This article is distributed under the terms of the Creative Commons Attribution 4.0 International Li...
The rapid development of genome sequencing technology allows researchers to access large genome data...
Background: The rapid development of genome sequencing technology allows researchers to access large...
ObjectiveDeveloped sequencing techniques are yielding large-scale genomic data at low cost. A genome...
Abstract Background One of the tasks in the iDASH Secure Genome Analysis Competition in 2016 was to ...
From iDASH Privacy and Security Workshop 2016International audienceCloud computing is becoming the p...
Cloud computing is becoming the preferred solution for efficiently dealing with the increasing amoun...
International audienceVery few organizations can afford the necessary infrastructure for genomic dat...
The decline in genome sequencing costs has widened the population that can afford its cost and has a...
Genomic data are becoming increasingly valuable as we develop methods to utilize the information at ...
Genomic data are becoming increasingly valuable as we develop methods to utilize the information at ...
Cloud computing is becoming the preferred solution for efficiently dealing with the increasing amoun...
Whole genome sequencing has become fast, accurate, and cheap, paving the way towards the large-scale...
A number of databases around the world currently host a wealth of genomic data that is invaluable to...
Additively homomorphic encryption is a public-key primitive allowing a sum to be computed on encrypt...
This article is distributed under the terms of the Creative Commons Attribution 4.0 International Li...
The rapid development of genome sequencing technology allows researchers to access large genome data...
Background: The rapid development of genome sequencing technology allows researchers to access large...
ObjectiveDeveloped sequencing techniques are yielding large-scale genomic data at low cost. A genome...
Abstract Background One of the tasks in the iDASH Secure Genome Analysis Competition in 2016 was to ...
From iDASH Privacy and Security Workshop 2016International audienceCloud computing is becoming the p...
Cloud computing is becoming the preferred solution for efficiently dealing with the increasing amoun...
International audienceVery few organizations can afford the necessary infrastructure for genomic dat...
The decline in genome sequencing costs has widened the population that can afford its cost and has a...
Genomic data are becoming increasingly valuable as we develop methods to utilize the information at ...
Genomic data are becoming increasingly valuable as we develop methods to utilize the information at ...
Cloud computing is becoming the preferred solution for efficiently dealing with the increasing amoun...
Whole genome sequencing has become fast, accurate, and cheap, paving the way towards the large-scale...
A number of databases around the world currently host a wealth of genomic data that is invaluable to...
Additively homomorphic encryption is a public-key primitive allowing a sum to be computed on encrypt...