Simpler Protocols for Privacy-Preserving Disease Susceptibility Testing
نویسندگان
چکیده
This short paper presents a preliminary description of two new protocols for privacy-preserving disease susceptibility testing, following the model proposed by Ayday et al. in [4]. We show that an alternative encoding of the patient’s SNPs can simplify private computations, and make patient-side computation on a trusted smartcard device extremely efficient. To support larger tests, we propose a second protocol variant based on secret sharing that is also simpler than the original proposal, and relies on more efficient primitives.
منابع مشابه
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملA centralized privacy-preserving framework for online social networks
There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically changes over the time. Additionally, users may define similar privacy settings for their f...
متن کاملFair and Privacy-Preserving Multi-party Protocols for Reconciling Ordered Input Sets
In this paper, we introduce the first protocols for multi-party, privacy-preserving, fair reconciliation of ordered sets. Our contributions are twofold. First, we show that it is possible to extend the round-based construction for fair, two-party privacypreserving reconciliation of ordered sets to multiple parties using a multi-party privacy-preserving set intersection protocol. Second, we prop...
متن کاملEfficient Privacy Preserving Protocols for Decentralized Computation of Reputation
We present three different privacy preserving protocols for computing reputation. They vary in strength in terms of preserving privacy, however, a common thread in all three protocols is that they are fully decentralized and efficient. Our protocols that are resilient against semi-honest adversaries and non-disruptive malicious adversaries have linear and loglinear communication complexity resp...
متن کاملPrivacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks: A Survey
Many wireless sensor network (WSN) applications require privacy-preserving aggregation of sensor data during transmission from the source nodes to the sink node. In this paper, we explore several existing privacy-preserving data aggregation (PPDA) protocols for WSNs in order to provide some insights on their current status. For this, we evaluate the PPDA protocols on the basis of such metrics a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014