Private computation on encrypted genomic data
From MaRDI portal
Publication:2946463
Recommendations
- Labeled homomorphic encryption. Scalable and privacy-preserving processing of outsourced data
- Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption
- On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data
- A new privacy homomorphism and applications
- Computing arbitrary functions of encrypted data
Cites work
- (Leveled) fully homomorphic encryption without bootstrapping
- A comparison of the homomorphic encryption schemes FV and YASHE
- Efficient Fully Homomorphic Encryption from (Standard) LWE
- Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
- Fully homomorphic encryption from ring-LWE and security for key dependent messages
- Fully homomorphic encryption over the integers
- Fully homomorphic encryption using ideal lattices
- Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based
- Improved security for a ring-based fully homomorphic encryption scheme
- Lattice-based FHE as secure as PKE
- ML confidential: machine learning on encrypted data
- Making NTRU as secure as worst-case problems over ideal lattices
- On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
- Penalized logistic regression for detecting gene interactions
- Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption
- The Magma algebra system. I: The user language
Cited in
(25)- On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data
- Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes
- A framework with randomized encoding for a fast privacy preserving calculation of non-linear kernels for machine learning applications in precision medicine
- Revisiting Lattice Attacks on Overstretched NTRU Parameters
- Efficiently processing complex-valued data in homomorphic encryption
- Privacy-preserving encryption scheme using DNA parentage test
- Privacy-preserving edit distance computation using secret-sharing two-party computation
- Secure statistical analysis using RLWE-based homomorphic encryption
- Depth optimized efficient homomorphic sorting
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- Somewhat/fully homomorphic encryption: implementation progresses and challenges
- Blending FHE-NTRU keys -- the excalibur property
- Bootstrapping for approximate homomorphic encryption
- Sharing privacy protected and statistically sound clinical research data using outsourced data storage
- Flattening NTRU for evaluation key free homomorphic encryption
- How to compress encrypted data
- PIE: \(p\)-adic encoding for high-precision arithmetic in homomorphic encryption
- Fully homomorphic encryption for point numbers
- Privacy-preserving pattern matching on encrypted data
- Efficient privacy-preserving variable-length substring match for genome sequence
- Privacy-preserving set-based estimation using partially homomorphic encryption
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- Private AI: Machine Learning on Encrypted Data
- Labeled homomorphic encryption. Scalable and privacy-preserving processing of outsourced data
- Inference attacks on genomic privacy with an improved HMM and an RCNN model for unrelated individuals
This page was built for publication: Private computation on encrypted genomic data
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2946463)