• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

使用安全多方计算进行单核苷酸多态性的安全比较:方法开发

Secure Comparisons of Single Nucleotide Polymorphisms Using Secure Multiparty Computation: Method Development.

作者信息

Woods Andrew, Kramer Skyler T, Xu Dong, Jiang Wei

机构信息

Department of Electrical Engineering and Computer Science, University of Missouri, Columbia, MO, United States.

Christopher S. Bond Life Sciences Center, University of Missouri, Columbia, MO, United States.

出版信息

JMIR Bioinform Biotechnol. 2023 Jul 18;4:e44700. doi: 10.2196/44700.

DOI:10.2196/44700
PMID:38935952
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11135223/
Abstract

BACKGROUND

While genomic variations can provide valuable information for health care and ancestry, the privacy of individual genomic data must be protected. Thus, a secure environment is desirable for a human DNA database such that the total data are queryable but not directly accessible to involved parties (eg, data hosts and hospitals) and that the query results are learned only by the user or authorized party.

OBJECTIVE

In this study, we provide efficient and secure computations on panels of single nucleotide polymorphisms (SNPs) from genomic sequences as computed under the following set operations: union, intersection, set difference, and symmetric difference.

METHODS

Using these operations, we can compute similarity metrics, such as the Jaccard similarity, which could allow querying a DNA database to find the same person and genetic relatives securely. We analyzed various security paradigms and show metrics for the protocols under several security assumptions, such as semihonest, malicious with honest majority, and malicious with a malicious majority.

RESULTS

We show that our methods can be used practically on realistically sized data. Specifically, we can compute the Jaccard similarity of two genomes when considering sets of SNPs, each with 400,000 SNPs, in 2.16 seconds with the assumption of a malicious adversary in an honest majority and 0.36 seconds under a semihonest model.

CONCLUSIONS

Our methods may help adopt trusted environments for hosting individual genomic data with end-to-end data security.

摘要

背景

虽然基因组变异可为医疗保健和血统提供有价值的信息,但个人基因组数据的隐私必须得到保护。因此,人类DNA数据库需要一个安全的环境,使全部数据可查询,但相关方(如数据托管方和医院)无法直接访问,并且查询结果只能由用户或授权方得知。

目的

在本研究中,我们针对基因组序列中的单核苷酸多态性(SNP)面板进行高效且安全的计算,这些计算是在并集、交集、集合差和对称差等集合操作下进行的。

方法

通过这些操作,我们可以计算相似性度量,如杰卡德相似性,这能够在安全查询DNA数据库时找到同一个人和遗传亲属。我们分析了各种安全范式,并展示了在几种安全假设下协议的度量,如半诚实、诚实多数恶意和恶意多数恶意。

结果

我们表明我们的方法可以实际应用于实际规模的数据。具体而言,在诚实多数恶意对手假设下,我们可以在2.16秒内计算两个包含40万个SNP的基因组集合的杰卡德相似性,在半诚实模型下为0.36秒。

结论

我们的方法可能有助于采用可信环境来托管具有端到端数据安全性的个人基因组数据。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0008/11135223/9dce9dddb338/bioinform_v4i1e44700_fig5.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0008/11135223/a851d7edbadb/bioinform_v4i1e44700_fig1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0008/11135223/87b570fb5e86/bioinform_v4i1e44700_fig2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0008/11135223/0c14ca9dcd1a/bioinform_v4i1e44700_fig3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0008/11135223/807d056de2bf/bioinform_v4i1e44700_fig4.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0008/11135223/9dce9dddb338/bioinform_v4i1e44700_fig5.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0008/11135223/a851d7edbadb/bioinform_v4i1e44700_fig1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0008/11135223/87b570fb5e86/bioinform_v4i1e44700_fig2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0008/11135223/0c14ca9dcd1a/bioinform_v4i1e44700_fig3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0008/11135223/807d056de2bf/bioinform_v4i1e44700_fig4.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0008/11135223/9dce9dddb338/bioinform_v4i1e44700_fig5.jpg

相似文献

1
Secure Comparisons of Single Nucleotide Polymorphisms Using Secure Multiparty Computation: Method Development.使用安全多方计算进行单核苷酸多态性的安全比较:方法开发
JMIR Bioinform Biotechnol. 2023 Jul 18;4:e44700. doi: 10.2196/44700.
2
Two-Party Privacy-Preserving Set Intersection with FHE.基于全同态加密的两方隐私保护集合交集
Entropy (Basel). 2020 Nov 25;22(12):1339. doi: 10.3390/e22121339.
3
Secure Multiparty Quantum Computation for Summation and Multiplication.用于求和与乘法的安全多方量子计算
Sci Rep. 2016 Jan 21;6:19655. doi: 10.1038/srep19655.
4
Efficient Privacy-preserving Logistic Model With Malicious Security.具有恶意安全性的高效隐私保护逻辑模型
IEEE Trans Inf Forensics Secur. 2024;19:5751-5766. doi: 10.1109/tifs.2024.3402319. Epub 2024 May 17.
5
Edge-assisted quantum protocol for secure multiparty logical AND its applications.用于安全多方逻辑与的边缘辅助量子协议及其应用
iScience. 2023 May 29;26(7):106990. doi: 10.1016/j.isci.2023.106990. eCollection 2023 Jul 21.
6
Secure count query on encrypted genomic data.加密基因组数据上的安全计数查询。
J Biomed Inform. 2018 May;81:41-52. doi: 10.1016/j.jbi.2018.03.003. Epub 2018 Mar 15.
7
An efficient simulation for quantum secure multiparty computation.量子安全多方计算的高效模拟。
Sci Rep. 2021 Jan 26;11(1):2206. doi: 10.1038/s41598-021-81799-z.
8
Secure computation protocol of Chebyshev distance under the malicious model.恶意模型下切比雪夫距离的安全计算协议
Sci Rep. 2024 Jul 24;14(1):17115. doi: 10.1038/s41598-024-67907-9.
9
Developing High Performance Secure Multi-Party Computation Protocols in Healthcare: A Case Study of Patient Risk Stratification.在医疗保健中开发高性能安全多方计算协议:以患者风险分层为例。
AMIA Jt Summits Transl Sci Proc. 2021 May 17;2021:200-209. eCollection 2021.
10
Secure large-scale genome data storage and query.安全存储和查询大规模基因组数据。
Comput Methods Programs Biomed. 2018 Oct;165:129-137. doi: 10.1016/j.cmpb.2018.08.007. Epub 2018 Aug 16.

本文引用的文献

1
Family secrets: Experiences and outcomes of participating in direct-to-consumer genetic relative-finder services.家庭秘密:参与直接面向消费者的基因亲属寻找服务的体验和结果。
Am J Hum Genet. 2022 Mar 3;109(3):486-497. doi: 10.1016/j.ajhg.2022.01.013. Epub 2022 Feb 24.
2
simuG: a general-purpose genome simulator.simuG:一种通用的基因组模拟程序。
Bioinformatics. 2019 Nov 1;35(21):4442-4444. doi: 10.1093/bioinformatics/btz424.
3
Secure Similar Patients Query on Encrypted Genomic Data.对加密基因组数据进行安全的相似患者查询。
IEEE J Biomed Health Inform. 2019 Nov;23(6):2611-2618. doi: 10.1109/JBHI.2018.2881086. Epub 2018 Nov 13.
4
Deriving genomic diagnoses without revealing patient genomes.在不透露患者基因组的情况下进行基因组诊断。
Science. 2017 Aug 18;357(6352):692-695. doi: 10.1126/science.aam9710.
5
Secure approximation of edit distance on genomic data.基因组数据编辑距离的安全近似值。
BMC Med Genomics. 2017 Jul 26;10(Suppl 2):41. doi: 10.1186/s12920-017-0279-9.
6
Private queries on encrypted genomic data.关于加密基因组数据的私密查询
BMC Med Genomics. 2017 Jul 26;10(Suppl 2):45. doi: 10.1186/s12920-017-0276-z.
7
Protecting genomic data analytics in the cloud: state of the art and opportunities.保护云端基因组数据分析:现状与机遇
BMC Med Genomics. 2016 Oct 13;9(1):63. doi: 10.1186/s12920-016-0224-3.
8
The variant call format and VCFtools.变异调用格式和 VCFtools。
Bioinformatics. 2011 Aug 1;27(15):2156-8. doi: 10.1093/bioinformatics/btr330. Epub 2011 Jun 7.
9
BEDTools: a flexible suite of utilities for comparing genomic features.BEDTools:一套灵活的基因组特征比较工具套件。
Bioinformatics. 2010 Mar 15;26(6):841-2. doi: 10.1093/bioinformatics/btq033. Epub 2010 Jan 28.
10
A highly informative SNP linkage panel for human genetic studies.用于人类遗传学研究的高信息量单核苷酸多态性(SNP)连锁图谱。
Nat Methods. 2004 Nov;1(2):113-7. doi: 10.1038/nmeth712. Epub 2004 Oct 21.