2022
DOI: 10.1109/access.2022.3158416
|View full text |Cite
|
Sign up to set email alerts
|

Private Computation of Phylogenetic Trees Based on Quantum Technologies

Abstract: Individuals' privacy and legal regulations demand genomic data be handled and studied with highly secure privacy-preserving techniques. In this work, we propose a feasible Secure Multiparty Computation (SMC) system assisted with quantum cryptographic protocols that is designed to compute a phylogenetic tree from a set of private genome sequences. This system significantly improves the privacy and security of the computation thanks to three quantum cryptographic protocols that provide enhanced security against … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

3
4

Authors

Journals

citations
Cited by 8 publications
(13 citation statements)
references
References 106 publications
0
13
0
Order By: Relevance
“…However, quantum hacking techniques pose a security threat to these protocols. Santos et al [ 19 ] gave a brief description of how two common techniques (faked-state and trojan-horses attacks) break the security of assumption-based BBCS protocols ( , and ). In summary, a faked-state attack allows the receiver to avoid the security guarantees enforced by the assumptions and effectively receive both messages and .…”
Section: Qot Protocols With Assumptionsmentioning
confidence: 99%
See 3 more Smart Citations
“…However, quantum hacking techniques pose a security threat to these protocols. Santos et al [ 19 ] gave a brief description of how two common techniques (faked-state and trojan-horses attacks) break the security of assumption-based BBCS protocols ( , and ). In summary, a faked-state attack allows the receiver to avoid the security guarantees enforced by the assumptions and effectively receive both messages and .…”
Section: Qot Protocols With Assumptionsmentioning
confidence: 99%
“…More recently, the first direct quantum protocol for a generalization of oblivious transfer known as oblivious linear evaluation was proposed [ 17 ]. In addition, quantum versions of oblivious transfer have recently been applied to SMC systems in the field of genomics medicine [ 18 , 19 ]. Developing efficient and secure OT primitives is essential not only from a theoretical perspective but also from a practical one.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…More recently, the first direct quantum protocol for a generalization of oblivious transfer known as oblivious linear evaluation was proposed [SMV22]. Also, quantum versions of oblivious transfer have recently been applied to SMC systems in the field of genomics medicine [SGPM21,SGPM22]. Developing efficient and secure OT primitives is essential not only from a theoretical perspective but also from a practical one.…”
Section: Introductionmentioning
confidence: 99%