Cho et al. ‘describe a protocol for large-scale genome-wide analysis that facilitates quality control and population stratification correction […] while maintaining the confidentiality of underlying genotypes and phenotypes. […] This approach may help to make currently restricted data available to the scientific community and could potentially enable secure genome crowdsourcing, allowing individuals to contribute their genomes to a study without compromising their privacy.’
In this preprint, Bonte et al. describe both a homomorphic encryption approach and a secure multiparty computation approach and provide efficient implementations.
Jagadeesh et al. encode an individuals functional variants as a binary vector. They then use Yao’s protocol to identify relevant coincidences between pools of such vectors engaging in secure multiparty computation.
Ronald Cramer, Ivan Bjerre Damgård, and Jesper Buus Nielsen present a book on ‘Secure multiparty computation and secret sharing’. There is a PDF available from Moodle courseware.
- buy at Amazon
- PDF link available from Moodle courseware