2014) (Djatmiko et al., 2014) (Barman et al., 2015)
have built upon Ayday et al.’s scheme, they still re-
quire further improvement (details will be discussed
in Section 2).
In this paper, we propose a privacy-preserving
DST framework based on Shamir’s secret shar-
ing (Shamir, 1979). Our scheme incurs less overhead
and minimizes the participation of a patient in the pro-
cess. Using Shamir’s (l, n) secret sharing, we create n
shares of the genomic data, and distribute the shares
to n datacenters. Any group of less than l datacenters
will learn nothing about the secret data. Our approach
allows one multiplication and unlimited additions of
the shared (i.e., encrypted) values. Unlike Ayday et
al.’s scheme, we do not store additional multiplied
values, therefore the data overhead is reduced. To fur-
ther improve efficiency, we outsource the DST com-
putations from the hospital to the datacenters, which
usually have more computational resources. Finally,
to prevent the datacenters from inferring the disease
from the DST, we camouflage the DST computation
by introducing dummy genomic data (i.e., operands)
and dummy SNP weights. In our experimental setup,
our scheme runs 10, 000 times faster than Ayday et
al.’s scheme.
The rest of this paper is organized as follows. Sec-
tion 3 provides background information on genomics
and Shamir’s secret sharing. Section 2 presents re-
lated work. In Section 4, we discuss our framework
based on secret sharing, and in Section 5, we present
analysis and experimental results. Section 6 con-
cludes our work.
2 RELATED WORK
2.1 Ayday et al.’s Scheme
The main idea behind Ayday et al.’s scheme (Fig-
ure 1) (Ayday et al., 2013) is to store the SNPs in
a third-party Storage and Processing Unit (SPU, i.e.,
a datacenter) in encrypted form, and allow a medi-
cal center (MC, i.e., a hospital) to access part of the
SNPs. Given the biological sample of a patient, a
trusted entity called Certified Institution (CI) first se-
quences the sample to obtain the patient’s SNPs in
digital form, and then encrypts the states and posi-
tions of the SNPs. The state of a SNP is encrypted us-
ing Paillier double encryption scheme (Bresson et al.,
2003), whereas the position is encrypted using sym-
metric encryption. The encrypted SNPs are stored in
the SPU. When an MC wants to perform a DST, it
sends the location of the required SNPs to the patient.
The patient checks whether the MC has permission
to access the SNPs, and if so, sends the encrypted
SNP positions (encrypted using the same symmetric
encryption scheme) to the SPU. The SPU fetches the
SNPs, re-encrypts the SNPs using the modified Pail-
lier cryptosystem, and sends the encrypted SNPs to
the MC. The MC performs the weighted-averaging-
based DST (i.e., computes S
X
P
) on encrypted SNPs,
and sends the encrypted result to the SPU. The SPU
partially decrypts the result and sends it to the MC,
where the result is fully decrypted.
However, Ayday et al.’s scheme has several prac-
tical issues. Firstly, the use of the modified Paillier
cryptosystem results in high storage and computation
overhead as a 2-bit SNP state (i.e., 0, 1, or 2) will
be represented as an 8192-bit ciphertext-pair (because
2048-bit keys are recommended for the Paillier cryp-
tosystem). Secondly, since the Paillier cryptosystem
is not homomorphic to multiplications, the CI must
pre-compute the squared values of SNP states and
store the squared values at the SPU. Finally, patients
are actively involved in this scheme, which is gener-
ally undesirable. Not only do they have to perform
symmetrical encryptions with their smartcard, they
also need to be knowledgeable about genomics to de-
cide if the MC’s SNP requests are legitimate. The
participation of the patient is both user-unfriendly and
insecure as a wrong decision by the patient can leak
sensitive information (and the patient will be respon-
sible).
2.2 Other Schemes
After the seminal work of Ayday et al., several studies
have been carried out to improve and extend Ayday et
al.’s scheme.
In (Danezis and De Cristofaro, 2014), Danezis et
al. proposed a SNP-encoding scheme that eliminates
the need for ciphertext multiplications. They used the
faster El-Gamal cryptosystem instead of the Paillier
cryptosystem. Although the overhead is decreased,
the patient is still required to participate in the test.
The patient also needs to store the encryption keys
in a smart card, which when lost could cause a se-
curity breach. Furthermore, Danezis et al.’s scheme
discloses the number of SNPs to a third-party server.
Compared to their scheme, our keyless scheme is
more secure as it completely eliminates the need for
a smartcard, and hides the number of SNPs from the
server using data obfuscation.
Djatmiko et al. (Djatmiko et al., 2014) proposed
a Paillier-based scheme that can securely store and
compute linear combinations of genomic data on
a user’s mobile device. Similar to Ayday et al.’s
scheme, their scheme also incurs high overhead.
SECRYPT 2017 - 14th International Conference on Security and Cryptography
526