Efficient Outsourcing GWAS using FHE Wenjie Lu*, Jun Sakuma * * - - PowerPoint PPT Presentation

efficient outsourcing gwas using fhe
SMART_READER_LITE
LIVE PREVIEW

Efficient Outsourcing GWAS using FHE Wenjie Lu*, Jun Sakuma * * - - PowerPoint PPT Presentation

Efficient Outsourcing GWAS using FHE Wenjie Lu*, Jun Sakuma * * Dept. of CS, University of Tsukuba, Japan JST CREST Secure Outsourcing GWAS Secure computation [Cloud] Outline of our solution [data holder] Secure


slide-1
SLIDE 1

Efficient Outsourcing GWAS using FHE

Wenjie Lu*, Jun Sakuma* * Dept. of CS, University of Tsukuba, Japan JST CREST

slide-2
SLIDE 2

Secure Outsourcing GWAS

Secure computation

slide-3
SLIDE 3

Outline of our solution

Locally compute the chi-square statistic

χ2 = X

i

(ri − ei)2 ei

Secure computation of r2, a and d

Download encrypted E(a),E(d),E(r2) Decrypt them and construct two tables

[Cloud] [Researcher]

Forward-backward packing for scalar product computation

[data holder]

Encryption by HELib[Halevi+14]

Halevi, Shai, and Victor Shoup. "Algorithms in helib." Advances in Cryptology–CRYPTO 2014. Springer Berlin Heidelberg, 2014. 554-571.

slide-4
SLIDE 4

Notations

Allele of M subjects Scalar Product of vector x and y: Vector containing 1 onlly:

x = {AA, Aa, aa}M

slide-5
SLIDE 5

Our Encoding for SNPs

Then we have How to compute scalar product securely and efficiently?

slide-6
SLIDE 6

Fully Homomorphic Encryption (FHE)

  • The plaintext-space of the BGV scheme is a

polynomial ring:

  • Brakerski– Gentry–Vaikuntanathan (BGV)[Brakerski

+2012] scheme, implemented by HELib[Halevi+2014]

  • Supports leveled homomorphic multiplication

Brakerski, Zvika, Craig Gentry, and Vinod Vaikuntanathan. "(Leveled) fully homomorphic encryption without boot strapping." Proceedings of the 3rd Innovations in Theoretical Computer Science Conference. ACM, 2012.

slide-7
SLIDE 7

Packing Technique for Efficient Scalar Product

  • The plaintext-space of the FHE scheme:

is a polynomial ring.

  • A vector of integers can be embedded into

coefficients of the polynomial such as

  • The whole vector can be encrypted as one

ciphertext such as

slide-8
SLIDE 8

Packing Technique for Efficient Scalar Product

[Yasuda et al. 2011]

Make two polynomials The multiplication of V(x), U(x) yields a scalar product Two integer vectors

Scalar product can be securely and efficiently computed as

Enc(V (x)) ⊗ Enc(U(x))

v := [v0, v1, · · · , v`] u := [u0, u1, · · · , u`]

Yasuda, Masaya, et al. "Secure pattern matching using somewhat homomorphic encryption." Proceedings of the 2013 ACM workshop on Cloud computing security workshop. ACM, 2013.

slide-9
SLIDE 9

Additive Property I

information leak

Random Polynomial prevent from information leak by randomization

Prevention of information leakage by randomization

slide-10
SLIDE 10

Outsourcing the computation of Contingency Table

data holders

cloud cloud

Two ciphertexts! Three homomorphic multiplications!

slide-11
SLIDE 11

Scheme Parameters

  • Parameters of the encryption scheme: plaintext-space parameter

t = 20003; polynomial degree m = 4096; levels L = 3

  • Security analysis of our scheme parameters[Gentry+2012]

m > (L(log m + 23) − 8.5)(κ + 110) 7.2

  • bit security is guaranteed.
  • κ

κ

In our settings, >= 128

Gentry, Craig, Shai Halevi, and Nigel P. Smart. "Homomorphic evaluation of the AES circ uit." Advances in Cryptology–CRYPTO 2012. Springer Berlin Heidelberg, 2012. 850-867.

slide-12
SLIDE 12

Experiments

  • Outsourcing the computation of the contingency table of one

SNPs

  • the number of subjects varies from 100 to 10,000
  • CPU 2.3GHz, RAM 16GB
  • FHE implementation: Helib [https://github.com/shaih/HElib]
slide-13
SLIDE 13

Experimental Results: Communication Size

Red Line: Lauter et al’s encoding Green Line: proposal encoding X-axis: the number of subjects Y-axis: communication size (MB)

Lauter, Kristin, Adriana López-Alt, and Michael Naehrig. “Private computation on encrypted genomic data.” 14th Privacy Enhancing Technologies Symposium, Workshop on Genome Privacy 2014

slide-14
SLIDE 14

Experimental Results: Computation Time (cloud side)

Red Line: Lauter et al’s encoding Green Line: proposal encoding X-axis: the number of subjects Y-axis: computation time (sec)

slide-15
SLIDE 15

Merits of the packing technique

  • Communication Efficiency: Allele of several thousands of

subjects can be packed into a single ciphertext

  • Computation Efficiency: Scalar product of two vectors

needs only a single homomorphic multiplication

slide-16
SLIDE 16

Scalability of our method Scalability of our method

` ≥ m

v := [v0, v1, · · · , v`] u := [u0, u1, · · · , u`]

When

, which means the number of subjects is too large

  • 1. Use larger parameter m,
  • 2. Partition v, u into smaller pieces

v → [v1||v2|| · · · ||vk]

u → [u1||u2|| · · · ||uk]

hv, ui =

k

X

i=1

hvi, uii

(may not be computationally efficient)

slide-17
SLIDE 17

Thank you!

slide-18
SLIDE 18

An Existent Encoding for SNPs

[Lauter et al. 2014]

Encoding for Genotype: Encoding for Phenotype: The number of ciphertext of M subjects is 5M for one SNP.

slide-19
SLIDE 19

Additive Property II

Data collection from multiple data holders

The genotype and phenotype data is hold separately by Alice and Bob

Party A Party B Union