Gene sequence security comparison method and system supporting multi-attribute anonymous authentication

A gene sequence and anonymous authentication technology, applied in sequence analysis, computer security devices, instruments, etc.

Active Publication Date: 2021-04-06
JINAN UNIVERSITY
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the similar gene sequence query scenario, the existing schemes are still unable to protect the privacy and data security of all parties, and the data owner can have more fine-grained authority control over their own gene sequences—query Only when all attributes of the data owner meet the requirements of a certain genetic sequence of the data owner can the queryer obtain the corresponding genetic sequence, that is, realize the multi-attribute anonymous authentication of the queryer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Gene sequence security comparison method and system supporting multi-attribute anonymous authentication
  • Gene sequence security comparison method and system supporting multi-attribute anonymous authentication
  • Gene sequence security comparison method and system supporting multi-attribute anonymous authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] This embodiment discloses a gene sequence security comparison method that supports multi-attribute anonymous authentication, such as figure 1 with figure 2 shown, including the following steps:

[0063] S1. The owner of the gene database initializes the gene sequence it holds: set the corresponding threshold, label, and access attribute set for each gene sequence, and then send the threshold and access attribute set to the certificate issuer.

[0064] The initialization process is as follows:

[0065] S11. The certificate issuer generates its own private key sk issuer , generate and expose the system-wide parameter pk issuer , and determine the attribute set U that contains all possible attributes;

[0066] S12. The owner of the gene database obtains the public parameter pk of the issuer of the certificate issuer , based on the public parameter pk issuer Generate public-private key pair pk DB 、sk DB , for each gene sequence db it owns i Set index, access attr...

Embodiment 2

[0096] This embodiment discloses a gene sequence security comparison system that supports multi-attribute anonymous authentication. The system can implement the gene sequence security comparison method that supports multi-attribute anonymous authentication described in Example 1. The system specifically includes a query client , Gene database owner end, certificate issuer end.

[0097] Among them, the genetic data owner can be a plurality of independent database institutions, which can provide original genetic data. The query client can be a general client that only initiates a query request, or a genetic data owner that also provides genetic data. The certificate issuer can be a third-party trusted organization, which can be assumed by important departments, such as the National Institutes of Health (NIH) and the International Human Genome Organization (HUGO), which are responsible for generating and issuing attribute certificates.

[0098] The gene sequence safety compariso...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a gene sequence security comparison method and system supporting multi-attribute anonymous authentication; the method comprises the steps: firstly enabling a gene database owner to transmit a threshold value and an access attribute set of a gene sequence to a certificate issuer, and then designing a confusion circuit according to a calculation demand, so as to find out a gene sequence which can be queried by a query user from the confusion circuit; returning labels corresponding to the gene sequences to the query user; initiating, by a query user, a certificate authorization request to a certificate issuer and interacts with the certificate issuer, and after an attribute certificate set is obtained, initiating the query request for a certain gene sequence to a gene database owner; anonymously verifying, by the gene database owner, the attribute certificate of the query user, determining whether the query attribute set of the query user meets the acquisition requirement or not, and returning a corresponding plaintext gene sequence to the query user under the condition that the query attribute set meets the acquisition requirement. According to the invention, the security, privacy, high efficiency and controllability of data query can be realized.

Description

technical field [0001] The invention relates to the technical field of genetic data privacy protection, in particular to a gene sequence security comparison method and system supporting multi-attribute anonymous authentication. Background technique [0002] Today, due to the continuous maturity of gene sequencing technology, the cost of obtaining genetic data is getting lower and lower. Genetic testing is widely used in various fields such as health care, biomedical research, forensic identification, and medical diagnosis. Researchers gradually uncover genetic codes through correlation analysis of gene sequences. Various public gene data platforms emerge in an endless stream, such as: Beacon project, TCGA platform, etc., researchers can use these platforms to conduct related gene sequence query or other research. For example, query users can find genetic sequences that meet the requirements on such platforms; in addition, sequencing institutions can also promote their busin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G16B30/10G16B50/00G06F21/62G06F21/64
CPCG16B30/10G16B50/00G06F21/6245G06F21/64
Inventor 杨雅希翁健吴正豪李明刘家男李宇娴毛宜军
Owner JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products