| Literature DB >> 27653779 |
Siguna Mueller1, Farhad Jafari2, Don Roth3.
Abstract
BACKGROUND: Proliferation and expansion of security risks necessitates new measures to ensure authenticity and validation of GMOs. Watermarking and other cryptographic methods are available which conceal and recover the original signature, but in the process reveal the authentication information. In many scenarios watermarking and standard cryptographic methods are necessary but not sufficient and new, more advanced, cryptographic protocols are necessary.Entities:
Keywords: GMO security; Limits of watermarking; Verifiable encryption for GMO; Zero knowledge proofs
Year: 2016 PMID: 27653779 PMCID: PMC5031278 DOI: 10.1186/s12859-016-1256-6
Source DB: PubMed Journal: BMC Bioinformatics ISSN: 1471-2105 Impact factor: 3.169
Comparison with other work
| Feature | [ | [ | [ | [ | [ | Our method |
|---|---|---|---|---|---|---|
| Added security features in addition to the sequences | yes | no | no | n/a | no | yes |
| Source compression (via any cryptographic encoding, substitution cipher, or coding theory) | yes | yes | yes | n/a | n/a | yes |
| Explicit formulation and identification of broader security requirements and goals | no | no | no | n/a | no | yes |
| Adaptation and incorporation of novel cryptographic techniques to ensure that sensitive information remains concealed during the verification process | no | no | no | no | no | yes |
Fig. 1ZK proof of knowledge to verify authenticity. The prover and verifier are given the public input, an alleged signature (K 1,K 2)=μ with z=K 1, and the message (signature data) m. If is generated as above, then t 1=(s ′·σ) and t 2=(g ,s ′ σ·y ) where s is the randomness used in ElGamal to encrypt s ′, and r is that used to encrypt σ. In this case, the protocol allows the prover to confirm the signature in ZK. If μ is a falsely implied signature, the protocol allows the prover to deny the signature in ZK
Fig. 2Proof that (K
1,K
2) is the encryption of the given message M under ElGamal. If the prover can successfully answer two distinct challenges c
1,c
2 with two acceptable answers s
1,s
2 then the verification step results in (see [27]). Thus, if c
1−c
2
20]
Fig. 3Correspondence between the binary text triplets B and DNA codons C for the specific example where n 1=A,n 2=C,n 3=G,n 4=T. Each of the text triplets is distributed over the associated codon triplets so that the resulting representation resembles the codon bias of the host genome. To demonstrate the watermarking protocol, assume there are 44 occurrences of 000 in the binary text and that the codon frequency values as determined from the entire codon frequency distribution, are: A A A,3.3 %, A A C,2.1 %, A C A,0.8 %, A C C,2.3 %, C A A,1.5 %, C A C,0.9 %, C C A,0.8 %, C C C,0.6 %, covering a total of 12.5 % of the total codon distribution. Among the codons assigned to 000, there are 100·3.3/12.5=26.6 % for AAA, 17.1 % for AAC etc. Consequently, we assign (26.6·44)/100∼12 occurrences of 000 to AAA, 8 to AAC, 3 to ACA, 8 to ACC, 5 to CAA, 3 to CAC, 3 to CCA, and 2 to CCC, covering the total 44 occurrences of 000
Fig. 4Representation of the correlation between codon frequency distribution produced via our watermarking algorithm and the initial codon distribution of the host genome (y-axis). The watermarking algorithm generates a signature indistinguishable from the rest of the genome. The x-axis here is 100 randomly generated binary signatures of length 1000 mapped to the codon frequency distribution of the individual codons in E. coli