| Literature DB >> 30572817 |
Charlotte Bonte1, Eleftheria Makri2,3, Amin Ardeshirdavani4, Jaak Simm4, Yves Moreau4, Frederik Vercauteren2.
Abstract
BACKGROUND: The deployment of Genome-wide association studies (GWASs) requires genomic information of a large population to produce reliable results. This raises significant privacy concerns, making people hesitate to contribute their genetic information to such studies.Entities:
Keywords: Genome-wide association study (GWAS); Homomorphic encryption (HE); Secure multiparty computation (MPC)
Mesh:
Year: 2018 PMID: 30572817 PMCID: PMC6302495 DOI: 10.1186/s12859-018-2541-3
Source DB: PubMed Journal: BMC Bioinformatics ISSN: 1471-2105 Impact factor: 3.169
Representation of a contingency table containing the number of observed genotypes i per phenotype j noted by O
|
| ¬ | ||
|
|
|
| |
| ¬ |
|
| |
In the table we also calculate the Row Totals (RT), Column Totals (CT), as well as the grand total (N)
Fig. 1A schematic representation of the homomorphic scenario. Before the execution of the protocol, the decryptor generates a valid public and secret key pair for the homomorphic encryption scheme. Step ① of the protocol is to send the generated public key pk to all participating medical centers. Then, the medical centers compute their local contingency tables, encrypt them with the received public key, and send them to computation server in step ②. Step ③ is the actual secure computation of the encrypted, and masked χ2 value, which is then sent to the decryptor in step ④. By decrypting the masked χ2 value (using the secret key sk), the decryptor can only determine whether the result is significant or not, which is published in a public table in step ⑤
Fig. 2A schematic representation of the multiparty computation scenario. Any time prior to the protocol execution each of the medical centers computes their local contingency tables, and secret shares them to the three computation servers, as indicated in step ① of the protocol. In step ②, the computation servers securely compute the χ2 value, and perform a secure comparison to determine whether the value is significant or not. This reveals no information about the inputs, or the actual χ2 value to the individual computation servers. In step ③ the computation servers reconstruct the final result, which indicates significance or non-significance, by combining their individual secret shares, and they publish this result in the public table
CPU time of the computation server for analyzing one SNP with the homomorphic solution using 1 CPU core
| Centers | Patients | CPU time computation server |
|---|---|---|
| 20 | 200,000 | 1.48 s |
| 40 | 400,000 | 1.52 s |
| 60 | 600,000 | 1.53 s |
| 80 | 800,000 | 1.56 s |
| 100 | 1,000,000 | 1.57 s |
Performance of the MPC approach for analyzing one SNP using 1 CPU core (in each computation server)
| Server 1 | Server | |||
|---|---|---|---|---|
| Centers | Patients | CPU time | Data sent | CPU time |
| 20 | 200,000 | 2.2 ms | 12.7 kB | 1.9 ms |
| 40 | 400,000 | 2.3 ms | 17.8 kB | 2.0 ms |
| 60 | 600,000 | 2.3 ms | 23.0 kB | 2.0 ms |
| 80 | 800,000 | 2.5 ms | 28.1 kB | 2.2 ms |
| 100 | 1,000,000 | 2.4 ms | 33.2 kB | 2.1 ms |