Confidentially Computing DNA Matching Against Malicious Adversaries.

Xiaofen Tu,Xin Liu,Xiangyu Hu,Baoshan Li,Neal N. Xiong
DOI: https://doi.org/10.1007/978-3-031-28124-2_16
2022-01-01
Abstract:DNA is one of the most important information in every living thing. The DNA matching experiment is helpful for the study of paternity testing, species identification, gene mutation, suspect determination, and so on. How to study the DNA matching in the case of privacy protection has become the inevitable problems in the research of information security. The Hamming distance can reflect the similarity degree of two DNA sequences. The smaller the Hamming distance is, the more similar the two DNA sequences are. In this paper, the DNA sequence with l length is encoded with a 0–1 string with 3 l length, and the protocol of confidentially computing Hamming distance is designed, which calculated the matching degree of two DNA under the premise of protecting DNA privacy. In addition, in view of the criminal suspect DNA matching problem, we design a secure computation protocol against malicious adversaries using the zero-knowledge proof and the cut-choose method to prevent or find malicious behaviors, which can resist malicious attacks.
What problem does this paper attempt to address?