SIG-DB: Leveraging homomorphic encryption to securely interrogate privately held genomic databases
Fig 2
SIG-DB protocol for (1) hashing sequence into locality sensitive hash (LSH), (2) encrypting and passing LSH, (3) hashing database elements into LSHs, (4) comparing encrypted query LSH to unencrypted database LSHs, (5) passing scores and decrypting, and (6) calculating IoU, IoD, and IoQ scores.
Unencrypted space = blue boxes and encrypted space = green boxes.