Skip to main content
Advertisement

< Back to Article

SIG-DB: Leveraging homomorphic encryption to securely interrogate privately held genomic databases

Fig 2

SIG-DB protocol for (1) hashing sequence into locality sensitive hash (LSH), (2) encrypting and passing LSH, (3) hashing database elements into LSHs, (4) comparing encrypted query LSH to unencrypted database LSHs, (5) passing scores and decrypting, and (6) calculating IoU, IoD, and IoQ scores.

Unencrypted space = blue boxes and encrypted space = green boxes.

Fig 2

doi: https://doi.org/10.1371/journal.pcbi.1006454.g002