{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T16:28:41Z","timestamp":1778603321502,"version":"3.51.4"},"reference-count":115,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T00:00:00Z","timestamp":1749168000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T00:00:00Z","timestamp":1749168000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"National Science Foundation","award":["2434487"],"award-info":[{"award-number":["2434487"]}]},{"DOI":"10.13039\/100000002","name":"National Institutes of Health","doi-asserted-by":"crossref","award":["U24 HG013013"],"award-info":[{"award-number":["U24 HG013013"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Computing"],"DOI":"10.1007\/s10791-025-09627-w","type":"journal-article","created":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T18:51:47Z","timestamp":1749235907000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Genomic privacy and security in the era of artificial intelligence and quantum computing"],"prefix":"10.1007","volume":"28","author":[{"given":"Richard","family":"Annan","sequence":"first","affiliation":[]},{"given":"Justin","family":"Noland","sequence":"additional","affiliation":[]},{"given":"Kamaria","family":"Perkins","sequence":"additional","affiliation":[]},{"given":"Xiaohong","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Kaushik","family":"Roy","sequence":"additional","affiliation":[]},{"given":"Letu","family":"Qingge","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,6]]},"reference":[{"issue":"47","key":"9627_CR1","doi-asserted-by":"publisher","first-page":"3296","DOI":"10.1126\/sciadv.abg3296","volume":"7","author":"R Venkatesaramani","year":"2021","unstructured":"Venkatesaramani R, Malin BA, Vorobeychik Y. Re-identification of individuals in genomic datasets using public face images. Sci Adv. 2021;7(47):3296.","journal-title":"Sci Adv"},{"key":"9627_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41576-022-00455-y","volume":"23","author":"Z Wan","year":"2022","unstructured":"Wan Z, Hazel J, Clayton E, Vorobeychik Y, Kantarcioglu M, Malin B. Sociotechnical safeguards for genomic data privacy. Nat Rev Genet. 2022;23:1\u201317. https:\/\/doi.org\/10.1038\/s41576-022-00455-y.","journal-title":"Nat Rev Genet"},{"issue":"2","key":"9627_CR3","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1093\/bib\/bbz013","volume":"21","author":"A Mohammed Yakubu","year":"2019","unstructured":"Mohammed Yakubu A, Chen Y-PP. Ensuring privacy and security of genomic data and functionalities. Brief Bioinform. 2019;21(2):511\u201326. https:\/\/doi.org\/10.1093\/bib\/bbz013 (https:\/\/academic.oup.com\/bib\/article-pdf\/21\/2\/511\/33585094\/bbz013.pdf).","journal-title":"Brief Bioinform"},{"key":"9627_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2021.103815","volume":"119","author":"S Arshad","year":"2021","unstructured":"Arshad S, Arshad J, Khan MM, Parkinson S. Analysis of security and privacy challenges for DNA-genomics applications and databases. J Biomed Inform. 2021;119: 103815.","journal-title":"J Biomed Inform"},{"key":"9627_CR5","doi-asserted-by":"crossref","unstructured":"Nik-Ahd F, Waller J, Hoedt AMD, Garcia MM, Figueiredo JC, Carroll PR, Cooperberg MR, Freedland SJ. Seeing the unseen: how can we best identify transgender women within the veterans affairs healthcare system\u2019s electronic medical record? J Sex Med 2023.","DOI":"10.1093\/jsxmed\/qdac033"},{"key":"9627_CR6","doi-asserted-by":"crossref","unstructured":"Ajayakumar J, Curtis A, Curtis JW. The utility of zip4 codes in spatial epidemiological analysis. PLOS ONE 2023;18.","DOI":"10.1371\/journal.pone.0285552"},{"key":"9627_CR7","doi-asserted-by":"crossref","unstructured":"Miller EG, Young JL, Rao A, Ward-Lev E, Halley MC. Demographic characteristics associated with perceptions of personal utility in genetic and genomic testing. JAMA Netw Open 2023;6.","DOI":"10.1001\/jamanetworkopen.2023.10367"},{"issue":"6","key":"9627_CR8","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1038\/s41564-023-01381-3","volume":"8","author":"Y Tomofuji","year":"2023","unstructured":"Tomofuji Y, Sonehara K, Kishikawa T, Maeda Y, Ogawa K, Kawabata S, Nii T, Okuno T, Oguro-Igashira E, Kinoshita M, et al. Reconstruction of the personal information from human genome reads in gut metagenome sequencing data. Nat Microbiol. 2023;8(6):1079\u201394.","journal-title":"Nat Microbiol"},{"key":"9627_CR9","unstructured":"Alserr NM. On the tradeoff between privacy and utility in genomic studies: Differential privacy under dependent tuples. PhD thesis, Bilkent Universitesi (Turkey) 2020."},{"key":"9627_CR10","unstructured":"Francis P, Wagner D. Towards more accurate and useful data anonymity vulnerability measures. arXiv preprint arXiv:2403.06595 2024"},{"key":"9627_CR11","unstructured":"Zhang X, Brody JA, Graff M, Highland HM, Chami N, Xu H, Wang Z, Ferrier K, Chittoor, G, Josyula NS, et al. Whole genome sequencing analysis of body mass index identifies novel african ancestry-specific risk allele. medRxiv 2023."},{"key":"9627_CR12","doi-asserted-by":"crossref","unstructured":"Venkatesaramani R. Honesty is not always the best policy: Defending against membership inference attacks on genomic data. PhD thesis, Washington University in St. Louis 2023.","DOI":"10.1145\/3603627"},{"key":"9627_CR13","unstructured":"John PS. The untold story of how the golden state killer was found: A covert operation and private dna. Los Angeles Times 2020:8."},{"key":"9627_CR14","doi-asserted-by":"crossref","unstructured":"Whalen A, Hickey JM. Alphaimpute2: fast and accurate pedigree and population based imputation for hundreds of thousands of individuals in livestock populations. BioRxiv, 2020\u201309, 2020.","DOI":"10.1101\/2020.09.16.299677"},{"key":"9627_CR15","doi-asserted-by":"publisher","DOI":"10.3389\/fgene.2022.838518","volume":"13","author":"ER Chimusa","year":"2022","unstructured":"Chimusa ER, Defo J. Dissecting meta-analysis in GWAS era: Bayesian framework for gene\/subnetwork-specific meta-analysis. Front Genet. 2022;13: 838518.","journal-title":"Front Genet"},{"key":"9627_CR16","doi-asserted-by":"crossref","unstructured":"Wang Y, Wen J, Wu X, Shi X. Infringement of individual privacy via mining differentially private gwas statistics. In: International Conference on Big Data Computing and Communications, 2016:355\u2013366 . Springer.","DOI":"10.1007\/978-3-319-42553-5_30"},{"key":"9627_CR17","doi-asserted-by":"crossref","unstructured":"Ayoz K, Ayday E, Cicek AE. Genome reconstruction attacks against genomic data-sharing beacons. In: Proceedings on Privacy Enhancing Technologies. Privacy Enhancing Technologies Symposium, 2021;2021:28.","DOI":"10.2478\/popets-2021-0036"},{"issue":"9","key":"9627_CR18","doi-asserted-by":"publisher","first-page":"1187","DOI":"10.3390\/biom12091187","volume":"12","author":"J-T Guo","year":"2022","unstructured":"Guo J-T, Malik F. Single-stranded DNA binding proteins and their identification using machine learning-based approaches. Biomolecules. 2022;12(9):1187.","journal-title":"Biomolecules"},{"key":"9627_CR19","doi-asserted-by":"crossref","unstructured":"Montserrat DM, Ioannidis AG. Adversarial attacks on genotype sequences. In: ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE, 2023;1\u20135.","DOI":"10.1109\/ICASSP49357.2023.10096857"},{"key":"9627_CR20","unstructured":"Skovorodnikov H, Alkhzaimi H. Fimba: Evaluating the robustness of ai in genomics via feature importance adversarial attacks. arXiv preprint arXiv:2401.10657 2024."},{"key":"9627_CR21","doi-asserted-by":"crossref","unstructured":"Zhou J, Huang C, Gao X. Patient privacy in ai-driven omics methods. Trends in Genetics 2024.","DOI":"10.1016\/j.tig.2024.03.004"},{"issue":"4","key":"9627_CR22","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1038\/s41576-022-00551-z","volume":"24","author":"B Berger","year":"2023","unstructured":"Berger B, Yu YW. Navigating bottlenecks and trade-offs in genomic data analysis. Nat Rev Genet. 2023;24(4):235\u201350.","journal-title":"Nat Rev Genet"},{"key":"9627_CR23","unstructured":"Feyche M. California Genetic Information Privacy Act signed into law. 2021. https:\/\/www.jurist.org\/news\/2021\/10\/california-geneticinformation-privacy-act-signed-into-law\/. Accessed 21 Apr 2022."},{"key":"9627_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.imu.2021.100525","volume":"23","author":"MSR Mahdi","year":"2021","unstructured":"Mahdi MSR, Al Aziz MM, Mohammed N, Jiang X. Privacy-preserving string search on encrypted genomic data using a generalized suffix tree. Inf Med Unlocked. 2021;23: 100525.","journal-title":"Inf Med Unlocked"},{"issue":"1","key":"9627_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40168-021-01076-z","volume":"9","author":"E Elhaik","year":"2021","unstructured":"Elhaik E, Ahsanuddin S, Robinson JM, Foster EM, Mason CE. The impact of cross-kingdom molecular forensics on genetic privacy. Microbiome. 2021;9(1):1\u20138.","journal-title":"Microbiome"},{"key":"9627_CR26","unstructured":"Ferreira I, Harbron C, Hughes A, Sargood T, Gerlinger C. Anonymising clinical data for secondary use. 2023. arXiv preprint arXiv:2307.03682."},{"issue":"2000","key":"9627_CR27","first-page":"1","volume":"671","author":"L Sweeney","year":"2000","unstructured":"Sweeney L. Simple demographics often identify people uniquely. Health (San Francisco). 2000;671(2000):1\u201334.","journal-title":"Health (San Francisco)"},{"key":"9627_CR28","unstructured":"Near JP, Abuah C. Programming Differential Privacy vol. 1, 2021. https:\/\/uvm-plaid.github.io\/programming-dp\/"},{"key":"9627_CR29","doi-asserted-by":"crossref","unstructured":"Phan N, Wang Y, Wu X, Dou D. Differential privacy preservation for deep auto-encoders: an application of human behavior prediction. In: Thirtieth AAAI Conference on Artificial Intelligence 2016.","DOI":"10.1609\/aaai.v30i1.10165"},{"issue":"3\u20134","key":"9627_CR30","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork C, Roth A, et al. The algorithmic foundations of differential privacy. Found Trends Theor Comp Sci. 2014;9(3\u20134):211\u2013407.","journal-title":"Found Trends Theor Comp Sci"},{"issue":"1","key":"9627_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2767007","volume":"48","author":"M Naveed","year":"2015","unstructured":"Naveed M, Ayday E, Clayton EW, Fellay J, Gunter CA, Hubaux J-P, Malin BA, Wang X. Privacy in the genomic era. ACM Comput Surv (CSUR). 2015;48(1):1\u201344.","journal-title":"ACM Comput Surv (CSUR)"},{"key":"9627_CR32","doi-asserted-by":"crossref","unstructured":"Halimi A, Dervishi L, Ayday E, Pyrgelis A, Troncoso-Pastoriza JR, Hubaux J-P, Jiang X, Vaidya J. Privacy-preserving and efficient verification of the outcome in genome-wide association studies. In: Proceedings on Privacy Enhancing Technologies. Privacy Enhancing Technologies Symposium, NIH Public Access, 2022;2022:732.","DOI":"10.56553\/popets-2022-0094"},{"issue":"6","key":"9627_CR33","doi-asserted-by":"publisher","first-page":"1696","DOI":"10.1093\/bioinformatics\/btz837","volume":"36","author":"N Almadhoun","year":"2020","unstructured":"Almadhoun N, Ayday E, Ulusoy \u00d6. Differential privacy under dependent tuples\u2014the case of genomic privacy. Bioinformatics. 2020;36(6):1696\u2013703.","journal-title":"Bioinformatics"},{"key":"9627_CR34","first-page":"21","volume":"16","author":"C Liu","year":"2016","unstructured":"Liu C, Chakraborty S, Mittal P. Dependence makes you vulnberable: differential privacy under dependent tuples. NDSS. 2016;16:21\u20134.","journal-title":"NDSS"},{"key":"9627_CR35","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.cose.2018.12.017","volume":"82","author":"D Lv","year":"2019","unstructured":"Lv D, Zhu S. Achieving correlated differential privacy of big data publication. Comput Secur. 2019;82:184\u201395.","journal-title":"Comput Secur"},{"key":"9627_CR36","doi-asserted-by":"crossref","unstructured":"Ayoz K, Ayday E, Cicek AE. Genome reconstruction attacks against genomic data-sharing beacons. In: Proceedings on Privacy Enhancing Technologies. Privacy Enhancing Technologies Symposium, NIH Public Access, 2021;2021:28.","DOI":"10.2478\/popets-2021-0036"},{"key":"9627_CR37","doi-asserted-by":"crossref","unstructured":"Song S, Wang Y, Chaudhuri K. Pufferfish privacy mechanisms for correlated data. In: Proceedings of the 2017 ACM International Conference on Management of Data, 2017:1291\u20131306.","DOI":"10.1145\/3035918.3064025"},{"key":"9627_CR38","doi-asserted-by":"crossref","unstructured":"Zhang J, Zhang Z, Xiao X, Yang Y, Winslett M. Functional mechanism: regression analysis under differential privacy. 2012. arXiv preprint arXiv:1208.0219.","DOI":"10.14778\/2350229.2350253"},{"key":"9627_CR39","doi-asserted-by":"crossref","unstructured":"Abadi M, Chu A, Goodfellow I, McMahan HB, Mironov I, Talwar K, Zhang L. Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016:308\u2013318.","DOI":"10.1145\/2976749.2978318"},{"key":"9627_CR40","unstructured":"Papernot N, Thakurta AG. How to deploy machine learning with differential privacy. https:\/\/www.nist.gov\/blogs\/cybersecurity-insights\/how-deploy-machine-learning-differential-privacy. Accessed 13 Apr 2022."},{"key":"9627_CR41","doi-asserted-by":"crossref","unstructured":"Al\u00a0Aziz MM, Anjum MM, Mohammed N, Jiang X. Generalized genomic data sharing for differentially private federated learning. J Biomed Info 2022:104113.","DOI":"10.1016\/j.jbi.2022.104113"},{"issue":"1","key":"9627_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-020-69250-1","volume":"10","author":"MJ Sheller","year":"2020","unstructured":"Sheller MJ, Edwards B, Reina GA, Martin J, Pati S, Kotrotsou A, Milchenko M, Xu W, Marcus D, Colen RR, et al. Federated learning in medicine: facilitating multi-institutional collaborations without sharing patient data. Sci Rep. 2020;10(1):1\u201312.","journal-title":"Sci Rep"},{"key":"9627_CR43","unstructured":"Zhong Y, Liu X, Zhai D, Jiang J, Ji X. Backdoor attacks against incremental learners: an empirical evaluation study. 2023. arXiv preprint arXiv:2305.18384."},{"issue":"10","key":"9627_CR44","doi-asserted-by":"publisher","first-page":"2430","DOI":"10.1109\/JSAC.2020.3000372","volume":"38","author":"M Song","year":"2020","unstructured":"Song M, Wang Z, Zhang Z, Song Y, Wang Q, Ren J, Qi H. Analyzing user-level privacy attack against federated learning. IEEE J Sel Areas Commun. 2020;38(10):2430\u201344.","journal-title":"IEEE J Sel Areas Commun"},{"key":"9627_CR45","unstructured":"Bagdasaryan E, Veit A, Hua Y, Estrin D, Shmatikov V. How to backdoor federated learning. In: International Conference on Artificial Intelligence and Statistics, PMLR, 2020;2938\u20132948."},{"key":"9627_CR46","doi-asserted-by":"crossref","unstructured":"Fredrikson M, Jha S, Ristenpart T. Model inversion attacks that exploit confidence information and basic countermeasures. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015:1322\u20131333.","DOI":"10.1145\/2810103.2813677"},{"key":"9627_CR47","unstructured":"Carlini N, Liu C, Erlingsson \u00da, Kos J, Song D. The secret sharer: Evaluating and testing unintended memorization in neural networks. In: 28th USENIX Security Symposium (USENIX Security 19), 2019:267\u2013284."},{"issue":"2","key":"9627_CR48","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1093\/bioinformatics\/btv563","volume":"32","author":"S Wang","year":"2016","unstructured":"Wang S, Zhang Y, Dai W, Lauter K, Kim M, Tang Y, Xiong H, Jiang X. Healer: homomorphic computation of exact logistic regression for secure rare disease variants analysis in GWAS. Bioinformatics. 2016;32(2):211\u20138.","journal-title":"Bioinformatics"},{"issue":"1","key":"9627_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12920-016-0224-3","volume":"9","author":"H Tang","year":"2016","unstructured":"Tang H, Jiang X, Wang X, Wang S, Sofia H, Fox D, Lauter K, Malin B, Telenti A, Xiong L, et al. Protecting genomic data analytics in the cloud: state of the art and opportunities. BMC Med Genomics. 2016;9(1):1\u20139.","journal-title":"BMC Med Genomics"},{"issue":"11","key":"9627_CR50","doi-asserted-by":"publisher","first-page":"1108","DOI":"10.1016\/j.cels.2021.07.010","volume":"12","author":"M Kim","year":"2021","unstructured":"Kim M, Harmanci AO, Bossuat J-P, Carpov S, Cheon JH, Chillotti I, Cho W, Froelicher D, Gama N, Georgieva M, et al. Ultrafast homomorphic encryption models enable secure outsourcing of genotype imputation. Cell Syst. 2021;12(11):1108\u201320.","journal-title":"Cell Syst"},{"key":"9627_CR51","doi-asserted-by":"crossref","unstructured":"Yao AC-C. How to generate and exchange secrets. In: 27th Annual Symposium on Foundations of Computer Science (sfcs 1986), IEEE. 1986:162\u2013167.","DOI":"10.1109\/SFCS.1986.25"},{"issue":"12","key":"9627_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3679013","volume":"56","author":"J Chen","year":"2024","unstructured":"Chen J, Yan H, Liu Z, Zhang M, Xiong H, Yu S. When federated learning meets privacy-preserving computation. ACM Comput Surv. 2024;56(12):1\u201336.","journal-title":"ACM Comput Surv"},{"issue":"4","key":"9627_CR53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3394658","volume":"53","author":"A Wood","year":"2020","unstructured":"Wood A, Najarian K, Kahrobaei D. Homomorphic encryption for machine learning in medicine and bioinformatics. ACM Comput Surveys (CSUR). 2020;53(4):1\u201335.","journal-title":"ACM Comput Surveys (CSUR)"},{"key":"9627_CR54","doi-asserted-by":"crossref","unstructured":"McKeen F, Alexandrovich I, Berenzon A, Rozas CV, Shafi H, Shanbhogue V, Savagaonkar UR. Innovative instructions and software model for isolated execution. Hasp@ isca 2013;10(1).","DOI":"10.1145\/2487726.2488368"},{"key":"9627_CR55","unstructured":"Anati I, Gueron S, Johnson S, Scarlata V. Innovative technology for CPU based attestation and sealing. In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, ACM New York, NY, USA, vol. 13, 2013."},{"issue":"2","key":"9627_CR56","first-page":"77","volume":"10","author":"F Chen","year":"2017","unstructured":"Chen F, Wang C, Dai W, Jiang X, Mohammed N, Al Aziz MM, Sadat MN, Sahinalp C, Lauter K, Wang S. Presage: privacy-preserving genetic testing via software guard extension. BMC Med Genomics. 2017;10(2):77\u201385.","journal-title":"BMC Med Genomics"},{"key":"9627_CR57","doi-asserted-by":"crossref","unstructured":"Kifer D, Machanavajjhala A. A rigorous and customizable framework for privacy. In: Proceedings of the 31st ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, 2012;77\u201388.","DOI":"10.1145\/2213556.2213571"},{"key":"9627_CR58","doi-asserted-by":"crossref","unstructured":"Yang B, Sato I, Nakagawa H. Bayesian differential privacy on correlated data. In: Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, 2015;747\u2013762.","DOI":"10.1145\/2723372.2747643"},{"key":"9627_CR59","doi-asserted-by":"crossref","unstructured":"Mironov I. R\u00e9nyi differential privacy. In: 2017 IEEE 30th Computer Security Foundations Symposium (CSF), IEEE, 2017;263\u2013275.","DOI":"10.1109\/CSF.2017.11"},{"key":"9627_CR60","doi-asserted-by":"crossref","unstructured":"Chen J, Wang WH, Shi X. Differential privacy protection against membership inference attack on machine learning for genomic data. In: BIOCOMPUTING 2021: Proceedings of the Pacific Symposium, World Scientific, 2020.:26\u201337","DOI":"10.1142\/9789811232701_0003"},{"issue":"1","key":"9627_CR61","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1038\/nbt.3757","volume":"35","author":"JL Roberts","year":"2017","unstructured":"Roberts JL, Pereira S, McGuire AL. Should you profit from your genome? Nat Biotechnol. 2017;35(1):18\u201320.","journal-title":"Nat Biotechnol"},{"issue":"10","key":"9627_CR62","doi-asserted-by":"publisher","first-page":"1115","DOI":"10.1038\/s41587-019-0271-3","volume":"37","author":"D Grishin","year":"2019","unstructured":"Grishin D, Obbad K, Church GM. Data privacy in the age of personal genomics. Nat Biotechnol. 2019;37(10):1115\u20137.","journal-title":"Nat Biotechnol"},{"issue":"9","key":"9627_CR63","doi-asserted-by":"publisher","first-page":"1255","DOI":"10.1101\/gr.207464.116","volume":"28","author":"HI Ozercan","year":"2018","unstructured":"Ozercan HI, Ileri AM, Ayday E, Alkan C. Realizing the potential of blockchain technologies in genomics. Genome Res. 2018;28(9):1255\u201363.","journal-title":"Genome Res"},{"issue":"5","key":"9627_CR64","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1093\/jamia\/ocy180","volume":"26","author":"T-T Kuo","year":"2019","unstructured":"Kuo T-T, Gabriel RA, Ohno-Machado L. Fair compute loads enabled by blockchain: sharing models by alternating client and server roles. J Am Med Inform Assoc. 2019;26(5):392\u2013403.","journal-title":"J Am Med Inform Assoc"},{"issue":"6","key":"9627_CR65","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1038\/nbt.4108","volume":"36","author":"H Cho","year":"2018","unstructured":"Cho H, Wu DJ, Berger B. Secure genome-wide association analysis using multiparty computation. Nat Biotechnol. 2018;36(6):547\u201351.","journal-title":"Nat Biotechnol"},{"key":"9627_CR66","unstructured":"Elias H. Synthetic data\u2013All the perks without the risk 2020."},{"key":"9627_CR67","doi-asserted-by":"crossref","unstructured":"Oprisanu B, Ganev G, De\u00a0Cristofaro E. Measuring utility and privacy of synthetic genomic data. 2021. arXiv preprint arXiv:2102.03314.","DOI":"10.14722\/ndss.2022.24092"},{"key":"9627_CR68","unstructured":"Jordon J, Yoon J, Van Der\u00a0Schaar M.: Pate-gan: Generating synthetic data with differential privacy guarantees. In: International Conference on Learning Representations 2018."},{"issue":"6117","key":"9627_CR69","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1126\/science.1229566","volume":"339","author":"M Gymrek","year":"2013","unstructured":"Gymrek M, McGuire AL, Golan D, Halperin E, Erlich Y. Identifying personal genomes by surname inference. Science. 2013;339(6117):321\u20134.","journal-title":"Science"},{"issue":"8","key":"9627_CR70","doi-asserted-by":"publisher","first-page":"1000167","DOI":"10.1371\/journal.pgen.1000167","volume":"4","author":"N Homer","year":"2008","unstructured":"Homer N, Szelinger S, Redman M, Duggan D, Tembe W, Muehling J, Pearson JV, Stephan DA, Nelson SF, Craig DW. Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays. PLoS Genet. 2008;4(8):1000167.","journal-title":"PLoS Genet"},{"key":"9627_CR71","doi-asserted-by":"crossref","unstructured":"Khamvilai T, Pakmehr M. Zero trust avionics systems (ztas). In: 2023 IEEE\/AIAA 42nd Digital Avionics Systems Conference (DASC), IEEE, 2023;1\u20138.","DOI":"10.1109\/DASC58513.2023.10311248"},{"key":"9627_CR72","unstructured":"NCCoE Virtual Workshop on Exploring Solutions for the Cybersecurity of Genomic Data. 2022. https:\/\/www.nccoe.nist.gov\/get-involved\/attend-events\/nccoe-virtual-workshop-exploring-solutions-cybersecurity-genomic-data\/post-workshop-materials. Accessed 19 Nov 2022."},{"issue":"1","key":"9627_CR73","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1186\/s13059-023-03105-6","volume":"24","author":"MJ Mosca","year":"2023","unstructured":"Mosca MJ, Cho H. Reconstruction of private genomes through reference-based genotype imputation. Genome Biol. 2023;24(1):271.","journal-title":"Genome Biol"},{"issue":"3","key":"9627_CR74","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1038\/s41587-019-0046-x","volume":"37","author":"M Fiume","year":"2019","unstructured":"Fiume M, Cupak M, Keenan S, Rambla J, Torre S, Dyke SO, Brookes AJ, Carey K, Lloyd D, Goodhand P, et al. Federated discovery and sharing of genomic data using beacons. Nat Biotechnol. 2019;37(3):220\u20134.","journal-title":"Nat Biotechnol"},{"key":"9627_CR75","doi-asserted-by":"crossref","unstructured":"Voisin C, Linden M, Dyke SO, Bowers SR, Alper P, Barkley MP, Bernick D, Chao J, Courtot M, Jeanson F, et al. Ga4gh passport standard for digital identity and access permissions. Cell Genomics 2021;1(2).","DOI":"10.1016\/j.xgen.2021.100030"},{"key":"9627_CR76","doi-asserted-by":"crossref","unstructured":"Dursi LJ, Bozoky Z, Borja R, Li H, Bujold D, Lipski A, Rashid SF, Sethi A, Memon N, Naidoo D, et al. Candig: Federated network across canada for multi-omic and health data discovery and analysis. Cell Genomics 2021;1(2).","DOI":"10.1016\/j.xgen.2021.100033"},{"key":"9627_CR77","doi-asserted-by":"crossref","unstructured":"Cabili MN, Lawson J, Saltzman A, Rushton G, O\u2019Rourke P, Wilbanks J, Rodriguez LL, Nyronen T, Courtot M, Donnelly S, et al. Empirical validation of an automated approach to data use oversight. Cell Genomics 2021;1(2).","DOI":"10.1016\/j.xgen.2021.100031"},{"key":"9627_CR78","unstructured":"Global Alliance for Genomics and Health (GA4GH): GA4GH Data Security: Changes in Version 1.2. 2024. https:\/\/ga4gh.github.io\/data-security\/changes-1_2. Accessed 10 Mar 2025."},{"key":"9627_CR79","unstructured":"Global Alliance for Genomics and Health (GA4GH): GA4GH Data Security: Authentication & Authorization Infrastructure (AAI) FAQ. 2024. https:\/\/ga4gh.github.io\/data-security\/aai-faq. Accessed 10 Mar 2026."},{"issue":"4","key":"9627_CR80","doi-asserted-by":"publisher","first-page":"3759","DOI":"10.1007\/s40747-022-00756-z","volume":"9","author":"K Munjal","year":"2023","unstructured":"Munjal K, Bhatia R. A systematic review of homomorphic encryption and its contributions in healthcare industry. Complex Intell Syst. 2023;9(4):3759\u201386.","journal-title":"Complex Intell Syst"},{"issue":"1","key":"9627_CR81","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1093\/jlb\/lsz007","volume":"6","author":"EW Clayton","year":"2019","unstructured":"Clayton EW, Evans BJ, Hazel JW, Rothstein MA. The law of genetic privacy: applications, implications, and limitations. J Law Biosci. 2019;6(1):1\u201336.","journal-title":"J Law Biosci"},{"key":"9627_CR82","unstructured":"Health Insurance Portability and Accountability Act of 1996 (HIPAA). https:\/\/www.cdc.gov\/phlp\/publications\/topic\/hipaa.html. Accessed 21 Apr 2022."},{"key":"9627_CR83","unstructured":"Code of Federal Regulations: Title 45, section 164.514: Other requirements relating to uses and disclosures of protected health information (b)(1). eCFR. https:\/\/www.ecfr.gov\/current\/title-45\/subtitle-A\/subchapter-C\/ part-16"},{"issue":"3","key":"9627_CR84","doi-asserted-by":"publisher","first-page":"528","DOI":"10.51594\/csitrj.v5i3.859","volume":"5","author":"SS Bakare","year":"2024","unstructured":"Bakare SS, Adeniyi AO, Akpuokwe CU, Eneh NE. Data privacy laws and compliance: a comparative review of the EU GDPR and USA regulations. Comput Sci IT Res J. 2024;5(3):528\u201343.","journal-title":"Comput Sci IT Res J"},{"key":"9627_CR85","unstructured":"The European Parliament and The Council Of The European Union: General Data Protection Regulation, Regulation (EU) 2016\/679. Official J. Eur. Union. https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj (2016)"},{"key":"9627_CR86","unstructured":"Wolford B. What is GDPR, the EU\u2019s new data protection law? GDPR. EU; 2021."},{"issue":"1","key":"9627_CR87","first-page":"35","volume":"14","author":"J Williams","year":"2024","unstructured":"Williams J. Do your genes fit: How life insurance companies discriminate based on genetic test results. J Biosecur Biosaf Biodef Law. 2024;14(1):35\u201348.","journal-title":"J Biosecur Biosaf Biodef Law"},{"issue":"4","key":"9627_CR88","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1111\/rmir.12195","volume":"24","author":"AE Prince","year":"2021","unstructured":"Prince AE, Uhlmann WR, Suter SM, Scherer AM. Genetic testing and insurance implications: surveying the us general population about discrimination concerns and knowledge of the genetic information nondiscrimination act (gina). Risk Manage Insuran Rev. 2021;24(4):341\u201365.","journal-title":"Risk Manage Insuran Rev"},{"key":"9627_CR89","unstructured":"National Human Genome Research Institute: Genome Statute and Legislation Database. NHGRI. 2021.https:\/\/www.genome.gov\/about-genomics\/policy-issues\/Genome-Statute-Legislation-Database."},{"key":"9627_CR90","unstructured":"Virginia\u2019s Legislative Information System: SB 1392 Consumer Data Protection Act. LIS. 2021. https:\/\/lis.virginia.gov\/cgi-bin\/legp604.exe?211+sum+SB1392"},{"key":"9627_CR91","unstructured":"Colorado General Assembly: Colorado Privacy Act, SB 21-190, tit. 6, art. 1, part 13. Colorado General Assembly. 2021. https:\/\/leg.colorado.gov\/sites\/default\/files\/documents\/2021A\/bills\/2021a_190_rer.pdf."},{"key":"9627_CR92","first-page":"665","volume":"91","author":"EE Joh","year":"2011","unstructured":"Joh EE. Dna theft: recognizing the crime on nonconsensual genetic collection and testing. BUL Rev. 2011;91:665.","journal-title":"BUL Rev."},{"key":"9627_CR93","unstructured":"Direct-to-consumer genetic testing:report of the secretary\u2019s Advisory Committee on Genetics, Health, and Society. U.S. Department of Health and Human Services. https:\/\/osp.od.nih.gov\/sacghsdocs\/direct-to-consumer-genetic-testingreport-of-the-secretarys-advisory-committee-on-genetics-health-and-society\/"},{"key":"9627_CR94","first-page":"445","volume":"47","author":"AE Scherr","year":"2012","unstructured":"Scherr AE. Genetic privacy & the fourth amendment: unregulated surreptitious DNA harvesting. Ga L Rev. 2012;47:445.","journal-title":"Ga L Rev"},{"issue":"2","key":"9627_CR95","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.cels.2021.10.003","volume":"13","author":"G G\u00fcrsoy","year":"2022","unstructured":"G\u00fcrsoy G, Chielle E, Brannon CM, Maniatakos M, Gerstein M. Privacy-preserving genotype imputation with fully homomorphic encryption. Cell Syst. 2022;13(2):173\u201382.","journal-title":"Cell Syst"},{"issue":"1","key":"9627_CR96","first-page":"1","volume":"18","author":"M Ugbedeojo","year":"2024","unstructured":"Ugbedeojo M, Adebiyi MO, Aroba OJ, Adebiyi AA. Rsa and elliptic curve encryption system: a systematic literature review. IJISP. 2024;18(1):1\u201327.","journal-title":"IJISP"},{"key":"9627_CR97","unstructured":"Barmana P, Saha B. DNA encoded elliptic curve cryptography system for IoT security 2023. https:\/\/arxiv.org\/abs\/2311.11393"},{"key":"9627_CR98","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13183631","author":"V Tanksale","year":"2024","unstructured":"Tanksale V. Efficient elliptic curve Diffie-hellman key exchange for resource-constrained IOT devices. Electronics. 2024. https:\/\/doi.org\/10.3390\/electronics13183631.","journal-title":"Electronics"},{"key":"9627_CR99","doi-asserted-by":"crossref","unstructured":"Mishra S, Mondal B, Jha RK. A survey on isogeny-based cryptographic protocols. Wireless Networks, 2025;1\u201332.","DOI":"10.1007\/s11276-025-03906-6"},{"key":"9627_CR100","doi-asserted-by":"crossref","unstructured":"Shokri R, Stronati M, Song C, Shmatikov V. Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy (SP), IEEE, 2017;3\u201318.","DOI":"10.1109\/SP.2017.41"},{"key":"9627_CR101","doi-asserted-by":"crossref","unstructured":"Chen J, Wang WH, Shi X. Differential privacy protection against membership inference attack on machine learning for genomic data. In: BIOCOMPUTING 2021: Proceedings of the Pacific Symposium, World Scientific, 2020;26\u201337.","DOI":"10.1142\/9789811232701_0003"},{"key":"9627_CR102","doi-asserted-by":"crossref","unstructured":"Fredrikson M, Jha S, Ristenpart T. Model inversion attacks that exploit confidence information and basic countermeasures. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015;1322\u20131333.","DOI":"10.1145\/2810103.2813677"},{"key":"9627_CR103","doi-asserted-by":"crossref","unstructured":"Carlini N, Wagner D. Towards Evaluating the Robustness of Neural Networks 2017. https:\/\/arxiv.org\/abs\/1608.04644","DOI":"10.1109\/SP.2017.49"},{"key":"9627_CR104","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123799","volume":"249","author":"Y Chen","year":"2024","unstructured":"Chen Y, Gan W, Huang G, Wu Y, Philip SY. Privacy-preserving federated discovery of DNA motifs with differential privacy. Expert Syst Appl. 2024;249: 123799.","journal-title":"Expert Syst Appl"},{"key":"9627_CR105","doi-asserted-by":"crossref","unstructured":"Li B, Gao H, Shi X. Feddp: Secure federated learning for disease prediction with imbalanced genetic data. bioRxiv, 2023\u201301 2023.","DOI":"10.1101\/2023.01.17.524409"},{"issue":"1","key":"9627_CR106","doi-asserted-by":"publisher","first-page":"5711","DOI":"10.1038\/s41467-022-33266-0","volume":"13","author":"N Ghaffari Laleh","year":"2022","unstructured":"Ghaffari Laleh N, Truhn D, Veldhuizen GP, Han T, Treeck M, Buelow RD, Langer R, Dislich B, Boor P, Schulz V, et al. Adversarial attacks and adversarial robustness in computational pathology. Nat Commun. 2022;13(1):5711.","journal-title":"Nat Commun"},{"issue":"1","key":"9627_CR107","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1093\/bioadv\/vbad166","volume":"3","author":"M Sadria","year":"2023","unstructured":"Sadria M, Layton A, Bader GD. Adversarial training improves model interpretability in single-cell RNA-SEQ analysis. Bioinformatics Adv. 2023;3(1):166.","journal-title":"Bioinformatics Adv"},{"key":"9627_CR108","doi-asserted-by":"crossref","unstructured":"Troncoso-Pastoriza JR, Pedrouzo-Ulloa A, P\u00e9rez-Gonz\u00e1lez F. Secure genomic susceptibility testing based on lattice encryption. In: 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE, 2017;2067\u20132071.","DOI":"10.1109\/ICASSP.2017.7952520"},{"key":"9627_CR109","doi-asserted-by":"publisher","first-page":"175969","DOI":"10.1109\/ACCESS.2024.3485602","volume":"12","author":"E Fathalla","year":"2024","unstructured":"Fathalla E, Azab M. Beyond classical cryptography: a systematic review of post-quantum hash-based signature schemes, security, and optimizations. IEEE Access. 2024;12:175969\u201387. https:\/\/doi.org\/10.1109\/ACCESS.2024.3485602.","journal-title":"IEEE Access"},{"key":"9627_CR110","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.heliyon.2024.e31406","volume":"10","author":"M SaberiKamarposhti","year":"2024","unstructured":"SaberiKamarposhti M, Ng K-W, Chua F-F, Abdullah J, Yadollahi M, Moradi M, Ahmadpour S. Post-quantum healthcare: a roadmap for cybersecurity resilience in medical data. Heliyon. 2024;10:10.","journal-title":"Heliyon"},{"issue":"1978","key":"9627_CR111","first-page":"114","volume":"4244","author":"RJ McEliece","year":"1978","unstructured":"McEliece RJ. A public-key cryptosystem based on algebraic. Coding Thv. 1978;4244(1978):114\u20136.","journal-title":"Coding Thv"},{"key":"9627_CR112","doi-asserted-by":"publisher","first-page":"192482","DOI":"10.1109\/ACCESS.2024.3513153","volume":"12","author":"T Zhukabayeva","year":"2024","unstructured":"Zhukabayeva T, Ur Rehman A, Tariq N, Benkhelifa E. Hyperledger fabric-based post quantum cryptography for healthcare application using discrete event simulation. IEEE Access. 2024;12:192482\u201393. https:\/\/doi.org\/10.1109\/ACCESS.2024.3513153.","journal-title":"IEEE Access"},{"issue":"3","key":"9627_CR113","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1093\/genetics\/iyad210","volume":"226","author":"T Zhao","year":"2024","unstructured":"Zhao T, Wang F, Mott R, Dekkers J, Cheng H. Using encrypted genotypes and phenotypes for collaborative genomic analyses to maintain data confidentiality. Genetics. 2024;226(3):210.","journal-title":"Genetics"},{"issue":"12","key":"9627_CR114","doi-asserted-by":"publisher","first-page":"311","DOI":"10.3390\/computers13120311","volume":"13","author":"Y Al-Kharusi","year":"2024","unstructured":"Al-Kharusi Y, Khan A, Rizwan M, Bait-Suwailam MM. Open-source artificial intelligence privacy and security: a review. Computers. 2024;13(12):311.","journal-title":"Computers"},{"key":"9627_CR115","unstructured":"Barzen J, Leymann F. Post-quantum security: Origin, fundamentals, and adoption. 2024. arXiv preprint arXiv:2405.11885"}],"container-title":["Discover Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-025-09627-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10791-025-09627-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-025-09627-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T01:02:51Z","timestamp":1749258171000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10791-025-09627-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,6]]},"references-count":115,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["9627"],"URL":"https:\/\/doi.org\/10.1007\/s10791-025-09627-w","relation":{},"ISSN":["2948-2992"],"issn-type":[{"value":"2948-2992","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,6]]},"assertion":[{"value":"7 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not Applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no Conflict of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"108"}}