{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T20:07:50Z","timestamp":1772136470253,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Nat Comput Sci"],"DOI":"10.1038\/s43588-021-00058-3","type":"journal-article","created":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T12:05:55Z","timestamp":1619438755000},"page":"272-279","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Avoiding genetic racial profiling in criminal DNA profile databases"],"prefix":"10.1038","volume":"1","author":[{"given":"Jacob A.","family":"Blindenbach","sequence":"first","affiliation":[]},{"given":"Karthik A.","family":"Jagadeesh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5179-3635","authenticated-orcid":false,"given":"Gill","family":"Bejerano","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5191-692X","authenticated-orcid":false,"given":"David J.","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"58_CR1","unstructured":"Combined DNA Index System (CODIS) (Federal Bureau of Investigation); https:\/\/www.fbi.gov\/services\/laboratory\/biometric-analysis\/codis"},{"key":"58_CR2","unstructured":"What is Rapid DNA? (ANDE); https:\/\/www.ande.com\/what-is-rapid-dna\/"},{"key":"58_CR3","unstructured":"Rapid DNA Solution \u2014 Because Every Minute Counts (ThermoFisher, accessed 12 April 2021); https:\/\/www.thermofisher.com\/us\/en\/home\/industrial\/forensics\/human-identification\/forensic-dna-analysis\/dna-analysis\/rapidhit-id-system-human-identification.html"},{"key":"58_CR4","doi-asserted-by":"publisher","first-page":"898","DOI":"10.1126\/science.aav5475","volume":"362","author":"JW Hazel","year":"2018","unstructured":"Hazel, J. W., Clayton, E. W., Malin, B. A. & Slobogin, C. Is it time for a universal genetic forensic database? Science 362, 898\u2013900 (2018).","journal-title":"Science"},{"key":"58_CR5","unstructured":"Crowley, M. How commandos could quickly confirm they got their target. The New York Times (27 October 2019)."},{"key":"58_CR6","doi-asserted-by":"crossref","first-page":"938","DOI":"10.1126\/science.aaw4347","volume":"363","author":"Y Joly","year":"2019","unstructured":"Joly, Y., Marrocco, G. & Dupras, C. Risks of compulsory genetic databases. Science 363, 938\u2013940 (2019).","journal-title":"Science"},{"key":"58_CR7","unstructured":"CODIS\u2014NDIS Statistics (Federal Bureau of Investigation, accessed 1 February 2021); https:\/\/www.fbi.gov\/services\/laboratory\/biometric-analysis\/codis\/ndis-statistics"},{"key":"58_CR8","first-page":"16","volume":"95","author":"C Arnaud","year":"2017","unstructured":"Arnaud, C. Thirty years of DNA forensics: how DNA has revolutionized criminal investigations. Chem. Eng. News 95, 16\u201320 (2017).","journal-title":"Chem. Eng. News"},{"key":"58_CR9","unstructured":"Murphy, H. Coming soon to a police station near you: the DNA \u2018Magic Box\u2019. The New York Times (21 January 2019)."},{"key":"58_CR10","unstructured":"Ransom, J. & Southall, A. \u2018Race-Biased Dragnet\u2019: DNA from 360 black men was collected to solve Vetrano murder, defense lawyers say. The New York Times (31 March 2019)."},{"key":"58_CR11","unstructured":"NYPD\u2019s \u2018Knock-and-Spit\u2019 DNA database makes you a permanent suspect. Newsweek (11 February 2019)."},{"key":"58_CR12","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1038\/s41588-020-0606-5","volume":"52","author":"Y Joly","year":"2020","unstructured":"Joly, Y. et al. Establishing the International Genetic Discrimination Observatory. Nat. Genet. 52, 466\u2013468 (2020).","journal-title":"Nat. Genet."},{"key":"58_CR13","unstructured":"Jackman, T. Nationwide DNA testing backlog has nearly doubled, despite $1 billion in federal funding. Washington Post (23 March 2019)."},{"key":"58_CR14","unstructured":"Dickerson, C. U. S. Government plans to collect DNA from detained immigrants. The New York Times (2 October 2019)."},{"key":"58_CR15","unstructured":"Ransom, J. & Southall, A. N. Y. P. D. Detectives gave a boy, 12, a soda. He landed in a DNA database. The New York Times (15 August 2019)."},{"key":"58_CR16","unstructured":"Frequently Asked Questions on CODIS and NDIS (Federal Bureau of Investigation); https:\/\/www.fbi.gov\/services\/laboratory\/biometric-analysis\/codis\/codis-and-ndis-fact-sheet"},{"key":"58_CR17","unstructured":"Core STR Loci Used in Human Identity Testing (NIST, accessed 12 April 2021); https:\/\/strbase.nist.gov\/coreSTRs.htm"},{"key":"58_CR18","doi-asserted-by":"publisher","DOI":"10.1038\/srep31075","volume":"6","author":"Z Wang","year":"2016","unstructured":"Wang, Z. et al. Developmental validation of the Huaxia Platinum System and application in 3 main ethnic groups of China. Sci. Rep. 6, 31075 (2016).","journal-title":"Sci. Rep."},{"key":"58_CR19","first-page":"35","volume":"1","author":"K Norrgard","year":"2008","unstructured":"Norrgard, K. Forensics, DNA fingerprinting and CODIS. Nat. Educ. 1, 35 (2008).","journal-title":"Nat. Educ."},{"key":"58_CR20","unstructured":"ENFSI DNA Working Group. in DNA Database Management Review and Recommendations 22\u201325 (ENFSI, 2017)."},{"key":"58_CR21","unstructured":"Hopcroft, J. E., Motwani, R. & Ullman, J. D. Introduction to Automata Theory, Languages and Computation (Pearson, 2006)."},{"key":"58_CR22","doi-asserted-by":"crossref","unstructured":"Kilian, J. Founding cryptography on oblivious transfer. In Proc. Twentieth Annual ACM Symposium on Theory of Computing, STOC \u201888 20\u201331 (ACM, 1988).","DOI":"10.1145\/62212.62215"},{"key":"58_CR23","first-page":"187","volume":"2005","author":"MO Rabin","year":"2005","unstructured":"Rabin, M. O. How to exchange secrets with oblivious transfer. IACR Cryptol. EPrint Arch. 2005, 187 (2005).","journal-title":"IACR Cryptol. EPrint Arch."},{"key":"58_CR24","doi-asserted-by":"crossref","unstructured":"Kolesnikov, V., Kumaresan, R., Rosulek, M. & Trieu, N. Efficient Batched Oblivious PRF with Applications to Private Set Intersection. In Proc. 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201816 818\u2013829 (ACM, 2016).","DOI":"10.1145\/2976749.2978381"},{"key":"58_CR25","unstructured":"O\u2019Connor, K. L., Butts, E., Hill, C. R., Butler, J. & Vallone, P. Evaluating the effect of additional forensic loci on likelihood ratio values for complex kinship analysis. In Proc. 21st International Symposium on Human Identification 10\u201314 (NIST, 2010)."},{"key":"58_CR26","doi-asserted-by":"crossref","unstructured":"Yao, A. C.-C. Protocols for secure computations. In Proc. 23rd Annual Symposium on Foundations of Computer Science 160\u2013164 (IEEE, 1982).","DOI":"10.1109\/SFCS.1982.38"},{"key":"58_CR27","doi-asserted-by":"crossref","unstructured":"Lipmaa, H. in Advances in Cryptology\u2014ASIACRYPT 2003. Lecture Notes in Computer Science Vol. 2894 (ed. Laih, C.S.) 416\u2013433 (Springer, 2003).","DOI":"10.1007\/978-3-540-40061-5_27"},{"key":"58_CR28","unstructured":"Narayanan, A., Thiagarajan, N., Lakhani, M., Hamburg, M. & Boneh, D. Location privacy via private proximity testing. In Proc. NDSS Symposium 2011 (The Internet Society, 2011)."},{"key":"58_CR29","doi-asserted-by":"crossref","unstructured":"Naor, M. & Pinkas, B. Oblivious transfer and polynomial evaluation. In Proc. Thirty-First Annual ACM Symposium on Theory of Computing STOC \u201899 245\u2013254 (ACM, 1999).","DOI":"10.1145\/301250.301312"},{"key":"58_CR30","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s001459910006","volume":"13","author":"R Canetti","year":"2000","unstructured":"Canetti, R. Security and composition of multiparty cryptographic protocols. J. Cryptol. 13, 143\u2013202 (2000).","journal-title":"J. Cryptol."},{"key":"58_CR31","doi-asserted-by":"crossref","unstructured":"Ishai, Y., Kilian, J., Nissim, K. & Petrank, E. in Advances in Cryptology. CRYPTO 2003. Lecture Notes in Computer Science Vol. 2729 (ed. Boneh, D.) 145\u2013161 (Springer, 2003).","DOI":"10.1007\/978-3-540-45146-4_9"},{"key":"58_CR32","doi-asserted-by":"crossref","unstructured":"Boyle, E. et al. Efficient two-round OT extension and silent non-interactive secure computation. In Proc. 2019 ACM SIGSAC Conference on Computer and Communications Security 291\u2013308 (ACM, 2019).","DOI":"10.1145\/3319535.3354255"},{"key":"58_CR33","doi-asserted-by":"crossref","unstructured":"Troncoso-Pastoriza, J. R., Katzenbeisser, S. & Celik, M. U. Privacy preserving error resilient DNA searching through oblivious automata. In Proc. 14th ACM Conference on Computer and Communications Security 519\u2013528 (ACM, 2007).","DOI":"10.1145\/1315245.1315309"},{"key":"58_CR34","doi-asserted-by":"crossref","unstructured":"Sasakawa, H. et al. Oblivious evaluation of non-deterministic finite automata with application to privacy-preserving virus genome detection. In Workshop on Privacy in the Electronic Society (WPES) 21\u201330 (ACM, 2014).","DOI":"10.1145\/2665943.2665954"},{"key":"58_CR35","doi-asserted-by":"publisher","unstructured":"Blindenbach, J. A., Jagadeesh, K. A., Bejerano, G. & Wu, D. J. Avoiding Genetic Racial Profiling in Criminal DNA Profile Databases (Zenodo, 2021); https:\/\/doi.org\/10.5281\/zenodo.4589351","DOI":"10.5281\/zenodo.4589351"}],"container-title":["Nature Computational Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.nature.com\/articles\/s43588-021-00058-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.nature.com\/articles\/s43588-021-00058-3","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.nature.com\/articles\/s43588-021-00058-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,3]],"date-time":"2022-12-03T16:24:51Z","timestamp":1670084691000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.nature.com\/articles\/s43588-021-00058-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":35,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2021,4]]}},"alternative-id":["58"],"URL":"https:\/\/doi.org\/10.1038\/s43588-021-00058-3","relation":{"has-preprint":[{"id-type":"doi","id":"10.1101\/2020.06.22.164095","asserted-by":"object"}]},"ISSN":["2662-8457"],"issn-type":[{"value":"2662-8457","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"29 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 March 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 April 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}