{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T22:47:40Z","timestamp":1765234060090,"version":"build-2065373602"},"reference-count":23,"publisher":"Oxford University Press (OUP)","issue":"10","license":[{"start":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:00:00Z","timestamp":1755907200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100004807","name":"DFG","doi-asserted-by":"publisher","award":["545857928"],"award-info":[{"award-number":["545857928"]}],"id":[{"id":"10.13039\/100004807","id-type":"DOI","asserted-by":"publisher"}]},{"name":"German Ministry of Research and Education","award":["01ZZ2010"],"award-info":[{"award-number":["01ZZ2010"]}]},{"name":"Open Access Publication Fund of the University of T\u00fcbingen"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,2]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:sec>\n                  <jats:title>Motivation<\/jats:title>\n                  <jats:p>Rare diseases affect millions of people worldwide, yet their genomic foundations remain poorly understood due to limited patient data and strict privacy regulations, such as the General Data Protection Regulation (GDPR) (https:\/\/gdpr.eu\/tag\/gdpr\/) in March 2025. These restrictions can hinder the collaborative analysis of genomic data necessary for uncovering disease-causing variants.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Results<\/jats:title>\n                  <jats:p>We present PRISM, a novel privacy-preserving framework based on fully homomorphic encryption (FHE) that facilitates rare disease variant analysis across multiple institutions without exposing sensitive genomic information. To address the challenges of centralized trust, PRISM is built upon a Threshold FHE scheme. This approach decentralizes key management across participating institutions and ensures no single entity can unilaterally decrypt sensitive data. Our method filters disease-causing variants under recessive, dominant, and de novo inheritance models entirely on encrypted data. We propose two algorithmic variants: a multiplication-intensive (MUL-IN) approach and an addition-intensive (ADD-IN) approach. The ADD-IN algorithms minimize the number of costly multiplication operations, enabling up to a 17\u00d7 improvement in runtime for recessive\/dominant filtering and 22\u00d7 for de novo filtering, compared to MUL-IN methods. While ADD-IN produces larger ciphertexts, efficient parallelization via SIMD and multithreading allows it to handle millions of variants in reasonable time. To the best of our knowledge, this is the first study that utilizes FHE for privacy-preserving rare disease analysis across multiple inheritance models, demonstrating its practicality and scalability in a single-cloud setting.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Availability and implementation<\/jats:title>\n                  <jats:p>The source code and the data used in this work can be found in https:\/\/github.com\/mdppml\/PRISM.git.<\/jats:p>\n               <\/jats:sec>","DOI":"10.1093\/bioinformatics\/btaf468","type":"journal-article","created":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T17:43:08Z","timestamp":1755970988000},"source":"Crossref","is-referenced-by-count":2,"title":["PRISM: privacy-preserving rare disease analysis using fully homomorphic encryption"],"prefix":"10.1093","volume":"41","author":[{"given":"G\u00fcliz","family":"Akkaya","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, \u0130zmir Institute of Technology , Izmir, 35430,","place":["Turkey"]}]},{"given":"Nesli","family":"Erdo\u011fmu\u015f","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, \u0130zmir Institute of Technology , Izmir, 35430,","place":["Turkey"]}]},{"given":"Mete","family":"Akg\u00fcn","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of T\u00fcbingen , T\u00fcbingen, 72076,","place":["Germany"]},{"name":"Institute for Bioinformatics and Medical Informatics, University of T\u00fcbingen , T\u00fcbingen, 72076,","place":["Germany"]}]}],"member":"286","published-online":{"date-parts":[[2025,8,23]]},"reference":[{"key":"2025101607390222600_btaf468-B1","doi-asserted-by":"crossref","first-page":"3468","DOI":"10.1093\/bioinformatics\/btx422","article-title":"VCF-explorer: filtering and analysing whole genome VCF files","volume":"33","author":"Akg\u00fcn","year":"2017","journal-title":"Bioinformatics"},{"key":"2025101607390222600_btaf468-B2","doi-asserted-by":"crossref","first-page":"5205","DOI":"10.1093\/bioinformatics\/btaa641","article-title":"Identifying disease-causing mutations with privacy protection","volume":"36","author":"Akg\u00fcn","year":"2021","journal-title":"Bioinformatics"},{"key":"2025101607390222600_btaf468-B3","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1002\/ajmg.a.36248","article-title":"TMCO1 deficiency causes autosomal recessive cerebrofaciothoracic dysplasia","volume":"164","author":"Alanay","year":"2014","journal-title":"Am J Med Genetics Pt A"},{"year":"2022","author":"Badawi","key":"2025101607390222600_btaf468-B4"},{"key":"2025101607390222600_btaf468-B5","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1007\/978-3-319-69453-5_23","volume-title":"Selected Areas in Cryptography \u2013 SAC 2016","author":"Bajard","year":"2017"},{"key":"2025101607390222600_btaf468-B6","first-page":"868","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012, Volume 7417 of Lecture Notes in Computer Science","author":"Brakerski","year":"2012"},{"key":"2025101607390222600_btaf468-B7","doi-asserted-by":"crossref","first-page":"871","DOI":"10.1093\/bioinformatics\/btw758","article-title":"PRINCESS: Privacy-protecting Rare disease International Network Collaboration via Encryption through Software guard extensionS","volume":"33","author":"Chen","year":"2017","journal-title":"Bioinformatics"},{"key":"2025101607390222600_btaf468-B8","doi-asserted-by":"crossref","first-page":"2156","DOI":"10.1093\/bioinformatics\/btr330","article-title":"The variant call format and VCFtools","volume":"27","author":"Danecek","year":"2011","journal-title":"Bioinformatics"},{"year":"2012","author":"Fan","key":"2025101607390222600_btaf468-B9"},{"key":"2025101607390222600_btaf468-B10","doi-asserted-by":"crossref","first-page":"5910","DOI":"10.1038\/s41467-021-25972-y","article-title":"Truly privacy-preserving federated analytics for precision medicine with multiparty homomorphic encryption","volume":"12","author":"Froelicher","year":"2021","journal-title":"Nat Commun"},{"volume-title":"A Fully Homomorphic Encryption Scheme","year":"2009","author":"Gentry","key":"2025101607390222600_btaf468-B11"},{"key":"2025101607390222600_btaf468-B12","doi-asserted-by":"crossref","first-page":"1312","DOI":"10.1101\/gr.279057.124","article-title":"Secure discovery of genetic relatives across large-scale and distributed genomic data sets","volume":"34","author":"Hong","year":"2024","journal-title":"Genome Res"},{"key":"2025101607390222600_btaf468-B13","doi-asserted-by":"publisher","first-page":"692","DOI":"10.1126\/science.aam9710","article-title":"Deriving genomic diagnoses without revealing patient genomes","volume":"357","author":"Jagadeesh","year":"2017","journal-title":"Science"},{"key":"2025101607390222600_btaf468-B14","doi-asserted-by":"crossref","first-page":"1108","DOI":"10.1016\/j.cels.2021.07.010","article-title":"Ultrafast homomorphic encryption models enable secure outsourcing of genotype imputation","volume":"12","author":"Kim","year":"2021","journal-title":"Cell Syst"},{"key":"2025101607390222600_btaf468-B15","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-319-16295-9_1","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2014","author":"Lauter","year":"2015"},{"key":"2025101607390222600_btaf468-B16","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1186\/s13059-016-0974-4","article-title":"The ensembl variant effect predictor","volume":"17","author":"McLaren","year":"2016","journal-title":"Genome Biol"},{"key":"2025101607390222600_btaf468-B17","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Commun ACM"},{"key":"2025101607390222600_btaf468-B18","doi-asserted-by":"crossref","first-page":"100487","DOI":"10.1016\/j.patter.2022.100487","article-title":"Privacy-preserving federated neural network learning for disease-associated cell classification","volume":"3","author":"Sav","year":"2022","journal-title":"Patterns"},{"key":"2025101607390222600_btaf468-B19","doi-asserted-by":"crossref","first-page":"3716","DOI":"10.1093\/bioinformatics\/btx470","article-title":"Mechanisms to protect the privacy of families when using the transmission disequilibrium test in genome-wide association studies","volume":"33","author":"Wang","year":"2017","journal-title":"Bioinformatics"},{"key":"2025101607390222600_btaf468-B20","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1093\/bioinformatics\/btv563","article-title":"HEALER: homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS","volume":"32","author":"Wang","year":"2016","journal-title":"Bioinformatics"},{"year":"1986","author":"Yao","key":"2025101607390222600_btaf468-B21","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"2025101607390222600_btaf468-B22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1472-6947-15-S5-S4","article-title":"Secure distributed genome analysis for GWAS and sequence comparison computation","volume":"15","author":"Zhang","year":"2015","journal-title":"BMC Med Inform Decis Mak"},{"key":"2025101607390222600_btaf468-B23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1472-6947-15-S5-S5","article-title":"Foresee: fully outsourced secure genome study based on homomorphic encryption","volume":"15","author":"Zhang","year":"2015","journal-title":"BMC Med Inform Decis Mak"}],"container-title":["Bioinformatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/bioinformatics\/advance-article-pdf\/doi\/10.1093\/bioinformatics\/btaf468\/64114782\/btaf468.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/bioinformatics\/article-pdf\/41\/10\/btaf468\/64114782\/btaf468.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/bioinformatics\/article-pdf\/41\/10\/btaf468\/64114782\/btaf468.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T11:39:13Z","timestamp":1760614753000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/bioinformatics\/article\/doi\/10.1093\/bioinformatics\/btaf468\/8240325"}},"subtitle":[],"editor":[{"given":"Christina","family":"Kendziorski","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2025,8,23]]},"references-count":23,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2025,10,2]]}},"URL":"https:\/\/doi.org\/10.1093\/bioinformatics\/btaf468","relation":{},"ISSN":["1367-4803","1367-4811"],"issn-type":[{"type":"print","value":"1367-4803"},{"type":"electronic","value":"1367-4811"}],"subject":[],"published-other":{"date-parts":[[2025,10]]},"published":{"date-parts":[[2025,8,23]]},"article-number":"btaf468"}}