April 22, 2026
Confidential computing for population-scale genome-wide association studies with SECRET-GWAS
  • Uffelmann, E. et al. Genome-wide association studies. Nat. Rev. Methods Primers 1, 59 (2021).

    Article 

    Google Scholar 

  • Fang, H. et al. A genetics-led approach defines the drug target landscape of 30 immune-related traits. Nat. Genet. 51, 1082–1091 (2019).

    Article 

    Google Scholar 

  • Fujiki, D. et al. Genax: a genome sequencing accelerator. In 2018 ACM/IEEE 45th Annual International Symposium on Computer Architecture (ISCA) 69–82 (IEEE, 2018).

  • Zawistowski, M. et al. The Michigan genomics initiative: a biobank linking genotypes and electronic clinical records in Michigan medicine patients. Cell Genom. 3, 7 (2023).

    Google Scholar 

  • Landry, L. G., Ali, N., Williams, D. R., Rehm, H. L. & Bonham, V. L. Lack of diversity in genomic databases is a barrier to translating precision medicine research into practice. Health Aff. 37, 780–785 (2018).

    Article 

    Google Scholar 

  • de Vlaming, R. et al. Meta-GWAS accuracy and power (metagap) calculator shows that hiding heritability is partially due to imperfect genetic correlations across studies. PLoS Genet. 13, e1006495 (2017).

    Article 

    Google Scholar 

  • Froelicher, D. et al. Truly privacy-preserving federated analytics for precision medicine with multiparty homomorphic encryption. Nat. Commun. 12, 5910 (2021).

    Article 

    Google Scholar 

  • De Cock, M. et al. High performance logistic regression for privacy-preserving genome analysis. BMC Med. Genom. 14, 1–18 (2021).

    Google Scholar 

  • Blatt, M., Gusev, A., Polyakov, Y. & Goldwasser, S. Secure large-scale genome-wide association studies using homomorphic encryption. Proc. Natl Acad. Sci. USA 117, 11608–11613 (2020).

    Article 

    Google Scholar 

  • Han, K., Hong, S., Cheon, J. H. & Park, D. Efficient logistic regression on large encrypted data. IACR Cryptol. ePrint Arch. 2018, 662 (2018).

    Google Scholar 

  • Smajlović, H., Shajii, A., Berger, B., Cho, H. & Numanagić, I. Sequre: a high-performance framework for rapid development of secure bioinformatics pipelines. In 2022 IEEE International Parallel and Distributed Processing Symposium Workshops, 164–165 (IEEE, 2022).

  • Chen, H. et al. Logistic regression over encrypted data from fully homomorphic encryption. BMC Med. Genom. 11, 3–12 (2018).

    Article 

    Google Scholar 

  • Chen, F. et al. PRINCESS: privacy-protecting rare disease international network collaboration via encryption through software guard extensions. Bioinformatics 33, 871–878 (2016).

    Article 

    Google Scholar 

  • Aydin, F., Karabulut, E., Potluri, S., Alkim, E. & Aysu, A. Reveal: single-trace side-channel leakage of the seal homomorphic encryption library. In 2022 Design, Automation and Test in Europe Conference and Exhibition 1527–1532 (IEEE, 2022).

  • Resende, J. S., Sousa, P. R., Martins, R. & Antunes, L. Breaking MPC implementations through compression. Int. J. Inf. Secur. 18, 505–518 (2019).

    Article 

    Google Scholar 

  • Li, Y., Xiao, D., Liu, Z., Pang, Q. & Wang, S. Metamorphic testing of secure multi-party computation (MPC) compilers. Proc. ACM Softw. Eng. 1, 1216–1237 (2024).

    Article 

    Google Scholar 

  • Gentry, C. et al. Using fully homomorphic hybrid encryption to minimize non-interative zero-knowledge proofs. J. Cryptol. 28, 820–843 (2015).

    Article 
    MathSciNet 

    Google Scholar 

  • Kockan, C. et al. Sketching algorithms for genomic data analysis and querying in a secure enclave. Nat. Methods 17, 295–301 (2020).

    Article 

    Google Scholar 

  • Hail-Team. Hail 0.2. GitHub (2023).

  • El-Hindi, M. et al. Benchmarking the second generation of intel SGX hardware. In Proc. 18th International Workshop on Data Management on New Hardware 1–8 (ACM, 2022).

  • Shringarpure, S. S. & Bustamante, C. D. Privacy risks from genomic data-sharing beacons. Am. J. Hum. Genet. 97, 631–646 (2015).

    Article 

    Google Scholar 

  • Pinkas, B., Schneider, T. & Zohner, M. Scalable private set intersection based on OT extension. ACM Trans. Priv. Secur. 21, 1–35 (2018).

    Article 

    Google Scholar 

  • Garimella, G., Pinkas, B., Rosulek, M., Trieu, N. & Yanai, A. Oblivious key-value stores and amplification for private set intersection. In Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event Part II 41, 395–425 (Springer, 2021).

  • Dörre, F., Mechler, J. & Müller-Quade, J. Practically efficient private set intersection from trusted hardware with side-channels. In International Conference on the Theory and Application of Cryptology and Information Security 268–301 (Springer, 2023).

  • Pascoal, T., Decouchant, J., Boutet, A. & Esteves-Verissimo, P. Dyps: dynamic, private and secure GWAS. Proc. Priv. Enhancing Technol. 2021, 214–234 (2021).

    Article 

    Google Scholar 

  • Zheng, W. et al. Opaque: an oblivious and encrypted distributed analytics platform. In Proc. 14th USENIX Conference on Networked Systems Design and Implementation 283–298 (USENIX Association, 2017).

  • Dokmai, N. et al. Privacy-preserving genotype imputation in a trusted execution environment. Cell Syst. 12, 983–993 (2021).

    Article 

    Google Scholar 

  • Kocher, P. et al. Spectre attacks: exploiting speculative execution. In 2019 IEEE Symposium on Security and Privacy 1–19 (IEEE, 2019).

  • Mahlke, S., Hank, R., McCormick, J., August, D. & Hwu, W. A comparison of full and partial predicated execution support for ILP processors. In Proc. 22nd Annual International Symposium on Computer Architecture 138–149 (IEEE, 1995).

  • Lattner, C. & Adve, V. LLVM: a compilation framework for lifelong program analysis and transformation. In Proc. International Symposium on Code Generation and Optimization (CGO ’04) 75–88 (ACM, 2004).

  • Johnson, S., Makaram, R., Santoni, A. & Scarlata, V. Supporting Intel SGX on Multi-Socket Platform. Tech. Rep. Intel Corporation (2022).

  • Taassori, M., Shafiee, A. & Balasubramonian, R. Vault: reducing paging overheads in sgx with efficient integrity verification structures. In Proc. 23rd International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS ’18, 665–678 (ACM, 2018); https://doi.org/10.1145/3173162.3177155

  • Dong, J., Rosenblum, J. & Narayanasamy, S. Toleo: scaling freshness to tera-scale memory using CXL and PIM. In Proc. 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems Vol. 4, 313–328 (ACM, 2024).

  • Dunn, T. et al. Squigglefilter: an accelerator for portable virus detection. In MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture 535–549 (IEEE, 2021).

  • Fujiki, D. et al. Seedex: a genome sequencing accelerator for optimal alignments in subminimal space. In 2020 53rd Annual IEEE/ACM International Symposium on Microarchitecture 937–950 (IEEE, 2020).

  • Purcell, S. et al. Plink: a tool set for whole-genome association and population-based linkage analyses. Am. J. Hum. Genet. 81, 559–575 (2007).

    Article 

    Google Scholar 

  • Schwarzschild, A., Goldblum, M., Gupta, A., Dickerson, J. P. & Goldstein, T. Just how toxic is data poisoning? A unified benchmark for backdoor and data poisoning attacks. In International Conference on Machine Learning 9389–9398 (PMLR, 2021).

  • Jang, Y., Lee, J., Lee, S. & Kim, T. SGX-bomb: locking down the processor via rowhammer attack. In Proc. 2nd Workshop on System Software for Trusted Execution 1–6 (ACM, 2017).

  • Simmons, S., Sahinalp, C. & Berger, B. Enabling privacy-preserving GWASs in heterogeneous human populations. Cell Syst. 3, 54–61 (2016).

    Article 

    Google Scholar 

  • Uhlerop, C., Slavković, A. & Fienberg, S. E. Privacy-preserving data sharing for genome-wide association studies. J. Priv. Confid. 5, 137 (2013).

    Google Scholar 

  • Fairley, S., Lowy-Gallego, E., Perry, E. & Flicek, P. The International Genome Sample Resource (IGSR) collection of open human genomic variation resources. Nucleic Acids Res. 48, D941–D947 (2019).

    Article 

    Google Scholar 

  • Costan, V. & Devadas, S. Intel SGX explained. IACR Cryptol. ePrint Arch. 2016, 86 (2016).

    Google Scholar 

  • Chen, G. & Zhang, Y. {MAGE}: mutual attestation for a group of enclaves without trusted third parties. In 31st USENIX Security Symposium (USENIX Security 22) 4095–4110 (USENIX, 2022).

  • Sambo, F., Di Camillo, B., Toffolo, G. & Cobelli, C. Compression and fast retrieval of SNP data. Bioinformatics 30, 3078–3085 (2014).

    Article 

    Google Scholar 

  • Andrysco, M. et al. On subnormal floating point and abnormal timing. In 2015 IEEE Symposium on Security and Privacy 623–639 (IEEE, 2015).

  • Aldaya, A. C., Brumley, B. B., Hassan, S., Pereida García, C. & Tuveri, N. Port contention for fun and profit. In 2019 IEEE Symposium on Security and Privacy 870–887 (IEEE, 2019).

  • Bhattacharyya, A. et al. Smotherspectre: exploiting speculative execution through port contention. In Proc. 2019 ACM SIGSAC Conference on Computer and Communications Security 785–800 (ACM, 2019).

  • Ohrimenko, O. et al. Oblivious {Multi-Party} machine learning on trusted processors. In 25th USENIX Security Symposium (USENIX Security 16) 619–636 (USENIX Association, 2016).

  • Rosenblum, J., Dong, J. & Narayanasamy, S. SECRET-GWAS source code and data. Zenodo (2025).

  • link

    Leave a Reply

    Your email address will not be published. Required fields are marked *