Extreme cryptography paves way to personalized medicine

David Paul Morris/Bloomberg via Getty

Cloud processing of DNA sequence data promises to speed up discovery of disease-linked gene variants.

The dream for tomorrows medicine is to understand the links between DNA and disease and to tailor therapies accordingly. But scientists working to realize such personalized or precision medicine have a problem: how to keep genetic data and medical records secure while still enabling the massive, cloud-based analyses needed to make meaningful associations. Now, tests of an emerging form of data encryption suggest that the dilemma can be solved.

At a workshop on 16 March hosted by the University of California, San Diego (UCSD), cryptographers analysed test genetic data. Working with small data sets, and using a method known as homomorphic encryption, they could find disease-associated gene variants in about ten minutes. Despite the fact that computers were still kept bogged down for hours by more-realistic tasks such as finding a disease-linked variant in a stretch of DNA a few hundred-thousandths the size of the whole genome experts in cryptography were encouraged.

This is a promising result, says Xiaoqian Jiang, a computer scientist at UCSD who helped to set up the workshop. But challenges still exist in scaling it up.

Physicians and researchers think that understanding how genes influence disease will require genetic and health data to be collected from millions of people. They have already started planning projects, such as US President Barack Obamas Precision Medicine Initiative and Britains 100,000 Genomes Project. Such a massive task will probably require harnessing the processing power of networked cloud computers, but online security breaches in the past few years illustrate the dangers of entrusting huge, sensitive data sets to the cloud. Administrators at the US National Institutes of Healths database of Genotypes and Phenotypes (dbGaP), a catalogue of genetic and medical data, are so concerned about security that they forbid users of the data from storing it on computers that are directly connected to the Internet.

Homomorphic encryption could address those fears by allowing researchers to deposit only a mathematically scrambled, or encrypted, form of data in the cloud. It involves encrypting data on a local computer, then uploading that scrambled data to the cloud. Computations on the encrypted data are performed in the cloud and an encrypted result is then sent back to a local computer, which decrypts the answer. If would-be thieves were to intercept the encrypted data at any point along the way, the underlying data would remain safe.

If we can show that these techniques work, then it will give increased reassurance that this high-volume data will be computed on and stored in a way that protects individual privacy, says Lucila Ohno-Machado, a computer scientist at UCSD and a workshop organizer.

Homomorphic data encryption, first proposed in 1978, differs from other types of encryption in that it would allow the cloud to manipulate scrambled data in essence, the cloud would never actually see the numbers it was working with. And, unlike other encryption schemes, it would give the same result as calculations on unencrypted data.

But it remained largely a theoretical concept until 2009, when cryptographer Craig Gentry at the IBM Thomas J. Watson Research Center in Yorktown Heights, New York, proved that it was possible to carry out almost any type of computation on homomorphically encrypted data. This was done by transforming each data point into a piece of encrypted information, or ciphertext, that was larger and more complex than the original bit of data. A single bit of unencrypted data would become encrypted into a ciphertext of a few megabytes the size of a digital photograph. It was a breakthrough, but calculations could take 14 orders of magnitude as long as working on unencrypted data. Gentry had rendered the approach possible, but it remained impractical.

Excerpt from:
Extreme cryptography paves way to personalized medicine

Improving Quantum Cryptography with Twisted Light

Category: Science & Technology Posted: March 23, 2015 06:33AM Author: Guest_Jim_*

Securing communications is of great importance to many, so a system that is protected from intrusion by the laws of physics is highly desirable. Quantum cryptography is such a system and many are working on various ways to improve the methods of using it. Researchers at the University of Rochester have recently found that using twisted light can improve security even more.

So-called twisted light uses orbital angular momentum (OAM) to encode information, instead of polarization, a more common option. The researchers were able to show that by using OAM and angular position they could encode a seven dimensional, or letter alphabet with the photons. This alphabet is important for quantum key distribution (QKD), which is the start of quantum cryptography. To use QKD the users will encode the key with this alphabet onto the photons. Only if both the sender and receiver are measuring along the same dimension will they get the same key, and by comparing what was original sent and received, both parties can determine the key without publicly transmitting what it is. An eavesdropper would disrupt the transmission in a detectable way, thereby allowing the users to avoid interception.

Thus far the researchers have demonstrated their system working at 4 kHz with 93% accuracy, so the researchers still have some work to do before reaching the long term goal of a GHz rate. Besides the quantum cryptography applications, this new system also allows for each photon to carry 2.05 bits of information, but with more sophisticated equipment, the photons could hold 4.17 bits, and allow for an even more secure 25 letter alphabet.

Source: University of Rochester

Read more:
Improving Quantum Cryptography with Twisted Light

New Approach Uses ‘Twisted Light’ To Increase The Efficiency Of Quantum Cryptography Systems

Researchers demonstrate how to encode 2.05 bits per photon, doubling existing systems that use light polarization

Researchers at the University of Rochester and their collaborators have developed a way to transfer 2.05 bits per photon by using twisted light. This remarkable achievement is possible because the researchers used the orbital angular momentum of the photons to encode information, rather than the more commonly used polarization of light. The new approach doubles the 1 bit per photon that is possible with current systems that rely on light polarization and could help increase the efficiency of quantum cryptography systems.

Quantum cryptography promises more secure communications. The first step in such systems is quantum key distribution (QKD), to ensure that both the sender and receiver usually referred to as Alice and Bob are communicating in such a way that only they know what is being sent. They are the only ones who hold the key to the messages, and the systems are set up in such a way that the presence of any eavesdropper would be identified.

In the paper, published in New Journal of Physics today, Mohammad Mirhosseini and his colleagues describe a proof-of-principle experiment that shows that using OAM to encode information rather than polarization opens up the possibility of high-dimensional QKD. Mirhosseini, a Ph.D. student in Robert W. Boyds group at the University of Rochesters Institute of Optics, explains that they were able to encode a seven dimensional alphabet that is, seven letters or symbols using both the orbital angular momentum (OAM) of the photons and their angular position (ANG). These two properties of the photons form what physicists refer to as mutually unbiased bases, a requirement for QKD. Using mutually unbiased bases, the correct answer is revealed only if Alice encodes the information using a particular basis and Bob measures in that same basis.

In QKD, once they have generated a long, shared key, Alice and Bob publicly announce the basis (or alphabet) they have used for each symbol in the key. They then compare what alphabet was used for sending and which one for receiving. They only keep the part of the key in which they have used the same alphabet. The letters they keep produce a secure key, which they can use to encrypt messages and transmit these with regular encryption without the need for quantum cryptography.

If for any reason their communication is intercepted, because of a fundamental property of quantum mechanics, there will be discrepancies between Alice and Bobs keys. To check for this, Alice and Bob sacrifice a short part of their key. They share this publicly and identify any discrepancies. This lets them know whether their connection is secure and, if not, they will stop the communication.

The researchers showed that using their system they were able to generate and detect information at a rate of 4kHz and with 93% accuracy. A long term goal of the research is to realize secure communications at GHz transmission rates, which is desirable for telecommunication applications.

Our experiment shows that it is possible to use twisted light for QKD and that it doubles the capacity compared to using polarization, said Mirhosseini. Unlike with polarization, where it is impossible to encode more than one bit per photon, twisted light could make it possible to encode several bits, and every extra bit of information encoded in a photon means fewer photons to generate and measure.

In a previous experiment using a strong laser beam instead of single photons, Boyds team were able to measure up to 25 modes of OAM and ANG. This is equivalent to having 25 letters available in your alphabet rather than 7. This shows the potential for a system like the one described in the new paper to have the capacity to transmit and measure 4.17 bits per photon using more sophisticated equipment.

Mirhosseini acknowledges that the real-world challenges are not straightforward to overcome but when it comes to QKD, he is excited about the possibilities their system opens up.

Original post:
New Approach Uses ‘Twisted Light' To Increase The Efficiency Of Quantum Cryptography Systems