{"id":33092,"date":"2017-08-22T16:44:13","date_gmt":"2017-08-22T20:44:13","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/researchers-use-encryption-to-keep-patients-dna-private-engadget-engadget.php"},"modified":"2017-08-22T16:44:13","modified_gmt":"2017-08-22T20:44:13","slug":"researchers-use-encryption-to-keep-patients-dna-private-engadget-engadget","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/researchers-use-encryption-to-keep-patients-dna-private-engadget-engadget.php","title":{"rendered":"Researchers use encryption to keep patients&#8217; DNA private &#8211; Engadget &#8211; Engadget"},"content":{"rendered":"<p><p>    When trying to figure out which genetic mutations cause disease    and which are associated with healthy individuals, researchers    have in the past had to compare whole genomes of thousands of    people. But with this work, scientists have shown that a whole    genome isn't necessary and there are ways of keeping all of the    irrelevant genetic data private. \"There is a general conception    that we can only find meaningful differences by surveying the    entire genome,\" said Gill Bejerano, an author of the study, in    a     statement. \"But these meaningful differences make up only a    very tiny proportion of our DNA. There are now amazing tools in    computer science and cryptography that allow researchers to    pinpoint only these differences while keeping the remainder of    the genome completely private.\"  <\/p>\n<p>    What the research team did was create a way for patients to    encrypt their genome and report whether their genome analysis    showed the presence of particular gene variants. That    information was then uploaded to the cloud and researchers were    able to reveal only the gene variants that were pertinent to    their study. Around 97 percent of the participants' genomes    were kept hidden and were only ever viewed in full by the    participants themselves. \"These are techniques that the    cryptography community has been developing for some time,\" said    Dan Boneh, another author of the study. \"Now we are applying    them to biology.\"  <\/p>\n<p>    Ultimately, this means that patients' genetic data    can remain private while also being used for study. \"We now    have the tools in hand to make certain that genomic    discrimination doesn't happen,\" said Bejerano.    \"There are ways to simultaneously share and protect this    information.\"  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.engadget.com\/2017\/08\/21\/researchers-encryption-keep-dna-private\/\" title=\"Researchers use encryption to keep patients' DNA private - Engadget - Engadget\">Researchers use encryption to keep patients' DNA private - Engadget - Engadget<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> When trying to figure out which genetic mutations cause disease and which are associated with healthy individuals, researchers have in the past had to compare whole genomes of thousands of people. But with this work, scientists have shown that a whole genome isn't necessary and there are ways of keeping all of the irrelevant genetic data private. \"There is a general conception that we can only find meaningful differences by surveying the entire genome,\" said Gill Bejerano, an author of the study, in a statement<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-33092","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/33092"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=33092"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/33092\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=33092"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=33092"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=33092"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}