Cargando…
A covert authentication and security solution for GMOs
BACKGROUND: Proliferation and expansion of security risks necessitates new measures to ensure authenticity and validation of GMOs. Watermarking and other cryptographic methods are available which conceal and recover the original signature, but in the process reveal the authentication information. In...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
BioMed Central
2016
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5031278/ https://www.ncbi.nlm.nih.gov/pubmed/27653779 http://dx.doi.org/10.1186/s12859-016-1256-6 |
_version_ | 1782454778033340416 |
---|---|
author | Mueller, Siguna Jafari, Farhad Roth, Don |
author_facet | Mueller, Siguna Jafari, Farhad Roth, Don |
author_sort | Mueller, Siguna |
collection | PubMed |
description | BACKGROUND: Proliferation and expansion of security risks necessitates new measures to ensure authenticity and validation of GMOs. Watermarking and other cryptographic methods are available which conceal and recover the original signature, but in the process reveal the authentication information. In many scenarios watermarking and standard cryptographic methods are necessary but not sufficient and new, more advanced, cryptographic protocols are necessary. RESULTS: Herein, we present a new crypto protocol, that is applicable in broader settings, and embeds the authentication string indistinguishably from a random element in the signature space and the string is verified or denied without disclosing the actual signature. Results show that in a nucleotide string of 1000, the algorithm gives a correlation of 0.98 or higher between the distribution of the codon and that of E. coli, making the signature virtually invisible. CONCLUSIONS: This algorithm may be used to securely authenticate and validate GMOs without disclosing the actual signature. While this protocol uses watermarking, its novelty is in use of more complex cryptographic techniques based on zero knowledge proofs to encode information. |
format | Online Article Text |
id | pubmed-5031278 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2016 |
publisher | BioMed Central |
record_format | MEDLINE/PubMed |
spelling | pubmed-50312782016-09-29 A covert authentication and security solution for GMOs Mueller, Siguna Jafari, Farhad Roth, Don BMC Bioinformatics Research Article BACKGROUND: Proliferation and expansion of security risks necessitates new measures to ensure authenticity and validation of GMOs. Watermarking and other cryptographic methods are available which conceal and recover the original signature, but in the process reveal the authentication information. In many scenarios watermarking and standard cryptographic methods are necessary but not sufficient and new, more advanced, cryptographic protocols are necessary. RESULTS: Herein, we present a new crypto protocol, that is applicable in broader settings, and embeds the authentication string indistinguishably from a random element in the signature space and the string is verified or denied without disclosing the actual signature. Results show that in a nucleotide string of 1000, the algorithm gives a correlation of 0.98 or higher between the distribution of the codon and that of E. coli, making the signature virtually invisible. CONCLUSIONS: This algorithm may be used to securely authenticate and validate GMOs without disclosing the actual signature. While this protocol uses watermarking, its novelty is in use of more complex cryptographic techniques based on zero knowledge proofs to encode information. BioMed Central 2016-09-21 /pmc/articles/PMC5031278/ /pubmed/27653779 http://dx.doi.org/10.1186/s12859-016-1256-6 Text en © The Author(s) 2016 Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License(http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The Creative Commons Public Domain Dedication waiver(http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated. |
spellingShingle | Research Article Mueller, Siguna Jafari, Farhad Roth, Don A covert authentication and security solution for GMOs |
title | A covert authentication and security solution for GMOs |
title_full | A covert authentication and security solution for GMOs |
title_fullStr | A covert authentication and security solution for GMOs |
title_full_unstemmed | A covert authentication and security solution for GMOs |
title_short | A covert authentication and security solution for GMOs |
title_sort | covert authentication and security solution for gmos |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5031278/ https://www.ncbi.nlm.nih.gov/pubmed/27653779 http://dx.doi.org/10.1186/s12859-016-1256-6 |
work_keys_str_mv | AT muellersiguna acovertauthenticationandsecuritysolutionforgmos AT jafarifarhad acovertauthenticationandsecuritysolutionforgmos AT rothdon acovertauthenticationandsecuritysolutionforgmos AT muellersiguna covertauthenticationandsecuritysolutionforgmos AT jafarifarhad covertauthenticationandsecuritysolutionforgmos AT rothdon covertauthenticationandsecuritysolutionforgmos |