Core Concepts
SecureDNA provides a free, privacy-preserving system for screening DNA synthesis orders against hazards while maintaining high speed and low false alarm rates.
Abstract
The SecureDNA system aims to address the critical need for verifiable and private screening of global DNA synthesis orders. It introduces a novel approach based on multi-party oblivious hashing to ensure customer privacy while efficiently checking gene and oligonucleotide synthesis orders. The system's core design focuses on bio-design, crypto-design, and system-design challenges to create an automated solution capable of securely screening all DNA synthesis worldwide. By leveraging cryptographic techniques like Distributed Oblivious Pseudorandom Function (DOPRF) and Shamir's Secret Sharing, SecureDNA ensures that sensitive information remains protected while enabling efficient hazard detection. The system's performance is demonstrated through theoretical analysis, practical implementation details, and real-world specificity testing on synthesized genes from various providers in the United States, Europe, and China. Additionally, SecureDNA offers innovative features like exemption lists for automated customer screening and permissions, enhancing user experience and regulatory compliance.
Structure:
Introduction to DNA Synthesis Screening Challenges
SecureDNA System Overview
Cryptographic Foundations: DOPRF and Shamir's Secret Sharing
Database Maintenance Strategies for Emerging Hazards
Performance Evaluation and Specificity Testing Results
Exemption Lists for Automated Customer Screening
Conclusion: Implications for Biotechnology Security
Stats
A free DNA screening system based on multi-party oblivious hashing preserves customer privacy while verifiably checking gene and oligonucleotide synthesis orders at high speed with a negligible false alarm rate.
Quotes
"SecureDNA allows synthesizers to obliviously hash subsequences before sending them to the database server."
"Maintaining an up-to-date database of hazards is crucial to prevent adversaries from exploiting vulnerabilities in distributed solutions."