Fig. 5From: Efficient and secure outsourcing of genomic data storageSubtraction step. The server subtracts the encrypted hash of the variant with its PIR reply and then randomises the result, thus hiding all other variants except for the one being queriedBack to article page