Skip to main content

Table 6 Detailed decomposition of time and memory cost at different stages of the computation

From: iDASH secure genome analysis competition 2018: blockchain genomic data access logging, homomorphic encryption on GWAS, and DNA segment searching

Team

Submission

Time consumption and memory cost*

KeyGeneration

Encryption

Computing

Decryption

Time (MIN)

Memory (MB)

Time (MIN)

Memory (MB)

Time (MIN)

Memory (MB)

Time (MIN)

Memory (MB)

A*FHE

A*FHE −1

  

0.79

822

921.25

3777

0.44

410

A*FHE −2

  

1.12

528

1631.01

4093

0.84

 

Chimera

Version 1

0.30

10,375

8.92

10,375

192.80

9444

0.02

8

Version 2

 

13,658

7.93

10,358

208.00

15,166

0.02

73

Delft Blue

Delft Blue

  

4.42

4723

1840.40

10,814

< 0.01

10,814

UC San Diego

Logistic Regr

0.95

5205

0.34

8222

1.33

14,901

< 0.01

 

Linear Regr

0.01

246

0.38

3095

0.04

3387

< 0.01

 

Duality Inc

Logistic Regr

0.35

5211

0.34

8953

3.46

10,230

< 0.01

10,228

Chi2 test

< 0.01

283

0.05

1045

0.05

1512

< 0.01

1413

Seoul National University

SNU-1

 

1928

6.17

6584

45.40

15,204

0.92

15,204

SNU-2

1.65

58

1.28

6525

50.45

15,117

0.63

 

IBM

IBM-Complex

  

3.30

 

19.10

8651

0.95

 

IBM- Real

  

6.20

 

45.50

15,613

0.95

 
  1. *the memory usage refers to the peak memory of the corresponding operation, all team's process fit in the 16GB environment