Fig. 2
From: Secure top most significant genome variants search: iDASH 2017 competition

Use-case for multi-party search over encrypted genomic data
From: Secure top most significant genome variants search: iDASH 2017 competition
Use-case for multi-party search over encrypted genomic data