{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T22:37:25Z","timestamp":1755038245604},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242015"},{"type":"electronic","value":"9783030242022"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24202-2_8","type":"book-chapter","created":{"date-parts":[[2019,7,23]],"date-time":"2019-07-23T02:02:44Z","timestamp":1563847364000},"page":"98-111","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Medical Diagnostics Based on Encrypted Medical Data"],"prefix":"10.1007","author":[{"given":"Alexey","family":"Gribov","sequence":"first","affiliation":[]},{"given":"Kelsey","family":"Horan","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Gryak","sequence":"additional","affiliation":[]},{"given":"Kayvan","family":"Najarian","sequence":"additional","affiliation":[]},{"given":"Vladimir","family":"Shpilrain","sequence":"additional","affiliation":[]},{"given":"Reza","family":"Soroushmehr","sequence":"additional","affiliation":[]},{"given":"Delaram","family":"Kahrobaei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,24]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Aono, Y., Hayashi, T., Trieu Phong, L., Wang, L.: Scalable and secure logistic regression via homomorphic encryption. In: Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy, pp. 142\u2013144. ACM (2016)","DOI":"10.1145\/2857705.2857731"},{"key":"8_CR2","unstructured":"Aslett, L.J., Esperan\u00e7a, P.M., Holmes, C.C.: A review of homomorphic encryption and software tools for encrypted statistical machine learning. arXiv preprint \n                  arXiv:1508.06574\n                  \n                 (2015)"},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.jbi.2014.04.003","volume":"50","author":"JW Bos","year":"2014","unstructured":"Bos, J.W., Lauter, K., Naehrig, M.: Private predictive analysis on encrypted medical data. J. Biomed. Inform. 50, 234\u2013243 (2014). Special Issue on Informatics Methods in Medical Privacy","journal-title":"J. Biomed. Inform."},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Bost, R., Popa, R.A., Tu, S., Goldwasser, S.: Machine learning classification over encrypted data. In: NDSS (2015)","DOI":"10.14722\/ndss.2015.23241"},{"issue":"3","key":"8_CR5","first-page":"13","volume":"6","author":"Z Brakerski","year":"2014","unstructured":"Brakerski, Z., Gentry, C., Vaikuntanathan, V.: (Leveled) fully homomorphic encryption without bootstrapping. ACM Trans. Computat. Theor. (TOCT) 6(3), 13 (2014)","journal-title":"ACM Trans. Computat. Theor. (TOCT)"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Brakerski, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from (standard) LWE. In: Proceedings of the 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011, pp. 97\u2013106. IEEE Computer Society, Washington, DC (2011)","DOI":"10.1109\/FOCS.2011.12"},{"key":"8_CR7","unstructured":"Centers for Disease Control and Prevention: HIPAA privacy rule and public health. Guidance from CDC and the US department of health and human services. MMWR Morb. Mortal. Wkly. Rep. 52(Suppl. 1), 1\u201317 (2003)"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-662-53887-6_1","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2016","author":"I Chillotti","year":"2016","unstructured":"Chillotti, I., Gama, N., Georgieva, M., Izabach\u00e8ne, M.: Faster fully homomorphic encryption: bootstrapping in less than 0.1 seconds. In: Cheon, J.H., Takagi, T. (eds.) ASIACRYPT 2016. LNCS, vol. 10031, pp. 3\u201333. Springer, Heidelberg (2016). \n                  https:\/\/doi.org\/10.1007\/978-3-662-53887-6_1"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Du, W., Han, Y.S., Chen, S.: Privacy-preserving multivariate statistical analysis: linear regression and classification. In: Proceedings of the 2004 SIAM International Conference on Data Mining, pp. 222\u2013233. SIAM (2004)","DOI":"10.1137\/1.9781611972740.21"},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1007\/978-3-662-46800-5_24","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2015","author":"L Ducas","year":"2015","unstructured":"Ducas, L., Micciancio, D.: FHEW: bootstrapping homomorphic encryption in less than a second. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9056, pp. 617\u2013640. Springer, Heidelberg (2015). \n                  https:\/\/doi.org\/10.1007\/978-3-662-46800-5_24"},{"issue":"12","key":"8_CR11","doi-asserted-by":"publisher","first-page":"e28071","DOI":"10.1371\/journal.pone.0028071","volume":"6","author":"K Emam El","year":"2011","unstructured":"El Emam, K., Jonker, E., Arbuckle, L., Malin, B.: A systematic review of re-identification attacks on health data. PloS One 6(12), e28071 (2011)","journal-title":"PloS One"},{"key":"8_CR12","unstructured":"Evans, D., Huang, Y., Katz, J., Malka, L.: Efficient privacy-preserving biometric identification. In: Proceedings of the 17th conference Network and Distributed System Security Symposium, NDSS (2011)"},{"key":"8_CR13","unstructured":"Fan, J., Vercauteren, F.: Somewhat practical fully homomorphic encryption. IACR Cryptology ePrint Archive 2012, 144 (2012)"},{"key":"8_CR14","volume-title":"A Fully Homomorphic Encryption Scheme","author":"C Gentry","year":"2009","unstructured":"Gentry, C., Boneh, D.: A Fully Homomorphic Encryption Scheme, vol. 20. Stanford University, Stanford (2009)"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-642-20465-4_9","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"C Gentry","year":"2011","unstructured":"Gentry, C., Halevi, S.: Implementing Gentry\u2019s fully-homomorphic encryption scheme. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 129\u2013148. Springer, Heidelberg (2011). \n                  https:\/\/doi.org\/10.1007\/978-3-642-20465-4_9"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-37682-5_1","volume-title":"Information Security and Cryptology \u2013 ICISC 2012","author":"T Graepel","year":"2013","unstructured":"Graepel, T., Lauter, K., Naehrig, M.: ML confidential: machine learning on encrypted data. In: Kwon, T., Lee, M.-K., Kwon, D. (eds.) ICISC 2012. LNCS, vol. 7839, pp. 1\u201321. Springer, Heidelberg (2013). \n                  https:\/\/doi.org\/10.1007\/978-3-642-37682-5_1"},{"issue":"1","key":"8_CR17","first-page":"17","volume":"10","author":"A Gribov","year":"2018","unstructured":"Gribov, A., Kahrobaei, D., Shpilrain, V.: Practical private-key fully homomorphic encryption in rings. Groups Complex. Cryptol. 10(1), 17\u201327 (2018)","journal-title":"Groups Complex. Cryptol."},{"key":"8_CR18","unstructured":"Grigoriev, D., Ponomarenko, I.: Homomorphic public-key cryptosystems over groups and rings. arXiv preprint cs\/0309010 (2003)"},{"key":"8_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"554","DOI":"10.1007\/978-3-662-44371-2_31","volume-title":"Advances in Cryptology \u2013 CRYPTO 2014","author":"S Halevi","year":"2014","unstructured":"Halevi, S., Shoup, V.: Algorithms in HElib. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014. LNCS, vol. 8616, pp. 554\u2013571. Springer, Heidelberg (2014). \n                  https:\/\/doi.org\/10.1007\/978-3-662-44371-2_31"},{"key":"8_CR20","unstructured":"Halevi, S., Shoup, V.: Helib (2014). HELib: \n                  https:\/\/github.com.shaih\/HElib"},{"issue":"4","key":"8_CR21","first-page":"669","volume":"27","author":"R Hall","year":"2011","unstructured":"Hall, R., Fienberg, S.E., Nardi, Y.: Secure multiple linear regression based on homomorphic encryption. J. Off. Stat. 27(4), 669 (2011)","journal-title":"J. Off. Stat."},{"key":"8_CR22","unstructured":"Kahrobaei, D., Lam, H., Shpilrain, V.: System and method for private-key fully homomorphic encryption and private search between rings. Patent US20170063526, 25 August 2017"},{"key":"8_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-16295-9_1","volume-title":"Progress in Cryptology - LATINCRYPT 2014","author":"K Lauter","year":"2015","unstructured":"Lauter, K., L\u00f3pez-Alt, A., Naehrig, M.: Private computation on encrypted genomic data. In: Aranha, D.F., Menezes, A. (eds.) LATINCRYPT 2014. LNCS, vol. 8895, pp. 3\u201327. Springer, Cham (2015). \n                  https:\/\/doi.org\/10.1007\/978-3-319-16295-9_1"},{"issue":"3","key":"8_CR24","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s00145-001-0019-2","volume":"15","author":"P Lindell","year":"2002","unstructured":"Lindell, P.: Privacy preserving data mining. J. Cryptol. 15(3), 177\u2013206 (2002)","journal-title":"J. Cryptol."},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Liu, F., Ng, W.K., Zhang, W.: Encrypted SVM for outsourced data mining. In: 2015 IEEE 8th International Conference on Cloud Computing (CLOUD), pp. 1085\u20131092. IEEE (2015)","DOI":"10.1109\/CLOUD.2015.158"},{"key":"8_CR26","volume-title":"System Identification: Theory for the User","author":"L Ljung","year":"1987","unstructured":"Ljung, L.: System Identification: Theory for the User. Prentice-Hall, Upper Saddle River (1987)"},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Naehrig, M., Lauter, K., Vaikuntanathan, V.: Can homomorphic encryption be practical? In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, pp. 113\u2013124. ACM (2011)","DOI":"10.1145\/2046660.2046682"},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"Nikolaenko, V., Weinsberg, U., Ioannidis, S., Joye, M., Boneh, D., Taft, N.: Privacy-preserving ridge regression on hundreds of millions of records. In: 2013 IEEE Symposium on Security and Privacy, pp. 334\u2013348, May 2013","DOI":"10.1109\/SP.2013.30"},{"issue":"5","key":"8_CR29","first-page":"537","volume":"50","author":"T Poggio","year":"2003","unstructured":"Poggio, T., Smale, S.: The mathematics of learning: dealing with data. Not. AMS 50(5), 537\u2013544 (2003)","journal-title":"Not. AMS"},{"key":"8_CR30","unstructured":"Rigney, D.R., Goldberger, A.L., Ocasio, W., Ichimaru, Y., Moody, G.B., Mark, R.: Multi-channel physiological data: description and analysis (1993)"},{"key":"8_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-642-14423-3_16","volume-title":"Information, Security and Cryptology \u2013 ICISC 2009","author":"A-R Sadeghi","year":"2010","unstructured":"Sadeghi, A.-R., Schneider, T., Wehrenberg, I.: Efficient privacy-preserving face recognition. In: Lee, D., Hong, S. (eds.) ICISC 2009. LNCS, vol. 5984, pp. 229\u2013244. Springer, Heidelberg (2010). \n                  https:\/\/doi.org\/10.1007\/978-3-642-14423-3_16"},{"issue":"5","key":"8_CR32","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/MSP.2013.2259911","volume":"30","author":"AD Sarwate","year":"2013","unstructured":"Sarwate, A.D., Chaudhuri, K.: Signal processing and machine learning with differential privacy: algorithms and challenges for continuous data. IEEESignal Process. Mag. 30(5), 86\u201394 (2013)","journal-title":"IEEESignal Process. Mag."},{"key":"8_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2014\/781670","volume":"2014","author":"Beata Strack","year":"2014","unstructured":"Strack, B., et al.: Impact of HbA1c measurement on hospital readmission rates: analysis of 70,000 clinical database patient records. BioMed Res. Int. 2014 (2014)","journal-title":"BioMed Research International"},{"issue":"4","key":"8_CR34","doi-asserted-by":"publisher","first-page":"884","DOI":"10.1109\/TBME.2009.2036000","volume":"57","author":"A Tsanas","year":"2010","unstructured":"Tsanas, A., Little, M.A., McSharry, P.E., Ramig, L.O.: Accurate telemonitoring of Parkinson\u2019s disease progression by noninvasive speech tests. IEEE Trans. Biomed. Eng. 57(4), 884\u2013893 (2010)","journal-title":"IEEE Trans. Biomed. Eng."},{"key":"8_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/978-3-642-13190-5_2","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2010","author":"M Dijk van","year":"2010","unstructured":"van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 24\u201343. Springer, Heidelberg (2010). \n                  https:\/\/doi.org\/10.1007\/978-3-642-13190-5_2"},{"issue":"4","key":"8_CR36","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1136\/amiajnl-2013-002162","volume":"21","author":"J Wiens","year":"2014","unstructured":"Wiens, J., Guttag, J., Horvitz, E.: A study in transfer learning: leveraging data from multiple hospitals to enhance hospital-specific predictions. J. Am. Med. Inform. Assoc. 21(4), 699\u2013706 (2014)","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"8_CR37","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.future.2014.06.004","volume":"43","author":"JJ Yang","year":"2015","unstructured":"Yang, J.J., Li, J.Q., Niu, Y.: A hybrid solution for privacy preserving medical data sharing in the cloud environment. Futur. Gener. Comput. Syst. 43, 74\u201386 (2015)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"11","key":"8_CR38","doi-asserted-by":"publisher","first-page":"1364","DOI":"10.14778\/2350229.2350253","volume":"5","author":"J Zhang","year":"2012","unstructured":"Zhang, J., Zhang, Z., Xiao, X., Yang, Y., Winslett, M.: Functional mechanism: regression analysis under differential privacy. Proc. VLDB Endow. 5(11), 1364\u20131375 (2012)","journal-title":"Proc. VLDB Endow."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Bio-inspired Information and Communication Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24202-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,23]],"date-time":"2019-07-23T02:04:44Z","timestamp":1563847484000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24202-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242015","9783030242022"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24202-2_8","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BICT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Bio-inspired Information and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pittsburgh, PA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 March 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 March 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aicon12019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/bionetics.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}