{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T13:57:53Z","timestamp":1753883873826},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030358686"},{"type":"electronic","value":"9783030358693"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-35869-3_13","type":"book-chapter","created":{"date-parts":[[2019,11,20]],"date-time":"2019-11-20T01:04:25Z","timestamp":1574211865000},"page":"176-194","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Encrypted Classification Using Secure K-Nearest Neighbour Computation"],"prefix":"10.1007","author":[{"given":"B. Praeep Kumar","family":"Reddy","sequence":"first","affiliation":[]},{"given":"Ayantika","family":"Chatterjee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,21]]},"reference":[{"key":"13_CR1","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.csi.2017.12.004","volume":"58","author":"H Park","year":"2017","unstructured":"Park, H., Kim, P., Kim, H., Park, K.-W., Lee, Y.: Efficient machine learning over encrypted data with non-interactive communication. Comput. Stand. Interfaces 58, 87\u2013108 (2017)","journal-title":"Comput. Stand. Interfaces"},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10970-7_21","volume-title":"Selected Areas in Cryptography \u2013 SAC 2018","author":"A J\u00e4schke","year":"2018","unstructured":"J\u00e4schke, A., Armknecht, F.: Unsupervised machine learning on encrypted. In: Cid, C., Jacobson Jr., M. (eds.) SAC 2018. LNCS. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-10970-7_21"},{"key":"13_CR3","doi-asserted-by":"publisher","unstructured":"Bost, R., Popa, R.A., Goldwasser, S.: Machine learning classification over encrypted data. In: IACR Cryptology ePrint Archive 2014. https:\/\/doi.org\/10.14722\/ndss.2015.23241","DOI":"10.14722\/ndss.2015.23241"},{"key":"13_CR4","unstructured":"Hall, R., Fienberg, S.E., Nardi, Y.: Secure multiple linear regression based on homomorphic encryption (2011)"},{"key":"13_CR5","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.csi.2017.12.004","volume":"58","author":"H Park","year":"2018","unstructured":"Park, H., Kim, P., Kim, H., Park, K.-W., Lee, Y.: Efficient machine learning over encrypted data with non-interactive communication. Comput. Stand. Interfaces 58, 87\u2013108 (2018)","journal-title":"Comput. Stand. Interfaces"},{"key":"13_CR6","doi-asserted-by":"publisher","unstructured":"Kesarwani, M., et al.: Efficient secure k-nearest neighbours over encrypted data. In: EDBT (2018). https:\/\/doi.org\/10.5441\/002\/edbt.2018.67","DOI":"10.5441\/002\/edbt.2018.67"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Yang, H., He, W., Li, J., Li, H.: Efficient and secure kNN classification over encrypted data using vector homomorphic encryption. In: 2018 IEEE International Conference on Communications (ICC), pp. 1\u20137 (2018)","DOI":"10.1109\/ICC.2018.8422438"},{"key":"13_CR8","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1186\/s12920-018-0397-z","volume":"11","author":"H Chen","year":"2018","unstructured":"Chen, H., et al.: Logistic regression over encrypted data from fully homomorphic encryption. BMC Med. Genomics 11, 81 (2018)","journal-title":"BMC Med. Genomics"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Hu, S., Wang, Q., Wang, J., Chow, S.S.M., Zou, Q.: Securing fast learning! Ridge regression over encrypted big data. In: 2016 IEEE Trustcom\/BigDataSE\/ISPA, pp. 19\u201326 (2016)","DOI":"10.1109\/TrustCom.2016.0041"},{"key":"13_CR10","unstructured":"Laur, S., Lipmaa, H., Mielikinen, T.: Cryptographically private support vector machines. In: 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2016)"},{"key":"13_CR11","doi-asserted-by":"publisher","unstructured":"Liu, F., Ng, W.K., Zhang, W.: Encrypted SVM for outsourced data mining. In: IEEE 8th International Conference on Cloud Computing (2015). https:\/\/doi.org\/10.1109\/CLOUD.2015.158","DOI":"10.1109\/CLOUD.2015.158"},{"key":"13_CR12","unstructured":"Hesamifard, E., Takabi, H., Ghasemi, M.: CryptoDL: deep neural networks over encrypted data. CoRR abs\/1711.05189 (2017)"},{"key":"13_CR13","unstructured":"Yao, B., Li, F., Xiao, X.: Secure nearest neighbor revisited. In: 2013 IEEE 29th International Conference on Data Engineering (ICDE), pp. 733\u2013744 (2013)"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Elmehdwi, Y., Samanthula, B.K., Jiang, W.: Secure k-nearest neighbor query over encrypted data in outsourced environments. In: IEEE 30th International Conference on Data Engineering, pp. 664\u2013675 (2014)","DOI":"10.1109\/ICDE.2014.6816690"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Yi, X., Paulet, R., Bertino, E., Varadharajan, V.: Practical k nearest neighbor queries with location privacy. In: IEEE 30th International Conference on Data Engineering, pp. 640\u2013651 (2014)","DOI":"10.1109\/ICDE.2014.6816688"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Wang, B., Hou, Y., Li, M.: Practical and secure nearest neighbor search on encrypted large-scale data. In: IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications, pp. 1\u20139 (2016)","DOI":"10.1109\/INFOCOM.2016.7524389"},{"key":"13_CR17","unstructured":"Thosar, D.S., Thosar, R.D., Gadakh, P.J.: Secure kNN Query Processing in Untrusted Cloud Environments (2015)"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Wong, W.K., Cheung, D.W.-L., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: SIGMOD Conference (2009)","DOI":"10.1145\/1559845.1559862"},{"key":"13_CR19","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815867","volume-title":"Statistical Models: Theory and Practice","author":"DA Freedman","year":"2009","unstructured":"Freedman, D.A.: Statistical Models: Theory and Practice. Cambridge University Press, Cambridge (2009)"},{"key":"13_CR20","unstructured":"Rencher, A.C., Christensen, W.F.: Multivariate regression, Chap. 10 (2012)"},{"key":"13_CR21","unstructured":"Introduction. In: Methods of Multivariate Analysis. Wiley Series in Probability and Statistics, vol. 709, 3rd edn., p. 19. Wiley. ISBN 9781118391679"},{"key":"13_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19425-7","volume-title":"Regression Modeling Strategies","author":"FE Harrell","year":"2001","unstructured":"Harrell, F.E.: Regression Modeling Strategies, 2nd edn. Springer, Cham (2001). https:\/\/doi.org\/10.1007\/978-3-319-19425-7 . ISBN 978-0-387-95232-1","edition":"2"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Caruana, R., Niculescu-Mizil, A.: An empirical comparison of supervised learning algorithms. In: 23rd International Conference on Machine Learning. CiteSeerX (2006)","DOI":"10.1145\/1143844.1143865"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Pagel, J.F., Kirshtein, P.: Machine Dreaming and Consciousness (2017)","DOI":"10.1016\/B978-0-12-803720-1.00013-X"},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"Songhori, E.M., Hussain, S.U., Sadeghi, A.-R., Koushanfar, F.: Compacting privacy-preserving k-nearest neighbor search using logic synthesis. In: 52nd ACM\/EDAC\/IEEE Design Automation Conference (DAC), pp. 1\u20136 (2015)","DOI":"10.1145\/2744769.2744808"},{"key":"13_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jpdc.2015.11.004","volume":"89","author":"Y Zhu","year":"2016","unstructured":"Zhu, Y., Huang, Z., Takagi, T.: Secure and controllable k-NN query over encrypted cloud data with key confidentiality. Parallel Distrib. Comput. 89, 1\u201312 (2016)","journal-title":"Parallel Distrib. Comput."},{"key":"13_CR27","unstructured":"Kaur, G., Pandey, P.S.: Emotion recognition system using IOT and machine learning-a healthcare application. In: 23rd Conference of Open Innovations Association FRUCT, p. 63. FRUCT Oy (2018)"},{"key":"13_CR28","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1109\/TCC.2015.2481416","volume":"6","author":"A Chatterjee","year":"2018","unstructured":"Chatterjee, A., Sengupta, I.: Translating algorithms to handle fully homomorphic encrypted data on the cloud. IEEE Trans. Cloud Comput. 6, 287\u2013300 (2018)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"13_CR29","unstructured":"Chatterjee, A., Sengupta, I.: Searching and sorting of fully homomorphic encrypted data on cloud. IACR Cryptology ePrint Archive 2015: 981 (2015)"},{"key":"13_CR30","doi-asserted-by":"crossref","unstructured":"Chillotti, I., Gama, N., Georgieva, M., Izabach\u00e8ne, M.: TFHE: fast fully homomorphic encryption over the torus. J. Cryptol. 1\u201358 (2018)","DOI":"10.1007\/s00145-019-09319-x"},{"key":"13_CR31","doi-asserted-by":"crossref","unstructured":"Carpov, S., Gama, N., Georgieva, M., Troncoso-Pastoriza, J.R.: Privacy-preserving semi-parallel logistic regression training with Fully Homomorphic Encryption. IACR Cryptology ePrint Archive 2019: 101 (2019)","DOI":"10.1186\/s12920-020-0723-0"},{"key":"13_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1007\/978-3-319-96878-0_17","volume-title":"Advances in Cryptology \u2013 CRYPTO 2018","author":"F Bourse","year":"2018","unstructured":"Bourse, F., Minelli, M., Minihold, M., Paillier, P.: Fast homomorphic evaluation of deep discretized neural networks. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO 2018, Part III. LNCS, vol. 10993, pp. 483\u2013512. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96878-0_17"},{"key":"13_CR33","unstructured":"Dua, D., Graff, C.: UCI Machine Learning Repository (2017). http:\/\/archive.ics.uci.edu\/ml"},{"issue":"3","key":"13_CR34","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1145\/1666420.1666444","volume":"53","author":"C Gentry","year":"2010","unstructured":"Gentry, C.: Computing arbitrary functions of encrypted data. Commun. ACM 53(3), 97\u2013105 (2010)","journal-title":"Commun. ACM"},{"key":"13_CR35","unstructured":"https:\/\/tfhe.github.io\/tfhe\/"},{"key":"13_CR36","unstructured":"https:\/\/github.com\/homenc\/HElib"},{"key":"13_CR37","unstructured":"https:\/\/www.csoonline.com\/article\/2130877\/the-biggest-data-breaches-of-the-21st-century.html"},{"key":"13_CR38","unstructured":"Ultsch, A.: Clustering with SOM: U*C. In: Proceedings of Workshop on Self-Organizing Maps (2005)"},{"key":"13_CR39","volume-title":"Pattern Recognition and Machine Learning","author":"CM Bishop","year":"2006","unstructured":"Bishop, C.M.: Pattern Recognition and Machine Learning. Springer, New York (2006)"},{"key":"13_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/978-3-319-70694-8_14","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2017","author":"I Chillotti","year":"2017","unstructured":"Chillotti, I., Gama, N., Georgieva, M., Izabach\u00e8ne, M.: Faster packed homomorphic operations and efficient circuit bootstrapping for TFHE. In: Takagi, T., Peyrin, T. (eds.) ASIACRYPT 2017. LNCS, vol. 10624, pp. 377\u2013408. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70694-8_14"},{"key":"13_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-662-53887-6_1","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2016","author":"I Chillotti","year":"2016","unstructured":"Chillotti, I., Gama, N., Georgieva, M., Izabach\u00e8ne, M.: Faster fully homomorphic encryption: bootstrapping in less than 0.1 seconds. In: Cheon, J.H., Takagi, T. (eds.) ASIACRYPT 2016. LNCS, vol. 10031, pp. 3\u201333. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53887-6_1"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Applied Cryptography Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-35869-3_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,4]],"date-time":"2021-02-04T02:48:13Z","timestamp":1612406893000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-35869-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030358686","9783030358693"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-35869-3_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"21 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPACE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy, and Applied Cryptography Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gandhinagar","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"space2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.isical.ac.in\/~space2019\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}