{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T04:55:23Z","timestamp":1764305723265},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030384708"},{"type":"electronic","value":"9783030384715"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-38471-5_10","type":"book-chapter","created":{"date-parts":[[2020,1,9]],"date-time":"2020-01-09T17:04:42Z","timestamp":1578589482000},"page":"227-249","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Towards a Practical Cluster Analysis over Encrypted Data"],"prefix":"10.1007","author":[{"given":"Jung Hee","family":"Cheon","sequence":"first","affiliation":[]},{"given":"Duhyeong","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Jai Hyun","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,10]]},"reference":[{"unstructured":"HEAAN Library (2017). https:\/\/github.com\/snucrypto\/HEAAN","key":"10_CR1"},{"unstructured":"Albrecht, M.R.: A Sage Module for estimating the concrete security of Learning with Errors instances (2017). https:\/\/bitbucket.org\/malb\/lwe-estimator","key":"10_CR2"},{"issue":"3","key":"10_CR3","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1515\/jmc-2015-0016","volume":"9","author":"MR Albrecht","year":"2015","unstructured":"Albrecht, M.R., Player, R., Scott, S.: On the concrete hardness of learning with errors. J. Math. Cryptol. 9(3), 169\u2013203 (2015)","journal-title":"J. Math. Cryptol."},{"key":"10_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1007\/978-3-319-64283-3_20","volume-title":"Big Data Analytics and Knowledge Discovery","author":"N Almutairi","year":"2017","unstructured":"Almutairi, N., Coenen, F., Dures, K.: K-means clustering using homomorphic encryption and an updatable distance matrix: secure third party data clustering with limited data owner interaction. In: Bellatreche, L., Chakravarthy, S. (eds.) DaWaK 2017. LNCS, vol. 10440, pp. 274\u2013285. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-64283-3_20"},{"unstructured":"Bonte, C., Vercauteren, F.: Privacy-preserving logistic regression training. Cryptology ePrint Archive, Report 2018\/233 (2018). https:\/\/eprint.iacr.org\/2018\/233","key":"10_CR5"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1007\/978-3-319-96878-0_17","volume-title":"Advances in Cryptology \u2013 CRYPTO 2018","author":"F Bourse","year":"2018","unstructured":"Bourse, F., Minelli, M., Minihold, M., Paillier, P.: Fast homomorphic evaluation of deep discretized neural networks. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO 2018. LNCS, vol. 10993, pp. 483\u2013512. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96878-0_17"},{"doi-asserted-by":"crossref","unstructured":"Bunn, P., Ostrovsky, R.: Secure two-party k-means clustering. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, New York, NY, USA, pp. 486\u2013497. ACM (2007)","key":"10_CR7","DOI":"10.1145\/1315245.1315306"},{"unstructured":"Chen, H., Chillotti, I., Song, Y.: Improved bootstrapping for approximate homomorphic encryption. Cryptology ePrint Archive, Report 2018\/1043 (2018). http:\/\/eprint.iacr.org\/2018\/1043 . To appear EUROCRYPT 2019","key":"10_CR8"},{"unstructured":"Chen, H., et al.: Logistic regression over encrypted data from fully homomorphic encryption. Cryptology ePrint Archive, Report 2018\/462 (2018). https:\/\/eprint.iacr.org\/2018\/462","key":"10_CR9"},{"unstructured":"Cheon, J.H., Han, K., Hhan, M.: Faster homomorphic discrete fourier transforms and improved FHE bootstrapping. Cryptology ePrint Archive, Report 2018\/1073 (2018). https:\/\/eprint.iacr.org\/2018\/1073 . To appear IEEE Access","key":"10_CR10"},{"key":"10_CR11","doi-asserted-by":"publisher","first-page":"24325","DOI":"10.1109\/ACCESS.2018.2819189","volume":"6","author":"JH Cheon","year":"2018","unstructured":"Cheon, J.H., et al.: Toward a secure drone system: flying with real-time homomorphic authenticated encryption. IEEE Access 6, 24325\u201324339 (2018)","journal-title":"IEEE Access"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/978-3-319-78381-9_14","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2018","author":"JH Cheon","year":"2018","unstructured":"Cheon, J.H., Han, K., Kim, A., Kim, M., Song, Y.: Bootstrapping for approximate homomorphic encryption. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10820, pp. 360\u2013384. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-78381-9_14"},{"key":"10_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/978-3-319-70694-8_15","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2017","author":"JH Cheon","year":"2017","unstructured":"Cheon, J.H., Kim, A., Kim, M., Song, Y.: Homomorphic encryption for arithmetic of approximate numbers. In: Takagi, T., Peyrin, T. (eds.) ASIACRYPT 2017. LNCS, vol. 10624, pp. 409\u2013437. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70694-8_15"},{"unstructured":"Cheon, J.H., Kim, D., Kim, D., Lee, H.H., Lee, K.: Numerical methods for comparison on homomorphically encrypted numbers. Cryptology ePrint Archive, Report 2019\/417 (2019). https:\/\/eprint.iacr.org\/2019\/417 , To appear ASIACRYPT 2019","key":"10_CR14"},{"key":"10_CR15","doi-asserted-by":"publisher","first-page":"46938","DOI":"10.1109\/ACCESS.2018.2866697","volume":"6","author":"JH Cheon","year":"2018","unstructured":"Cheon, J.H., Kim, D., Kim, Y., Song, Y.: Ensemble method for privacy-preserving logistic regression based on homomorphic encryption. IEEE Access 6, 46938\u201346948 (2018)","journal-title":"IEEE Access"},{"key":"10_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-662-53887-6_1","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2016","author":"I Chillotti","year":"2016","unstructured":"Chillotti, I., Gama, N., Georgieva, M., Izabach\u00e8ne, M.: Faster fully homomorphic encryption: bootstrapping in less than 0.1 seconds. In: Cheon, J.H., Takagi, T. (eds.) ASIACRYPT 2016. LNCS, vol. 10031, pp. 3\u201333. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53887-6_1"},{"key":"10_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/978-3-319-70694-8_14","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2017","author":"I Chillotti","year":"2017","unstructured":"Chillotti, I., Gama, N., Georgieva, M., Izabach\u00e8ne, M.: Faster packed homomorphic operations and efficient circuit bootstrapping for TFHE. In: Takagi, T., Peyrin, T. (eds.) ASIACRYPT 2017. LNCS, vol. 10624, pp. 377\u2013408. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70694-8_14"},{"issue":"6","key":"10_CR18","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1038\/nbt.4108","volume":"36","author":"H Cho","year":"2018","unstructured":"Cho, H., Wu, D.J., Berger, B.: Secure genome-wide association analysis using multiparty computation. Nat. Biotechnol. 36(6), 547 (2018)","journal-title":"Nat. Biotechnol."},{"doi-asserted-by":"crossref","unstructured":"Crawford, J.L., Gentry, C., Halevi, S., Platt, D., Shoup, V.: Doing real work with FHE: the case of logistic regression (2018)","key":"10_CR19","DOI":"10.1145\/3267973.3267974"},{"issue":"13","key":"10_CR20","doi-asserted-by":"publisher","first-page":"1612","DOI":"10.1093\/bioinformatics\/btg209","volume":"19","author":"IS Dhillon","year":"2003","unstructured":"Dhillon, I.S., Marcotte, E.M., Roshan, U.: Diametrical clustering for identifying anti-correlated gene clusters. Bioinformatics 19(13), 1612\u20131619 (2003)","journal-title":"Bioinformatics"},{"doi-asserted-by":"crossref","unstructured":"Doganay, M.C., Pedersen, T.B., Saygin, Y., Sava\u015f, E., Levi, A.: Distributed privacy preserving k-means clustering with additive secret sharing. In: Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, PAIS 2008, New York, NY, USA, pp. 3\u201311. ACM (2008)","key":"10_CR21","DOI":"10.1145\/1379287.1379291"},{"key":"10_CR22","volume-title":"Pattern Classification","author":"RO Duda","year":"2012","unstructured":"Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification. Wiley, Hoboken (2012)"},{"doi-asserted-by":"crossref","unstructured":"Freedman, D., Kisilev, P.: Fast mean shift by compact density representation. In: 2009 IEEE Conference on Computer Vision and Pattern Recognition, pp. 1818\u20131825. IEEE (2009)","key":"10_CR23","DOI":"10.1109\/CVPR.2009.5206716"},{"unstructured":"Gentry, C.: A fully homomorphic encryption scheme. Ph.D. thesis, Stanford University (2009). http:\/\/crypto.stanford.edu\/craig","key":"10_CR24"},{"unstructured":"Gilad-Bachrach, R., Dowlin, N., Laine, K., Lauter, K., Naehrig, M., Wernsing, J.: CryptoNets: applying neural networks to encrypted data with high throughput and accuracy. In: International Conference on Machine Learning, pp. 201\u2013210 (2016)","key":"10_CR25"},{"unstructured":"Goldschmidt, R.E.: Applications of division by convergence. Ph.D. thesis, Massachusetts Institute of Technology (1964)","key":"10_CR26"},{"key":"10_CR27","doi-asserted-by":"publisher","first-page":"9466","DOI":"10.1609\/aaai.v33i01.33019466","volume":"33","author":"Kyoohyung Han","year":"2019","unstructured":"Han, K., Hong, S., Cheon, J.H., Park, D.: Logistic regression on homomorphic encrypted data at scale (2019)","journal-title":"Proceedings of the AAAI Conference on Artificial Intelligence"},{"doi-asserted-by":"crossref","unstructured":"Jagannathan, G., Wright, R.N.: Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. In: Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, KDD 2005, New York, NY, USA, pp. 593\u2013599. ACM (2005)","key":"10_CR28","DOI":"10.1145\/1081870.1081942"},{"key":"10_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/978-3-030-10970-7_21","volume-title":"International Conference on Selected Areas in Cryptography","author":"A J\u00e4schke","year":"2018","unstructured":"J\u00e4schke, A., Armknecht, F.: Unsupervised machine learning on encrypted data. In: Cid, C., Jacobson Jr., M. (eds.) SAC 2018. LNCS, vol. 11349, pp. 453\u2013478. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-10970-7_21"},{"issue":"4","key":"10_CR30","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1186\/s12920-018-0401-7","volume":"11","author":"A Kim","year":"2018","unstructured":"Kim, A., Song, Y., Kim, M., Lee, K., Cheon, J.H.: Logistic regression model training based on the approximate homomorphic encryption. BMC Med. Genomics 11(4), 83 (2018)","journal-title":"BMC Med. Genomics"},{"issue":"2","key":"10_CR31","doi-asserted-by":"publisher","first-page":"e19","DOI":"10.2196\/medinform.8805","volume":"6","author":"M Kim","year":"2018","unstructured":"Kim, M., Song, Y., Wang, S., Xia, Y., Jiang, X.: Secure logistic regression based on homomorphic encryption: design and evaluation. JMIR Med. Inform. 6(2), e19 (2018)","journal-title":"JMIR Med. Inform."},{"unstructured":"Liu, D.: Practical fully homomorphic encryption without noise reduction. Cryptology ePrint Archive, Report 2015\/468 (2015). https:\/\/eprint.iacr.org\/2015\/468","key":"10_CR32"},{"doi-asserted-by":"crossref","unstructured":"Liu, X., et al.: Outsourcing two-party privacy preserving k-means clustering protocol in wireless sensor networks. In: 2015 11th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN), pp. 124\u2013133. IEEE (2015)","key":"10_CR33","DOI":"10.1109\/MSN.2015.42"},{"doi-asserted-by":"crossref","unstructured":"Malik, M.B., Ghazi, M.A., Ali, R.: Privacy preserving data mining techniques: current scenario and future prospects. In: 2012 Third International Conference on Computer and Communication Technology (ICCCT), pp. 26\u201332. IEEE (2012)","key":"10_CR34","DOI":"10.1109\/ICCCT.2012.15"},{"key":"10_CR35","first-page":"03","volume":"9","author":"F Meskine","year":"2012","unstructured":"Meskine, F., Nait-Bahloul, S.: Privacy preserving k-means clustering: a survey research. Int. Arab J. Inf. Technol. 9, 03 (2012)","journal-title":"Int. Arab J. Inf. Technol."},{"unstructured":"Pouget, F., Dacier, M., et al.: Honeypot-based forensics. In: AusCERT Asia Pacific Information Technology Security Conference (2004)","key":"10_CR36"},{"key":"10_CR37","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/0377-0427(87)90125-7","volume":"20","author":"PJ Rousseeuw","year":"1987","unstructured":"Rousseeuw, P.J.: Silhouettes: a graphical aid to the interpretation and validation of cluster analysis. J. Comput. Appl. Math. 20, 53\u201365 (1987)","journal-title":"J. Comput. Appl. Math."},{"key":"10_CR38","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/978-3-540-68125-0_29","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"J Sakuma","year":"2008","unstructured":"Sakuma, J., Kobayashi, S.: Large-scale k-means clustering with user-centric privacy preservation. In: Washio, T., Suzuki, E., Ting, K.M., Inokuchi, A. (eds.) PAKDD 2008. LNCS (LNAI), vol. 5012, pp. 320\u2013332. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-68125-0_29"},{"unstructured":"Samet, S., Miri, A., Orozco-Barbosa, L.: Privacy preserving k-means clustering in multi-party environment, January 2007","key":"10_CR39"},{"doi-asserted-by":"crossref","unstructured":"Su, C., Bao, F., Zhou, J., Takagi, T., Sakurai, K.: Privacy-preserving two-party k-means clustering via secure approximation. In: Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops - Volume 01, AINAW 2007, Washington, DC, USA, pp. 385\u2013391. IEEE Computer Society (2007)","key":"10_CR40","DOI":"10.1109\/AINAW.2007.295"},{"issue":"463","key":"10_CR41","doi-asserted-by":"publisher","first-page":"750","DOI":"10.1198\/016214503000000666","volume":"98","author":"CA Sugar","year":"2003","unstructured":"Sugar, C.A., James, G.M.: Finding the number of clusters in a dataset: an information-theoretic approach. J. Am. Stat. Assoc. 98(463), 750\u2013763 (2003)","journal-title":"J. Am. Stat. Assoc."},{"unstructured":"Ultsch, A.: Clustering with SOM: U*C. In: Proceedings of Workshop on Self-Organizing Maps, Paris, France, pp. 75\u201382 (2005). https:\/\/www.uni-marburg.de\/fb12\/arbeitsgruppen\/datenbionik\/data?language_sync=1","key":"10_CR42"},{"doi-asserted-by":"crossref","unstructured":"Vaidya, J., Clifton, C.: Privacy-preserving k-means clustering over vertically partitioned data. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2003, New York, NY, USA, pp. 206\u2013215. ACM (2003)","key":"10_CR43","DOI":"10.1145\/956750.956776"},{"key":"10_CR44","first-page":"47","volume":"18","author":"KJ Vinoth","year":"2016","unstructured":"Vinoth, K.J., Santhi, V.: A brief survey on privacy preserving techniques in data mining. IOSR J. Comput. Eng. (IOSR-JCE) 18, 47\u201351 (2016)","journal-title":"IOSR J. Comput. Eng. (IOSR-JCE)"},{"issue":"2","key":"10_CR45","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1093\/bioinformatics\/btv563","volume":"32","author":"S Wang","year":"2016","unstructured":"Wang, S., et al.: HEALER: homomorphic computation of exact logistic regression for secure rare disease variants analysis in GWAS. Bioinformatics 32(2), 211\u2013218 (2016)","journal-title":"Bioinformatics"},{"doi-asserted-by":"crossref","unstructured":"Wang, Y.: Notes on two fully homomorphic encryption schemes without bootstrapping. IACR Cryptology ePrint Archive, 2015:519 (2015)","key":"10_CR46","DOI":"10.1007\/978-3-319-16745-9_13"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography \u2013 SAC 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-38471-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,24]],"date-time":"2023-09-24T18:46:05Z","timestamp":1695581165000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-38471-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030384708","9783030384715"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-38471-5_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"10 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Selected Areas in Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Waterloo, ON","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sacrypt2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/uwaterloo.ca\/combinatorics-and-optimization\/news\/sac-2019-august-12-16-2019","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}