{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T03:37:43Z","timestamp":1767065863194,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030913557"},{"type":"electronic","value":"9783030913564"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-91356-4_5","type":"book-chapter","created":{"date-parts":[[2021,11,26]],"date-time":"2021-11-26T06:01:25Z","timestamp":1637906485000},"page":"70-94","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Non-interactive Multi-user Protocol for Private Authorised Query Processing on Genomic Data"],"prefix":"10.1007","author":[{"given":"Sara","family":"Jafarbeiki","sequence":"first","affiliation":[]},{"given":"Amin","family":"Sakzad","sequence":"additional","affiliation":[]},{"given":"Shabnam Kasra","family":"Kermanshahi","sequence":"additional","affiliation":[]},{"given":"Ron","family":"Steinfeld","sequence":"additional","affiliation":[]},{"given":"Raj","family":"Gaire","sequence":"additional","affiliation":[]},{"given":"Shangqi","family":"Lai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,27]]},"reference":[{"unstructured":"Kupersmith, J.: The privacy conundrum and genomic research: re-identification and other concerns, Health Affairs. Project HOPE (2013)","key":"5_CR1"},{"doi-asserted-by":"crossref","unstructured":"Hasan, M.Z., Mahdi, M.S.R., Sadat, M.N., Mohammed, N.: Secure count query on encrypted genomic data. J. Biomed. Inform. 81, 41\u201352 (2018)","key":"5_CR2","DOI":"10.1016\/j.jbi.2018.03.003"},{"doi-asserted-by":"crossref","unstructured":"Mahdi, M.S.R., Sadat, M.N.,\u00a0Mohammed, N.,\u00a0Jiang, X.: Secure count query on encrypted heterogeneous data. In: 2020 IEEE International Conference on (DASC\/PiCom\/CBDCom\/CyberSciTech), pp. 548\u2013555. IEEE (2020)","key":"5_CR3","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00098"},{"issue":"5","key":"5_CR4","doi-asserted-by":"publisher","first-page":"1466","DOI":"10.1109\/JBHI.2016.2625299","volume":"21","author":"R Ghasemi","year":"2016","unstructured":"Ghasemi, R., Al Aziz, M.M., Mohammed, N., Dehkordi, M.H., Jiang, X.: Private and efficient query processing on outsourced genomic databases. IEEE J. Biomed. Health Inform. 21(5), 1466\u20131472 (2016)","journal-title":"IEEE J. Biomed. Health Inform."},{"issue":"3","key":"5_CR5","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1109\/TCC.2017.2682860","volume":"7","author":"M Nassar","year":"2017","unstructured":"Nassar, M., Malluhi, Q., Atallah, M., Shikfa, A.: Securing aggregate queries for DNA databases. IEEE Trans. Cloud Comp. 7(3), 827\u2013837 (2017)","journal-title":"IEEE Trans. Cloud Comp."},{"issue":"4","key":"5_CR6","doi-asserted-by":"publisher","first-page":"654","DOI":"10.2105\/AJPH.2006.090902","volume":"97","author":"R Krishna","year":"2007","unstructured":"Krishna, R., Kelleher, K., Stahlberg, E.: Patient confidentiality in the research use of clinical medical databases. Am. J. Public Health 97(4), 654\u2013658 (2007)","journal-title":"Am. J. Public Health"},{"issue":"2","key":"5_CR7","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1038\/s41431-017-0045-7","volume":"26","author":"M Shabani","year":"2018","unstructured":"Shabani, M., Borry, P.: Rules for processing genetic data for research purposes in view of the new EU general data protection regulation. Eur. J. Hum. Genet. 26(2), 149\u2013156 (2018)","journal-title":"Eur. J. Hum. Genet."},{"unstructured":"A.G.H. Alliance: Genomic data & privacy law, May 2018. https:\/\/www.australiangenomics.org.au\/genomics-and-privacy-law\/","key":"5_CR8"},{"issue":"11","key":"5_CR9","doi-asserted-by":"publisher","first-page":"e1001983","DOI":"10.1371\/journal.pbio.1001983","volume":"12","author":"Y Erlich","year":"2014","unstructured":"Erlich, Y., et al.: Redefining genomic privacy: trust and empowerment. PLoS Biol. 12(11), e1001983 (2014)","journal-title":"PLoS Biol."},{"issue":"6","key":"5_CR10","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1038\/nrg3723","volume":"15","author":"Y Erlich","year":"2014","unstructured":"Erlich, Y., Narayanan, A.: Routes for breaching and protecting genetic privacy. Nat. Rev. Genet. 15(6), 409\u2013421 (2014)","journal-title":"Nat. Rev. Genet."},{"issue":"5","key":"5_CR11","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1109\/TITB.2007.908465","volume":"12","author":"M Kantarcioglu","year":"2008","unstructured":"Kantarcioglu, M., Jiang, W., Liu, Y., Malin, B.: A cryptographic approach to securely share and query genomic sequences. IEEE Trans. Inform. Tech. Biomed. 12(5), 606\u2013617 (2008)","journal-title":"IEEE Trans. Inform. Tech. Biomed."},{"issue":"1","key":"5_CR12","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1109\/TITB.2011.2171701","volume":"16","author":"M Canim","year":"2011","unstructured":"Canim, M., Kantarcioglu, M., Malin, B.: Secure management of biomedical data with cryptographic hardware. IEEE Trans. Inform. Tech. Biomed. 16(1), 166\u2013175 (2011)","journal-title":"IEEE Trans. Inform. Tech. Biomed."},{"unstructured":"Chenghong, W., et al.: Scotch: secure counting of encrypted genomic data using a hybrid approach. In: AMIA Annual Symposium Proceedings, vol. 2017. American Medical Informatics Association, p. 1744 (2017)","key":"5_CR13"},{"unstructured":"Jafarbeiki, S., et al.: PrivGenDB: efficient and privacy-preserving query executions over encrypted SNP-phenotype database (2021). https:\/\/arxiv.org\/abs\/2104.02890","key":"5_CR14"},{"doi-asserted-by":"crossref","unstructured":"Perillo, A.M., De Cristofaro, E.: PAPEETE: Private, Authorized, and Fast Personal Genomic Testing. SciTePress (2018)","key":"5_CR15","DOI":"10.5220\/0006859706500655"},{"doi-asserted-by":"crossref","unstructured":"Naveed, M., et al.: Controlled functional encryption. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1280\u20131291 (2014)","key":"5_CR16","DOI":"10.1145\/2660267.2660291"},{"key":"5_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/978-3-642-40041-4_20","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"D Cash","year":"2013","unstructured":"Cash, D., Jarecki, S., Jutla, C., Krawczyk, H., Ro\u015fu, M.-C., Steiner, M.: Highly-scalable searchable symmetric encryption with support for Boolean queries. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8042, pp. 353\u2013373. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40041-4_20"},{"doi-asserted-by":"crossref","unstructured":"Sun, S.F., et al.: Non-interactive multi-client searchable encryption: realization and implementation. IEEE Trans. Dependable Secur. Comput. (2020)","key":"5_CR18","DOI":"10.1109\/TDSC.2020.2973633"},{"unstructured":"National human genome research institute. https:\/\/www.genome.gov\/genetics-glossary\/Phenotype. No date","key":"5_CR19"},{"doi-asserted-by":"crossref","unstructured":"Gibson, G.: Population genetics and GWAS: a primer. PLoS Biol.\u00a016(3), e2005485 (2018)","key":"5_CR20","DOI":"10.1371\/journal.pbio.2005485"},{"issue":"6","key":"5_CR21","doi-asserted-by":"crossref","first-page":"871","DOI":"10.1093\/bioinformatics\/btw758","volume":"33","author":"F Chen","year":"2017","unstructured":"Chen, F., et al.: Princess: privacy-protecting rare disease international network collaboration via encryption through software guard extensions. Bioinformatics 33(6), 871\u2013878 (2017)","journal-title":"Bioinformatics"},{"key":"5_CR22","doi-asserted-by":"publisher","DOI":"10.1201\/9781351133036","volume-title":"Introduction to Modern Cryptography","author":"J Katz","year":"2020","unstructured":"Katz, J., Lindell, Y.: Introduction to Modern Cryptography. CRC Press, Boca Raton (2020)"},{"key":"5_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1007\/978-3-642-42045-0_15","volume-title":"Advances in Cryptology - ASIACRYPT 2013","author":"D Boneh","year":"2013","unstructured":"Boneh, D., Waters, B.: Constrained pseudorandom functions and their applications. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013. LNCS, vol. 8270, pp. 280\u2013300. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-42045-0_15"},{"key":"5_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-662-48797-6_4","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2015","author":"S Hohenberger","year":"2015","unstructured":"Hohenberger, S., Koppula, V., Waters, B.: Adaptively secure puncturable pseudorandom functions in the standard model. In: Iwata, T., Cheon, J.H. (eds.) ASIACRYPT 2015. LNCS, vol. 9452, pp. 79\u2013102. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48797-6_4"},{"key":"5_CR25","volume-title":"Database System Implementation","author":"H Garcia-Molina","year":"2000","unstructured":"Garcia-Molina, H., Ullman, J.D., Widom, J.: Database System Implementation, vol. 672. Prentice Hall, Upper Saddle River (2000)"},{"doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89\u201398 (2006)","key":"5_CR26","DOI":"10.1145\/1180405.1180418"},{"unstructured":"R. Labs: Redis, vol. 2017. https:\/\/redis.io","key":"5_CR27"},{"unstructured":"Nikitin, A.: Bloom Filter Scala, vol. 2017. https:\/\/alexandrnikitin.github.io\/blog\/bloom-filter-for-scala\/","key":"5_CR28"},{"unstructured":"Caro, A.D., Iovino, V.: JPBC: Java pairing based cryptography, pp. 850\u2013855. In: ISCC 2011. IEEE (2011)","key":"5_CR29"},{"unstructured":"The Personal Genome Project: Harvard Medical School. Title = PersonalGenomes.org. https:\/\/pgp.med.harvard.edu\/data","key":"5_CR30"},{"doi-asserted-by":"crossref","unstructured":"Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. In: Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, pp. 241\u2013264 (2019)","key":"5_CR31","DOI":"10.1145\/3335741.3335752"},{"key":"5_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-662-46497-7_1","volume-title":"Theory of Cryptography","author":"Z Brakerski","year":"2015","unstructured":"Brakerski, Z., Vaikuntanathan, V.: Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions. In: Dodis, Y., Nielsen, J.B. (eds.) TCC 2015. LNCS, vol. 9015, pp. 1\u201330. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46497-7_1"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-91356-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T01:21:19Z","timestamp":1726190479000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-91356-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030913557","9783030913564"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-91356-4_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"27 November 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isw2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/isc2021.petra.ac.id\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"87","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}