{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T08:14:31Z","timestamp":1758269671975,"version":"3.41.0"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319611754"},{"type":"electronic","value":"9783319611761"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-61176-1_10","type":"book-chapter","created":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T01:54:25Z","timestamp":1498010065000},"page":"185-204","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Privacy-Preserving Elastic Net for Data Encrypted by Different Keys - With an Application on Biomarker Discovery"],"prefix":"10.1007","author":[{"given":"Jun","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Meiqi","family":"He","sequence":"additional","affiliation":[]},{"given":"Siu-Ming","family":"Yiu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,22]]},"reference":[{"issue":"11","key":"10_CR1","doi-asserted-by":"publisher","first-page":"1770","DOI":"10.1373\/clinchem.2008.110056","volume":"54","author":"MJ Duffy","year":"2008","unstructured":"Duffy, M.J., Crown, J.: A personalized approach to cancer treatment: how biomarkers can help. Clin. Chem. 54(11), 1770\u20131779 (2008)","journal-title":"Clin. Chem."},{"issue":"7391","key":"10_CR2","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1038\/nature11003","volume":"483","author":"J Barretina","year":"2012","unstructured":"Barretina, J., Caponigro, G., Stransky, N., Venkatesan, K., Margolin, A.A., Kim, S., Wilson, C.J., Leh\u00e1r, J., Kryukov, G.V., Sonkin, D., et al.: The cancer cell line encyclopedia enables predictive modelling of anticancer drug sensitivity. Nature 483(7391), 603\u2013607 (2012)","journal-title":"Nature"},{"issue":"7391","key":"10_CR3","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1038\/nature11005","volume":"483","author":"MJ Garnett","year":"2012","unstructured":"Garnett, M.J., Edelman, E.J., Heidorn, S.J., Greenman, C.D., Dastur, A., Lau, K.W., Patricia Greninger, I., Thompson, R., Luo, X., Soares, J., et al.: Systematic identification of genomic markers of drug sensitivity in cancer cells. Nature 483(7391), 570\u2013575 (2012)","journal-title":"Nature"},{"issue":"7","key":"10_CR4","doi-asserted-by":"publisher","first-page":"e0127433","DOI":"10.1371\/journal.pone.0127433","volume":"10","author":"DG Covell","year":"2015","unstructured":"Covell, D.G.: Data mining approaches for genomic biomarker development: applications using drug screening data from the cancer genome project and the cancer cell line encyclopedia. PloS One 10(7), e0127433 (2015)","journal-title":"PloS One"},{"key":"10_CR5","unstructured":"Jang, I.S., Neto, E.C., Guinney, J., Friend, S.H., Margolin, A.A.: Systematic assessment of analytical methods for drug sensitivity prediction from cancer cell line data. In: Pacific Symposium on Biocomputing, p. 63. NIH Public Access (2014)"},{"issue":"6","key":"10_CR6","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1038\/nrg3723","volume":"15","author":"Y Erlich","year":"2014","unstructured":"Erlich, Y., Narayanan, A.: Routes for breaching and protecting genetic privacy. Nat. Rev. Genet. 15(6), 409\u2013421 (2014)","journal-title":"Nat. Rev. Genet."},{"issue":"5","key":"10_CR7","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1038\/ng.2248","volume":"44","author":"EE Schadt","year":"2012","unstructured":"Schadt, E.E., Woo, S., Hao, K.: Bayesian method to predict individual SNP genotypes from gene expression data. Nat. Rev. Genet. 44(5), 603\u2013608 (2012)","journal-title":"Nat. Rev. Genet."},{"key":"10_CR8","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1111\/j.2517-6161.1996.tb02080.x","volume":"58","author":"R Tibshirani","year":"1996","unstructured":"Tibshirani, R.: Regression shrinkage and selection via the lasso. J. Roy. Stat. Soc. Ser. B (Methodol.) 58, 267\u2013288 (1996)","journal-title":"J. Roy. Stat. Soc. Ser. B (Methodol.)"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Friedman, J., Hastie, T., Tibshirani, R.: glmnet: lasso and elastic-net regularized generalized linear models. R Package Version, 1 (2009)","DOI":"10.32614\/CRAN.package.glmnet"},{"issue":"2","key":"10_CR10","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1111\/j.1467-9868.2005.00503.x","volume":"67","author":"H Zou","year":"2005","unstructured":"Zou, H., Hastie, T.: Regularization and variable selection via the elastic net. J. Roy. Stat. Soc. Ser. B (Stat. Methodol.) 67(2), 301\u2013320 (2005)","journal-title":"J. Roy. Stat. Soc. Ser. B (Stat. Methodol.)"},{"key":"10_CR11","unstructured":"Liu, J., Ji, S., Ye, J., et al.: SLEP: sparse learning with efficient projections, vol. 6, p. 491. Arizona State University (2009)"},{"key":"10_CR12","unstructured":"Shalev-Shwartz, S., Zhang, T.: Accelerated proximal stochastic dual coordinate ascent for regularized loss minimization. In: ICML, pp. 64\u201372 (2014)"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Zhou, Q., Chen, W., Song, S., Gardner, J.R., Weinberger, K.Q., Chen, Y.: A reduction of the elastic net to support vector machines with an application to GPU computing. In: Twenty-Ninth AAAI Conference on Artificial Intelligence (2015)","DOI":"10.1609\/aaai.v29i1.9625"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Lin, K.P., Chen, M.S.: Privacy-preserving outsourcing support vector machines with random transformation. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 363\u2013372. ACM (2010)","DOI":"10.1145\/1835804.1835852"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Laur, S., Lipmaa, H., Mielik\u00e4inen, T.: Cryptographically private support vector machines. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 618\u2013624. ACM (2006)","DOI":"10.1145\/1150402.1150477"},{"issue":"1","key":"10_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1515\/jmc-2012-0007","volume":"7","author":"T Tassa","year":"2013","unstructured":"Tassa, T., Jarrous, A., Ben-Ya\u2019akov, Y.: Oblivious evaluation of multivariate polynomials. J. Math. Crypt. 7(1), 1\u201329 (2013)","journal-title":"J. Math. Crypt."},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Liu, F., Ng, W.K., Zhang, W.: Encrypted SVM for outsourced data mining. In: 2015 IEEE 8th International Conference on Cloud Computing, pp. 1085\u20131092. IEEE (2015)","DOI":"10.1109\/CLOUD.2015.158"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Yu, H., Jiang, X., Vaidya, J.: Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data. In: Proceedings of the 2006 ACM Symposium on Applied Computing, pp. 603\u2013610. ACM (2006)","DOI":"10.1145\/1141277.1141415"},{"key":"10_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1007\/11731139_74","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"H Yu","year":"2006","unstructured":"Yu, H., Vaidya, J., Jiang, X.: Privacy-preserving SVM classification on vertically partitioned data. In: Ng, W.-K., Kitsuregawa, M., Li, J., Chang, K. (eds.) PAKDD 2006. LNCS, vol. 3918, pp. 647\u2013656. Springer, Heidelberg (2006). doi:10.1007\/11731139_74"},{"issue":"2","key":"10_CR20","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s10115-007-0073-7","volume":"14","author":"J Vaidya","year":"2008","unstructured":"Vaidya, J., Hwanjo, Y., Jiang, X.: Privacy-preserving svm classification. Knowl. Inf. Syst. 14(2), 161\u2013178 (2008)","journal-title":"Knowl. Inf. Syst."},{"key":"10_CR21","first-page":"1","volume":"10","author":"M Van Dijk","year":"2010","unstructured":"Van Dijk, M., Juels, A.: On the impossibility of cryptography alone for privacy-preserving cloud computing. HotSec 10, 1\u20138 (2010)","journal-title":"HotSec"},{"key":"10_CR22","unstructured":"Chow, S.S., Lee, J.H., Subramanian, L.: Two-party computation model for privacy-preserving queries over distributed databases. In: NDSS (2009)"},{"issue":"3","key":"10_CR23","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1109\/TIFS.2012.2190726","volume":"7","author":"Z Erkin","year":"2012","unstructured":"Erkin, Z., Veugen, T., Toft, T., Lagendijk, R.L.: Generating private recommendations efficiently using homomorphic encryption and data packing. IEEE Trans. Inf. Forensics Secur. 7(3), 1053\u20131066 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Demmler, D., Schneider, T., Zohner, M.: ABY-A framework for efficient mixed-protocol secure two-party computation. In: NDSS (2015)","DOI":"10.14722\/ndss.2015.23113"},{"key":"10_CR25","unstructured":"Pedersen, T.B., Sayg\u0131n, Y., Sava\u015f, E.: Secret charing vs. encryption-based techniques for privacy preserving data mining (2007)"},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"L\u00f3pez-Alt, A., Tromer, E., Vaikuntanathan, V.: On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In: Proceedings of the Forty-Fourth Annual ACM Symposium on Theory of Computing, pp. 1219\u20131234. ACM (2012)","DOI":"10.1145\/2213977.2214086"},{"issue":"12","key":"10_CR27","doi-asserted-by":"publisher","first-page":"2046","DOI":"10.1109\/TIFS.2013.2288131","volume":"8","author":"A Peter","year":"2013","unstructured":"Peter, A., Tews, E., Katzenbeisser, S.: Efficiently outsourcing multiparty computation under multiple keys. IEEE Trans. Inf. Forensics Secur. 8(12), 2046\u20132058 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Wang, B., Li, M., Chow, S.S., Li, H.: Computing encrypted cloud data efficiently under multiple keys. In: 2013 IEEE Conference on Communications and Network Security (CNS), pp. 504\u2013513. IEEE (2013)","DOI":"10.1109\/CNS.2013.6682768"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Wang, B., Li, M., Chow, S.S., Li, H.: A tale of two clouds: computing on data encrypted under multiple keys. In: 2014 IEEE Conference on Communications and Network Security (CNS), pp. 337\u2013345. IEEE (2014)","DOI":"10.1109\/CNS.2014.6997502"},{"key":"10_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/BFb0054122","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201998","author":"M Blaze","year":"1998","unstructured":"Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127\u2013144. Springer, Heidelberg (1998). doi:10.1007\/BFb0054122"},{"key":"10_CR31","doi-asserted-by":"crossref","unstructured":"Catalano, D., Fiore, D.: Using linearly-homomorphic encryption to evaluate degree-2 functions on encrypted data. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1518\u20131529. ACM (2015)","DOI":"10.1145\/2810103.2813624"},{"key":"10_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-540-40061-5_3","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"E Bresson","year":"2003","unstructured":"Bresson, E., Catalano, D., Pointcheval, D.: A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 37\u201354. Springer, Heidelberg (2003). doi:10.1007\/978-3-540-40061-5_3"},{"issue":"D1","key":"10_CR33","doi-asserted-by":"publisher","first-page":"D955","DOI":"10.1093\/nar\/gks1111","volume":"41","author":"W Yang","year":"2013","unstructured":"Yang, W., Soares, J., Greninger, P., Edelman, E.J., Lightfoot, H., Forbes, S., Bindal, N., Beare, D., Smith, J.A., Richard Thompson, I., et al.: Genomics of drug sensitivity in cancer (GDSC): a resource for therapeutic biomarker discovery in cancer cells. Nucleic Acids Res. 41(D1), D955\u2013D961 (2013)","journal-title":"Nucleic Acids Res."},{"key":"10_CR34","first-page":"1","volume-title":"Regularization, Optimization, Kernels, and Support Vector Machines","author":"M Jaggi","year":"2014","unstructured":"Jaggi, M.: An equivalence between the Lasso and support vector machines. In: Argyriou, A., Signoretto, M., Suykens, J.A.K. (eds.) Regularization, Optimization, Kernels, and Support Vector Machines, pp. 1\u201326. Taylor & Francis, Boca Raton (2014)"},{"key":"10_CR35","doi-asserted-by":"crossref","unstructured":"Zhou, H., Wornell, G.: Efficient homomorphic encryption on integer vectors and its applications. In: Information Theory and Applications Workshop (ITA 2014), pp. 1\u20139. IEEE (2014)","DOI":"10.1109\/ITA.2014.6804228"},{"key":"10_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-540-30576-7_18","volume-title":"Theory of Cryptography","author":"D Boneh","year":"2005","unstructured":"Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325\u2013341. Springer, Heidelberg (2005). doi:10.1007\/978-3-540-30576-7_18"},{"issue":"2","key":"10_CR37","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s11222-009-9153-8","volume":"21","author":"T Fushiki","year":"2011","unstructured":"Fushiki, T.: Estimation of prediction error by using k-fold cross-validation. Stat. Comput. 21(2), 137\u2013146 (2011)","journal-title":"Stat. Comput."},{"key":"10_CR38","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721656","volume-title":"Foundations of Cryptography: Basic Applications","author":"O Goldreich","year":"2004","unstructured":"Goldreich, O.: Foundations of Cryptography: Basic Applications, vol. 2. Cambridge University Press, Cambridge (2004)"},{"key":"10_CR39","doi-asserted-by":"crossref","unstructured":"Wong, W.K., Cheung, D.W.L., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, pp. 139\u2013152. ACM (2009)","DOI":"10.1145\/1559845.1559862"},{"key":"10_CR40","unstructured":"Halevi, S., Shoup, V.: An implementation of homomorphic encryption. https:\/\/github.com\/shaih\/HElib"},{"key":"10_CR41","first-page":"1493","volume":"7","author":"SS Keerthi","year":"2006","unstructured":"Keerthi, S.S., Chapelle, O., DeCoste, D.: Building support vector machines with reduced classifier complexity. J. Mach. Learn. Res. 7, 1493\u20131515 (2006)","journal-title":"J. Mach. Learn. Res."},{"key":"10_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/3-540-46766-1_9","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201991","author":"TP Pedersen","year":"1992","unstructured":"Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129\u2013140. Springer, Heidelberg (1992). doi:10.1007\/3-540-46766-1_9"},{"key":"10_CR43","doi-asserted-by":"crossref","unstructured":"Hsieh, C.-J., Chang, K.-W., Lin, C.-J., Keerthi, S.S., Sundararajan, S.: A dual coordinate descent method for large-scale linear SVM. In: Proceedings of the 25th International Conference on Machine Learning, pp. 408\u2013415. ACM (2008)","DOI":"10.1145\/1390156.1390208"},{"key":"10_CR44","unstructured":"Tyree, S., Gardner, J.R., Weinberger, K.Q., Agrawal, K., Tran, J.: Parallel support vector machines in practice. arXiv preprint arXiv:1404.1066 (2014)"},{"issue":"5","key":"10_CR45","doi-asserted-by":"publisher","first-page":"1155","DOI":"10.1162\/neco.2007.19.5.1155","volume":"19","author":"O Chapelle","year":"2007","unstructured":"Chapelle, O.: Training a support vector machine in the primal. Neural Comput. 19(5), 1155\u20131178 (2007)","journal-title":"Neural Comput."}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXXI"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61176-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T21:06:35Z","timestamp":1750367195000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-61176-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319611754","9783319611761"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61176-1_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"22 June 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DBSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Annual Conference on Data and Applications Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Philadelphia","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dbsec2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dbsec2017.ittc.ku.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}