{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:32:32Z","timestamp":1743060752111,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":36,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811668890"},{"type":"electronic","value":"9789811668906"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-6890-6_8","type":"book-chapter","created":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T14:02:28Z","timestamp":1646488948000},"page":"93-107","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Encrypted Operator Design with Domain Aware Practical Performance Improvement"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7308-6787","authenticated-orcid":false,"given":"Ayan","family":"Ghosh","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7768-6499","authenticated-orcid":false,"given":"Abhishek","family":"Raj","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6368-0718","authenticated-orcid":false,"given":"Ayantika","family":"Chatterjee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,6]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Van\u00a0Dijk M, Gentry C, Halevi S, Vaikuntanathan V (2010) Fully homomorphic encryption over the integers. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 24\u201343","DOI":"10.1007\/978-3-642-13190-5_2"},{"issue":"3","key":"8_CR2","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1109\/TSC.2017.2711018","volume":"13","author":"A Chatterjee","year":"2020","unstructured":"Chatterjee A, Sengupta I (2020) Sorting of fully homomorphic encrypted cloud data: can partitioning be effective? IEEE Trans Serv Comput 13(3):545\u2013558","journal-title":"IEEE Trans Serv Comput"},{"issue":"1","key":"8_CR3","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1109\/TCC.2015.2481416","volume":"6","author":"Ayantika Chatterjee","year":"2015","unstructured":"Chatterjee Ayantika, Sengupta Indranil (2015) Translating algorithms to handle fully homomorphic encrypted data on the cloud. IEEE Trans Cloud Comput 6(1):287\u2013300","journal-title":"IEEE Trans Cloud Comput"},{"issue":"1","key":"8_CR4","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1890\/0012-9658(2003)084[0252:PGISAT]2.0.CO;2","volume":"84","author":"R Law","year":"2003","unstructured":"Law R, Murrell DJ, Dieckmann U (2003) Population growth in space and time: spatial logistic equations. Ecology 84(1):252\u2013262","journal-title":"Ecology"},{"key":"8_CR5","unstructured":"Nwankpa C, Ijomah W, Gachagan A, Marshall S (2018) Activation functions: comparison of trends in practice and research for deep learning. arXiv:1811.03378"},{"issue":"6","key":"8_CR6","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1080\/03081070600687668","volume":"35","author":"J Liang","year":"2006","unstructured":"Liang J, Shi Z, Li D, Wierman MJ (2006) Information entropy, rough entropy and knowledge granulation in incomplete information systems. Int J Gen Syst 35(6):641\u2013654","journal-title":"Int J Gen Syst"},{"issue":"4","key":"8_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3214303","volume":"51","author":"A Acar","year":"2018","unstructured":"Acar A, Aksu H, Selcuk Uluagac A, Conti M (2018) A survey on homomorphic encryption schemes: theory and implementation. ACM Comput Surv (CSUR) 51(4):1\u201335","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"1","key":"8_CR8","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00145-019-09319-x","volume":"33","author":"Ilaria Chillotti","year":"2020","unstructured":"Chillotti Ilaria, Gama Nicolas, Georgieva Mariya, Izabach\u00e8ne Malika (2020) Tfhe: fast fully homomorphic encryption over the torus. J Cryptol 33(1):34\u201391","journal-title":"J Cryptol"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Chen H, Laine K, Player R (2017) Simple encrypted arithmetic library-seal v2. 1. In: International Conference on Financial Cryptography and Data Security. Springer, pp 3\u201318","DOI":"10.1007\/978-3-319-70278-0_1"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Ada Popa R, Redfield CMS, Zeldovich N, Balakrishnan H (2011) Cryptdb: protecting confidentiality with encrypted query processing. In: Proceedings of the twenty-third ACM symposium on operating systems principles, pp 85\u2013100","DOI":"10.1145\/2043556.2043566"},{"key":"8_CR11","unstructured":"Egorov M, Wilkison M (2016) Zerodb white paper. arXiv:1602.07168"},{"key":"8_CR12","unstructured":"Papadimitriou A, Bhagwan R, Chandran N, Ramjee R, Haeberlen A, Singh H, Modi A, Badrinarayanan S (2016) Big data analytics over encrypted datasets with seabed. In: 12th $$\\{$$USENIX$$\\}$$ symposium on operating systems design and implementation ($$\\{$$OSDI$$\\}$$ 16), pp 587\u2013602"},{"key":"8_CR13","unstructured":"Robb D (2020) Always encrypted: Database security product overview and analysis. https:\/\/www.esecurityplanet.com\/products\/always-encrypted-database-security.html. Accessed: 2020-03-03"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Grubbs P, Ristenpart T, Shmatikov T (2017) Why your encrypted database is not secure. In: Proceedings of the 16th workshop on hot topics in operating systems, pp 162\u2013168","DOI":"10.1145\/3102980.3103007"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Pisa PS, Abdalla M, Duarte OCMB (2012) Somewhat homomorphic encryption scheme for arithmetic operations on large integers. In: 2012 global information infrastructure and networking symposium (GIIS), pp 1\u20138","DOI":"10.1109\/GIIS.2012.6466769"},{"issue":"8","key":"8_CR16","doi-asserted-by":"publisher","first-page":"3590","DOI":"10.1109\/TII.2017.2780885","volume":"14","author":"K Gai","year":"2018","unstructured":"Gai K, Qiu M (2018) Blend arithmetic operations on tensor-based fully homomorphic encryption over real numbers. IEEE Trans Ind Inform 14(8):3590\u20133598","journal-title":"IEEE Trans Ind Inform"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Cheon JH, Kim A, Kim M, Song Y (2017) Homomorphic encryption for arithmetic of approximate numbers. In: Takagi T, Peyrin T (eds) Advances in cryptology \u2013 ASIACRYPT 2017. Springer International Publishing, Cham, pp 409\u2013437","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Kepner J, Gadepally V, Michaleas P, Schear N, Varia M, Yerukhimovich A, Cunningham RK (2014) Computing on masked data: a high performance method for improving big data veracity. In: 2014 IEEE high performance extreme computing conference (HPEC), pp 1\u20136","DOI":"10.1109\/HPEC.2014.7040946"},{"issue":"2","key":"8_CR19","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MCC.2016.30","volume":"3","author":"H Kumarage","year":"2016","unstructured":"Kumarage H, Khalil I, Alabdulatif A, Tari Z, Yi X (2016) Secure data analytics for cloud-integrated internet of things applications. IEEE Cloud Comput 3(2):46\u201356","journal-title":"IEEE Cloud Comput"},{"key":"8_CR20","unstructured":"Gilad-Bachrach R, Dowlin N, Laine K, Lauter K, Naehrig M, Wernsing J (2016) Cryptonets: applying neural networks to encrypted data with high throughput and accuracy. In: International conference on machine learning, pp 201\u2013210"},{"key":"8_CR21","unstructured":"Microsoft (2020) Arithmetic operators. https:\/\/docs.microsoft.com\/en-us\/sql\/mdx\/arithmetic-operators?view=sql-server-ver15. Accessed: 2020-01-30"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Chatterjee A, Kaushal M, Sengupta I (2013) Accelerating sorting of fully homomorphic encrypted data. In: International conference on cryptology in India. Springer, pp 262\u2013273","DOI":"10.1007\/978-3-319-03515-4_17"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Bos JW, Lauter K, Naehrig M (2014) Private predictive analysis on encrypted medical data. J Biomed Inform 50:234\u2013243","DOI":"10.1016\/j.jbi.2014.04.003"},{"issue":"3","key":"8_CR24","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1145\/321281.321282","volume":"12","author":"W Fraser","year":"1965","unstructured":"Fraser W (1965) A survey of methods of computing minimax and near-minimax polynomial approximations for functions of a single independent variable. J ACM (JACM) 12(3):295\u2013314","journal-title":"J ACM (JACM)"},{"key":"8_CR25","unstructured":"Remes Eugene (1934) Sur le calcul effectif des polynomes d\u2019approximation de tchebichef. CR Acad. Sci. Paris 199:337\u2013340"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Cheon JH, Jeong J, Lee J, Lee K (2017) Privacy-preserving computations of predictive medical models with minimax approximation and non-adjacent form. In: International conference on financial cryptography and data security. Springer, pp 53\u201374","DOI":"10.1007\/978-3-319-70278-0_4"},{"issue":"4","key":"8_CR27","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1186\/s12920-018-0397-z","volume":"11","author":"Hao Chen","year":"2018","unstructured":"Chen Hao, Gilad-Bachrach Ran, Han Kyoohyung, Huang Zhicong, Jalali Amir, Laine Kim, Lauter Kristin (2018) Logistic regression over encrypted data from fully homomorphic encryption. BMC Med Genomics 11(4):81","journal-title":"BMC Med Genomics"},{"key":"8_CR28","unstructured":"Kayaer K, Yildirim T, et\u00a0al (2003) Medical diagnosis on pima indian diabetes using general regression neural networks. In: Proceedings of the international conference on artificial neural networks and neural information processing (ICANN\/ICONIP), vol 181, pp 184"},{"issue":"4","key":"8_CR29","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1287\/opre.43.4.570","volume":"43","author":"OL Mangasarian","year":"1995","unstructured":"Mangasarian OL, Nick Street W, Wolberg WH (1995) Breast cancer diagnosis and prognosis via linear programming. Oper Res 43(4):570\u2013577","journal-title":"Oper Res"},{"key":"8_CR30","doi-asserted-by":"crossref","unstructured":"Landwehr JM, Pregibon D, Shoemaker AC (1984) Graphical methods for assessing logistic regression models. J Am Stat Assoc 79(385):61\u201371","DOI":"10.1080\/01621459.1984.10477062"},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"Borowik G (2014) Data mining approach for decision and classification systems using logic synthesis algorithms. In: Advanced methods and applications in computational intelligence. Springer, pp 3\u201323","DOI":"10.1007\/978-3-319-01436-4_1"},{"key":"8_CR32","doi-asserted-by":"crossref","unstructured":"\u00dcbeyli ED, Do\u011fdu E (2010) Automatic detection of erythemato-squamous diseases using k-means clustering. J Med Syst 34(2):179\u2013184","DOI":"10.1007\/s10916-008-9229-6"},{"key":"8_CR33","doi-asserted-by":"crossref","unstructured":"Vui CS, Soon GK, On CK, Alfred R, Anthony P (2013) A review of stock market prediction with artificial neural network (ann). In: 2013 IEEE international conference on control system, computing and engineering. IEEE, pp 477\u2013482","DOI":"10.1109\/ICCSCE.2013.6720012"},{"key":"8_CR34","doi-asserted-by":"crossref","unstructured":"Nur Ozkan-Gunay E, Ozkan M (2007) Prediction of bank failures in emerging financial markets: an ann approach. J Risk Financ","DOI":"10.1108\/15265940710834753"},{"key":"8_CR35","doi-asserted-by":"crossref","unstructured":"Sahin Y, Duman E (2011) Detecting credit card fraud by ann and logistic regression. In: 2011 international symposium on innovations in intelligent systems and applications. IEEE, pp 315\u2013319","DOI":"10.1109\/INISTA.2011.5946108"},{"issue":"1","key":"8_CR36","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/99.660313","volume":"5","author":"Leonardo Dagum","year":"1998","unstructured":"Dagum Leonardo, Menon Ramesh (1998) Openmp: an industry standard api for shared-memory programming. IEEE Comput Sci Eng 5(1):46\u201355","journal-title":"IEEE Comput Sci Eng"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Seventh International Conference on Mathematics and Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-6890-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T14:03:28Z","timestamp":1646489008000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-6890-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811668890","9789811668906"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-6890-6_8","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"6 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}