{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T04:05:50Z","timestamp":1769054750197,"version":"3.49.0"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2019,2,18]],"date-time":"2019-02-18T00:00:00Z","timestamp":1550448000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s00607-019-00711-w","type":"journal-article","created":{"date-parts":[[2019,2,18]],"date-time":"2019-02-18T09:54:50Z","timestamp":1550483690000},"page":"1813-1836","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Homomorphically encrypted k-means on cloud-hosted servers with low client-side load"],"prefix":"10.1007","volume":"101","author":[{"given":"Georgios","family":"Sakellariou","sequence":"first","affiliation":[]},{"given":"Anastasios","family":"Gounaris","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,18]]},"reference":[{"key":"711_CR1","first-page":"274","volume-title":"K-means clustering using homomorphic encryption and an updatable distance matrix: secure third party data clustering with limited data owner interaction","author":"N Almutairi","year":"2017","unstructured":"Almutairi N, Coenen F, Dures K (2017) K-means clustering using homomorphic encryption and an updatable distance matrix: secure third party data clustering with limited data owner interaction. Springer, Cham, pp 274\u2013285"},{"issue":"2","key":"711_CR2","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/s00145-009-9040-7","volume":"23","author":"Y Aumann","year":"2010","unstructured":"Aumann Y, Lindell Y (2010) Security against covert adversaries: efficient protocols for realistic adversaries. J Cryptol 23(2):281\u2013343","journal-title":"J Cryptol"},{"issue":"2","key":"711_CR3","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MC.2016.59","volume":"49","author":"M Barhamgi","year":"2016","unstructured":"Barhamgi M, Bandara AK, Yijun Y, Belhajjame K, Nuseibeh B (2016) Protecting privacy in the cloud: current practices, future directions. IEEE Comput 49(2):68\u201372","journal-title":"IEEE Comput"},{"key":"711_CR4","doi-asserted-by":"crossref","unstructured":"Brakerski Z (2012) Fully homomorphic encryption without modulus switching from classical GapSVP. In: Lecture notes in computer science (including subseries Lecture notes in artificial intelligence and lecture notes in bioinformatics)","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"711_CR5","doi-asserted-by":"crossref","unstructured":"Brakerski Z, Gentry C, Vaikuntanathan V (2012) Fully homomorphic encryption without bootstrapping. In: Innovations in theoretical computer science","DOI":"10.1145\/2090236.2090262"},{"key":"711_CR6","doi-asserted-by":"crossref","unstructured":"Brakerski Z, Vaikuntanathan V (2011) Efficient fully homomorphic encryption from (standard) LWE. In: 2011 IEEE 52nd annual symposium on foundations of computer science. IEEE, pp 97\u2013106","DOI":"10.1109\/FOCS.2011.12"},{"key":"711_CR7","doi-asserted-by":"crossref","unstructured":"Bunn P, Ostrovsky R (2007) Secure two-party k-means clustering. In: Proceedings of the 14th ACM conference on Computer and communications security\u2014CCS \u201907, New York, New York, USA. ACM Press, p 486","DOI":"10.1145\/1315245.1315306"},{"key":"711_CR8","unstructured":"David W (2017) FHE-SI: Implementation of Brakerski\u2019s leveled homomorphic encryption system. \n                    https:\/\/github.com\/dwu4\/fhe-si\n                    \n                  . Accessed 11 Aug 2018"},{"issue":"4","key":"711_CR9","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T Elgamal","year":"1985","unstructured":"Elgamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469\u2013472","journal-title":"IEEE Trans Inf Theory"},{"key":"711_CR10","doi-asserted-by":"crossref","unstructured":"Gentry C (2009) Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st annual ACM symposium on symposium on theory of computing\u2014STOC \u201909","DOI":"10.1145\/1536414.1536440"},{"key":"711_CR11","doi-asserted-by":"crossref","unstructured":"Gentry C, Halevi S (2011) Implementing gentry\u2019s fully-homomorphic encryption scheme. In: Lecture notes in computer science (including subseries Lecture notes in artificial intelligence and lecture notes in bioinformatics)","DOI":"10.1007\/978-3-642-20465-4_9"},{"key":"711_CR12","doi-asserted-by":"crossref","unstructured":"Gentry C, Halevi S, Smart NP (2012) Homomorphic evaluation of the AES circuit. In: Lecture notes in computer science (including subseries Lecture notes in artificial intelligence and lecture notes in bioinformatics)","DOI":"10.1007\/978-3-642-32009-5_49"},{"issue":"1","key":"711_CR13","first-page":"59","volume":"1","author":"Y Lindell","year":"2009","unstructured":"Lindell Y, Pinkas B (2009) Secure multiparty computation for privacy-preserving data mining. J Priv Confid 1(1):59\u201398","journal-title":"J Priv Confid"},{"key":"711_CR14","unstructured":"Liu D (2013) International Patent Application No.: PCT\/AU2013\/000674. Accessible via \n                    http:\/\/patentscope.wipo.int\/search\/en\/WO2013188929\n                    \n                  . Accessed 11 Aug 2018"},{"key":"711_CR15","doi-asserted-by":"crossref","unstructured":"Liu D, Bertino E, Yi X (2014) Privacy of outsourced k-means clustering. In: 9th ACM symposium on information, computer and communications security, ASIA CCS \u201914, Kyoto, Japan, 03\u201306 June 2014, pp 123\u2013134","DOI":"10.1145\/2590296.2590332"},{"key":"711_CR16","unstructured":"Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. \n                    www.Bitcoin.org\n                    \n                  . Accessed 11 Aug 2018"},{"issue":"2","key":"711_CR17","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1109\/TKDE.2006.31","volume":"18","author":"C Ordonez","year":"2006","unstructured":"Ordonez C (2006) Integrating K-means clustering with a relational DBMS using SQL. IEEE Trans Knowl Data Eng 18(2):188\u2013201","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"711_CR18","unstructured":"Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Lecture notes in computer science (including subseries Lecture notes in artificial intelligence and lecture notes in bioinformatics)"},{"key":"711_CR19","doi-asserted-by":"crossref","unstructured":"Popa RA, Redfield CMS, Zeldovich N, Balakrishnan H (2011) Cryptdb: protecting confidentiality with encrypted query processing. In: Proceedings of the 23rd ACM symposium on operating systems principles 2011, SOSP 2011, Cascais, Portugal, 23\u201326 October 2011, pp 85\u2013100","DOI":"10.1145\/2043556.2043566"},{"key":"711_CR20","unstructured":"Rao F-Y, Samanthula BK, Bertino E, Yi X, Liu D (2015) Privacy-preserving and outsourced multi-user k-means clustering. In: IEEE conference on collaboration and internet computing, CIC 2015, Hangzhou, China, 27\u201330 October 2015, pp 80\u201389"},{"key":"711_CR21","doi-asserted-by":"crossref","unstructured":"Samet S, Miri A (2008) Privacy preserving ID3 using Gini index over horizontally partitioned data. In: 2008 IEEE\/ACS international conference on computer systems and applications. IEEE, pp 645\u2013651","DOI":"10.1109\/AICCSA.2008.4493598"},{"key":"711_CR22","unstructured":"Samet S, Miri A, Orozco-Barbosa L (2007) Privacy preserving k-means clustering in multi-party environment. In: SECRYPT, pp 381\u2013385"},{"key":"711_CR23","unstructured":"Shai H, Victor S (2018) HElib: An implementation of homomorphic encryption. \n                    https:\/\/github.com\/shaih\/HElib\n                    \n                  . Accessed 11 Aug 2018"},{"key":"711_CR24","doi-asserted-by":"crossref","unstructured":"Theodouli A, Draziotis KA, Gounaris A (2017) Implementing private k-means clustering using a LWE-based cryptosystem. In: 2017 IEEE symposium on computers and communications, ISCC 2017, Heraklion, Greece, 3\u20136 July 2017, pp 88\u201393","DOI":"10.1109\/ISCC.2017.8024510"},{"key":"711_CR25","doi-asserted-by":"crossref","unstructured":"Tu S, Frans KM, Madden S, Zeldovich N (2013) Processing analytical queries over encrypted data. In: Proceedings of the VLDB Endowment","DOI":"10.14778\/2535573.2488336"},{"key":"711_CR26","doi-asserted-by":"crossref","unstructured":"Vaidya J, Clifton C (2003) Privacy-preserving k-means clustering over vertically partitioned data. In: Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, pp 206\u2013215","DOI":"10.1145\/956750.956776"},{"key":"711_CR27","unstructured":"Wu D, Haven J (2012) Using homomorphic encryption for large scale statistical analysis. Technical Report from \n                    https:\/\/crypto.stanford.edu\/~dwu4\/papers\/FHE-SI_Report.pdf\n                    \n                  . Accessed 11 Aug 2018"},{"issue":"4","key":"711_CR28","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","volume":"14","author":"Z Zheng","year":"2018","unstructured":"Zheng Z, Xie S, Dai H-N, Wang H (2018) Blockchain challenges and opportunities: a survey. Int J Web Grid Serv 14(4):352\u2013375","journal-title":"Int J Web Grid Serv"},{"key":"711_CR29","unstructured":"Zyskind G, Nathan O, Pentland AS (2015) Decentralizing privacy: using blockchain to protect personal data. In: Proceedings, IEEE security and privacy workshops. SPW 2015:2015"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00607-019-00711-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-019-00711-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-019-00711-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,18]],"date-time":"2020-02-18T10:52:58Z","timestamp":1582023178000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00607-019-00711-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,18]]},"references-count":29,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["711"],"URL":"https:\/\/doi.org\/10.1007\/s00607-019-00711-w","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2,18]]},"assertion":[{"value":"11 August 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 February 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}