{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T07:15:55Z","timestamp":1770707755494,"version":"3.49.0"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2016,9,23]],"date-time":"2016-09-23T00:00:00Z","timestamp":1474588800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,9,23]],"date-time":"2016-09-23T00:00:00Z","timestamp":1474588800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000083","name":"Directorate for Computer and Information Science and Engineering","doi-asserted-by":"publisher","award":["1223699"],"award-info":[{"award-number":["1223699"]}],"id":[{"id":"10.13039\/100000083","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1007\/s10207-016-0350-0","type":"journal-article","created":{"date-parts":[[2016,9,23]],"date-time":"2016-09-23T07:56:37Z","timestamp":1474617397000},"page":"577-601","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model"],"prefix":"10.1007","volume":"16","author":[{"given":"Mehrdad","family":"Aliasgari","sequence":"first","affiliation":[]},{"given":"Marina","family":"Blanton","sequence":"additional","affiliation":[]},{"given":"Fattaneh","family":"Bayatbabolghani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,23]]},"reference":[{"key":"350_CR1","unstructured":"Aliasgari, M., Blanton, M.: Secure computation of hidden markov models. In: International Conference on Security and Cryptography (SECRYPT) (2013)"},{"key":"350_CR2","unstructured":"Aliasgari, M., Blanton, M., Zhang, Y., Steele, A.: Secure computation on floating point numbers. In: Network and Distributed System Security Symposium (NDSS) (2013)"},{"key":"350_CR3","doi-asserted-by":"crossref","unstructured":"Asharov, G., Lindell, Y., Rabin, T.: Perfectly-secure multiplication for any $$t < n\/3$$. In: CRYPTO (2011)","DOI":"10.1007\/978-3-642-22792-9_14"},{"key":"350_CR4","unstructured":"Bansal, P., Kant, A., Kumar, S., Sharda, A., Gupta, S.: Improved hybrid model of HMM\/GMM for speech recognition. In: Book 5 Intelligent Technologies and Applications. Institute of Information Theories and Applications FOI ITHEA (2008)"},{"key":"350_CR5","doi-asserted-by":"crossref","unstructured":"Baudron, O., Fouque, P.-A., Pointcheval, D., Stern, J., Poupard, G.: Practical multi-candidate election scheme. In: ACM Symposium on Principles of Distributed Computing (PODC), pp. 274\u2013283 (2001)","DOI":"10.1145\/383962.384044"},{"key":"350_CR6","unstructured":"Blanton, M., Aguiar, E.: Private and oblivious set and multiset operations. Int. J. Inf. Secur. 15, 1\u201326 (2016)"},{"key":"350_CR7","doi-asserted-by":"crossref","unstructured":"Blanton, M., Gasti, P.: Secure and efficient protocols for iris and fingerprint identification. In: European Symposium on Research in Computer Security (ESORICS), pp. 190\u2013209 (2011)","DOI":"10.1007\/978-3-642-23822-2_11"},{"key":"350_CR8","unstructured":"Camenisch, J., Stadler, M.: Proof systems for general statements about discrete logarithms. Technical Report TR260, Institute for Theoretical Computer Science, ETH Zurich (1997)"},{"issue":"1","key":"350_CR9","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s001459910006","volume":"13","author":"R Canetti","year":"2000","unstructured":"Canetti, R.: Security and composition of multiparty cryptographic protocols. J. Cryptol. 13(1), 143\u2013202 (2000)","journal-title":"J. Cryptol."},{"key":"350_CR10","doi-asserted-by":"crossref","unstructured":"Catrina, O. and de Hoogh, S.: Improved primitives for secure multiparty integer computation. In: Security and Cryptography for Networks (SCN), pp. 182\u2013199 (2010)","DOI":"10.1007\/978-3-642-15317-4_13"},{"key":"350_CR11","doi-asserted-by":"crossref","unstructured":"Catrina, O., Saxena, A.: Secure computation with fixed-point numbers. In: Financial Cryptography and Data Security (FC), pp. 35\u201350 (2010)","DOI":"10.1007\/978-3-642-14577-3_6"},{"key":"350_CR12","unstructured":"CertiVox: Multiprecision Integer and Rational Arithmetic Cryptographic Library (MIRACL). \n                    http:\/\/www.certivox.com\/miracl\/"},{"key":"350_CR13","doi-asserted-by":"crossref","unstructured":"Cramer,R., Damg\u00e5rd, I., Nielsen, J.: Multiparty computation from threshold homomorphic encryption. In: Advances in Cryptology\u2014EUROCRYPT, pp. 280\u2013289 (2001)","DOI":"10.1007\/3-540-44987-6_18"},{"key":"350_CR14","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd, I., Ishai, Y., Kr\u00f8igaard, M.: Perfectly secure multiparty computation and the computational overhead of cryptography. In: Advances in Cryptology\u2014EUROCRYPT, pp. 445\u2013465 (2010)","DOI":"10.1007\/978-3-642-13190-5_23"},{"key":"350_CR15","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd, I., Jurik, M.: A generalisation, a simplification and some applications of Paillier\u2019s probabilistic public-key system. In: International Workshop on Practice and Theory in Public Key Cryptography (PKC), pp. 119\u2013136 (2001)","DOI":"10.1007\/3-540-44586-2_9"},{"key":"350_CR16","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd, I., Nielsen, J.: Universally composable efficient multiparty computation from threshold homomorphic encryption. In: Advances in Cryptology\u2014CRYPTO, pp. 247\u2013264 (2003)","DOI":"10.1007\/978-3-540-45146-4_15"},{"key":"350_CR17","doi-asserted-by":"crossref","unstructured":"Franz, M.: Secure Computations on Non-integer Values. Ph.D. thesis, TU Darmstadt (2011)","DOI":"10.1109\/WIFS.2010.5711458"},{"key":"350_CR18","doi-asserted-by":"crossref","unstructured":"Franz, M., Deiseroth, B., Hamacher, K., Jha, S., Katzenbeisser, S., Schr\u00f6der, H.: Towards secure bioinformatics services (short paper). In: Financial Cryptography and Data Security (FC), pp. 276\u2013283. Springer, New York (2012)","DOI":"10.1007\/978-3-642-27576-0_23"},{"key":"350_CR19","doi-asserted-by":"crossref","unstructured":"Gennaro, R., Rabin, M., Rabin, T.: Simplified VSS and fast-track multiparty computations with applications to threshold cryptography. In: ACM Symposium on Principles of Distributed Computing (PODC), pp. 101\u2013111 (1998)","DOI":"10.1145\/277697.277716"},{"key":"350_CR20","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721656","volume-title":"Foundations of Cryptography: Basic Applications","author":"O Goldreich","year":"2004","unstructured":"Goldreich, O.: Foundations of Cryptography: Basic Applications, vol. 2. Cambridge University Press, Cambridge (2004)"},{"key":"350_CR21","unstructured":"GMP\u2014The GNU Multiple Precision Arithmetic Library. \n                    http:\/\/www.gmplib.org"},{"issue":"1","key":"350_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF00195207","volume":"7","author":"O Goldreich","year":"1994","unstructured":"Goldreich, O., Oren, Y.: Definitions and properties of zero-knowledge proof systems. J. Cryptol. 7(1), 1\u201332 (1994)","journal-title":"J. Cryptol."},{"key":"350_CR23","doi-asserted-by":"crossref","unstructured":"Kerschbaum, F., Biswas, D., de\u00a0Hoogh, S.: Performance comparison of secure comparison protocols. In: International Workshop on Database and Expert Systems Application (DEXA), pp. 133\u2013136 (2009)","DOI":"10.1109\/DEXA.2009.37"},{"key":"350_CR24","doi-asserted-by":"crossref","unstructured":"Lipmaa, H., Asokan, N., Niemi, V.: Secure Vickrey auctions without threshold trust. In: Financial Cryptography (FC), pp. 87\u2013101 (2002)","DOI":"10.1007\/3-540-36504-4_7"},{"key":"350_CR25","doi-asserted-by":"crossref","unstructured":"Matsui, T., Furui, S.: Speaker adaptation of tied-mixture-based phoneme models for text-prompted speaker recognition. In: IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), vol.\u00a01, pp. 125\u2013128 (1994)","DOI":"10.1109\/ICASSP.1993.319321"},{"key":"350_CR26","doi-asserted-by":"crossref","unstructured":"Nguyen, H., Roughan, M.: Multi-observer privacy-preserving hidden markov models. In: Network Operations and Management Symposium (NOMS), pp. 514\u2013517 (2012)","DOI":"10.1109\/NOMS.2012.6211944"},{"key":"350_CR27","doi-asserted-by":"crossref","unstructured":"Nguyen, H., Roughan, M.: On the identifiability of multi-observer hidden markov models. In: International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1873\u20131876 (2012)","DOI":"10.1109\/ICASSP.2012.6288268"},{"key":"350_CR28","unstructured":"OpenSSL: The Open Source Toolkit for SSL\/TLS. \n                    http:\/\/www.openssl.org"},{"key":"350_CR29","doi-asserted-by":"crossref","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Advances in Cryptology\u2014EUROCRYPT, pp. 223\u2013238 (1999)","DOI":"10.1007\/3-540-48910-X_16"},{"key":"350_CR30","doi-asserted-by":"crossref","unstructured":"Pathak, M., Portelo, J., Raj, B., Trancoso, I.: Privacy-preserving speaker authentication. In: Information Security Conference (ISC), pp. 1\u201322 (2012)","DOI":"10.1007\/978-3-642-33383-5_1"},{"key":"350_CR31","doi-asserted-by":"crossref","unstructured":"Pathak, M., Raj, B.: Privacy preserving speaker verification using adapted GMMs. In: Interspeech, pp. 2405\u20132408 (2011)","DOI":"10.1109\/ICASSP.2012.6288262"},{"issue":"2","key":"350_CR32","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MSP.2012.2230222","volume":"30","author":"M Pathak","year":"2013","unstructured":"Pathak, M., Raj, B., Rane, S., Saragdis, P.: Privacy-preserving speech processing: cryptographic and string-matching frameworks show promise. IEEE Signal Process. Mag. 30(2), 62\u201374 (2013)","journal-title":"IEEE Signal Process. Mag."},{"key":"350_CR33","doi-asserted-by":"crossref","unstructured":"Pathak, M., Rane, S., Sun, W., Raj, B.: Privacy preserving probabilistic inference with hidden Markov models. In: International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 5868\u20135871 (2011)","DOI":"10.1109\/ICASSP.2011.5947696"},{"key":"350_CR34","doi-asserted-by":"crossref","unstructured":"Peng, K., Bao, F.: An efficient range proof scheme. In: IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT), pp. 826\u2013833 (2010)","DOI":"10.1109\/SocialCom.2010.125"},{"issue":"1","key":"350_CR35","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s10462-010-9161-2","volume":"34","author":"H Polat","year":"2010","unstructured":"Polat, H., Du, W., Renckes, S., Oysal, Y.: Private predictions on hidden Markov models. Artif. Intell. Rev. 34(1), 53\u201372 (2010)","journal-title":"Artif. Intell. Rev."},{"issue":"2","key":"350_CR36","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/5.18626","volume":"77","author":"L Rabiner","year":"1989","unstructured":"Rabiner, L.: A tutorial on hidden Markov-models and selected applications in speech recognition. IEEE Proc. 77(2), 257\u2013286 (1989)","journal-title":"IEEE Proc."},{"key":"350_CR37","unstructured":"Secure Supply Chain Management (SecureSCM) Project Deliverable: D9.2 Security Analysis (2009)"},{"key":"350_CR38","doi-asserted-by":"crossref","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","DOI":"10.1145\/359168.359176"},{"key":"350_CR39","doi-asserted-by":"crossref","unstructured":"Shashanka, M.: A privacy preserving framework for Gaussian mixture models. In: IEEE International Conference on Data Mining Workshops (ICDMW), pp. 499\u2013506. IEEE (2010)","DOI":"10.1109\/ICDMW.2010.109"},{"issue":"4","key":"350_CR40","doi-asserted-by":"publisher","first-page":"1404","DOI":"10.1109\/TASL.2007.894526","volume":"15","author":"P Smaragdis","year":"2007","unstructured":"Smaragdis, P., Shashanka, M.: A framework for secure speech recognition. IEEE Trans. Audio Speech. Lang. Process. 15(4), 1404\u20131413 (2007)","journal-title":"IEEE Trans. Audio Speech. Lang. Process."},{"key":"350_CR41","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Steele, A., Blanton, M.: PICCO: a general-purpose compiler for private distributed computation. In: ACM Conference on Computer and Communications Security (CCS), pp. 813\u2013826 (2013)","DOI":"10.1145\/2508859.2516752"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-016-0350-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-016-0350-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-016-0350-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,16]],"date-time":"2020-05-16T16:50:18Z","timestamp":1589647818000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-016-0350-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,23]]},"references-count":41,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2017,11]]}},"alternative-id":["350"],"URL":"https:\/\/doi.org\/10.1007\/s10207-016-0350-0","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9,23]]},"assertion":[{"value":"23 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}