{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T04:09:46Z","timestamp":1750392586554,"version":"3.41.0"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T00:00:00Z","timestamp":1497830400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Regional Government of Madrid, Spain","award":["CASI-CAM P2013\/ICE2845"],"award-info":[{"award-number":["CASI-CAM P2013\/ICE2845"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1007\/s10207-017-0381-1","type":"journal-article","created":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T12:46:24Z","timestamp":1497876384000},"page":"365-377","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Supervised machine learning using encrypted training data"],"prefix":"10.1007","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7514-7451","authenticated-orcid":false,"given":"Francisco-Javier","family":"Gonz\u00e1lez-Serrano","sequence":"first","affiliation":[]},{"given":"Adri\u00e1n","family":"Amor-Mart\u00edn","sequence":"additional","affiliation":[]},{"given":"Jorge","family":"Casamay\u00f3n-Ant\u00f3n","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,19]]},"reference":[{"issue":"2","key":"381_CR1","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1145\/335191.335438","volume":"29","author":"R Agrawal","year":"2000","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. ACM SIGMOD Rec. 29(2), 439\u2013450 (2000). doi: 10.1145\/335191.335438","journal-title":"ACM SIGMOD Rec."},{"key":"381_CR2","unstructured":"Bache, K., Lichman, M.: UCI machine learning repository. http:\/\/archive.ics.uci.edu\/ml (2013)"},{"key":"381_CR3","volume-title":"Estimation with Applications to Tracking and Navigation: Theory Algorithms and Software","author":"Y Bar-Shalom","year":"2004","unstructured":"Bar-Shalom, Y., Li, X.R., Kirubarajan, T.: Estimation with Applications to Tracking and Navigation: Theory Algorithms and Software. Wiley, Hoboken (2004)"},{"key":"381_CR4","doi-asserted-by":"publisher","unstructured":"Beye, M., Erkin, Z., Lagendijk, R.: Efficient privacy preserving k-means clustering in a three-party setting. In: Information Forensics and Security (WIFS), 2011 IEEE International Workshop on, pp. 1\u20136. doi: 10.1109\/WIFS.2011.6123148 (2011)","DOI":"10.1109\/WIFS.2011.6123148"},{"key":"381_CR5","doi-asserted-by":"publisher","unstructured":"Bianchi, T., Piva, A., Barni, M.: Efficient linear filtering of encrypted signals via composite representation. In: Digital Signal Processing, 2009 16th International Conference on, pp. 1\u20136. doi: 10.1109\/ICDSP.2009.5201116 (2009)","DOI":"10.1109\/ICDSP.2009.5201116"},{"issue":"4","key":"381_CR6","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/2501654.2501655","volume":"45","author":"L Bossuet","year":"2013","unstructured":"Bossuet, L., Grand, M., Gaspar, L., Fischer, V., Gogniat, G.: Architectures of flexible symmetric key crypto engines survey: from hardware coprocessor to multi-crypto-processor system on chip. ACM Comput. Surv. (CSUR) 45(4), 41 (2013)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"381_CR7","doi-asserted-by":"crossref","unstructured":"Bost, R., Popa, R.A., Tu, S., Goldwasser, S.: Machine learning classification over encrypted data. Cryptology ePrint Archive, Rep. 2014\/331. http:\/\/eprint.iacr.org\/ (2014)","DOI":"10.14722\/ndss.2015.23241"},{"key":"381_CR8","doi-asserted-by":"crossref","unstructured":"Bresson, E., Catalano, D., Pointcheval, D.: A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications. In: Advances in Cryptology-ASIACRYPT 2003, Springer, pp. 37\u201354 (2003)","DOI":"10.1007\/978-3-540-40061-5_3"},{"key":"381_CR9","doi-asserted-by":"crossref","unstructured":"Catrina, O., Saxena, A.: Secure computation with fixed-point numbers. In: Financial Cryptography and Data Security, Springer, pp. 35\u201350 (2010)","DOI":"10.1007\/978-3-642-14577-3_6"},{"issue":"3","key":"381_CR10","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273\u2013297 (1995)","journal-title":"Mach. Learn."},{"issue":"6","key":"381_CR11","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Infor. Theory 22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Infor. Theory"},{"issue":"4","key":"381_CR12","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469\u2013472 (1985). doi: 10.1109\/TIT.1985.1057074","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"381_CR13","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1109\/TIFS.2012.2190726","volume":"7","author":"Z Erkin","year":"2012","unstructured":"Erkin, Z., Veugen, T., Toft, T., Lagendijk, R.: Generating private recommendations efficiently using homomorphic encryption and data packing. IEEE Trans. Inf. For. Secur. 7(3), 1053\u20131066 (2012). doi: 10.1109\/TIFS.2012.2190726","journal-title":"IEEE Trans. Inf. For. Secur."},{"issue":"3","key":"381_CR14","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1145\/1666420.1666444","volume":"53","author":"C Gentry","year":"2010","unstructured":"Gentry, C.: Computing arbitrary functions of encrypted data. Commun. ACM 53(3), 97\u2013105 (2010). doi: 10.1145\/1666420.1666444","journal-title":"Commun. ACM"},{"key":"381_CR15","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511721656","volume-title":"Foundations of Cryptography II","author":"O Goldreich","year":"2004","unstructured":"Goldreich, O.: Foundations of Cryptography II. Cambridge University Press, Cambridge (2004)"},{"key":"381_CR16","doi-asserted-by":"crossref","unstructured":"Gonz\u00e1lez-Serrano, F., Amor-Mart\u00edn, A., Casamay\u00f3n-Ant\u00f3n, J.: State estimation using an extended Kalman filter with privacy-protected observed inputs. In: GlobalSIP14-Workshop on Information Forensics and Security 2014. Proceedings of the, pp. 1647\u20131652 (2014)","DOI":"10.1109\/WIFS.2014.7084303"},{"key":"381_CR17","doi-asserted-by":"crossref","unstructured":"Han, S., Ng, W.K., Yu, P.S.: Privacy-preserving singular value decomposition. In: Data Engineering, 2009. ICDE\u201909. IEEE 25th International Conference on, IEEE, pp. 1267\u20131270 (2009)","DOI":"10.1109\/ICDE.2009.217"},{"key":"381_CR18","doi-asserted-by":"publisher","unstructured":"Huang, G.B., Zhu, Q.Y., Siew, C.K.: Extreme learning machine: a new learning scheme of feedforward neural networks. In: Neural Networks, 2004. Proceedings. 2004 IEEE International Joint Conference on, vol\u00a02, pp. 985\u2013990 vol.2. doi: 10.1109\/IJCNN.2004.1380068 (2004)","DOI":"10.1109\/IJCNN.2004.1380068"},{"issue":"3","key":"381_CR19","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1109\/TKDE.2005.50","volume":"17","author":"J Huang","year":"2005","unstructured":"Huang, J., Ling, C.X.: Using auc and accuracy in evaluating learning algorithms. IEEE Trans. Knowl. Data Eng. 17(3), 299\u2013310 (2005)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"381_CR20","doi-asserted-by":"crossref","unstructured":"Huang, Z., Du, W., Chen, B.: Deriving private information from randomized data. In: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, ACM, pp. 37\u201348 (2005)","DOI":"10.1145\/1066157.1066163"},{"key":"381_CR21","unstructured":"Instruments, T.: The TMS320 Family of Digital Signal Processors. Literature number spra396 http:\/\/www.ti.com\/lit\/an\/spra396\/spra396.pdf (1997)"},{"key":"381_CR22","doi-asserted-by":"crossref","unstructured":"Kwon, T.W., You, C.S., Heo, W.S., Kang, Y.K., Choi, J.R.: Two implementation methods of a 1024-bit RSA cryptoprocessor based on modified Montgomery algorithm. In: Circuits and Systems, 2001. ISCAS 2001. The 2001 IEEE International Symposium on, IEEE, vol\u00a04, pp. 650\u2013653 (2001)","DOI":"10.1109\/ISCAS.2001.922321"},{"issue":"1","key":"381_CR23","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MSP.2012.2219653","volume":"30","author":"R Lagendijk","year":"2013","unstructured":"Lagendijk, R., Erkin, Z., Barni, M.: Encrypted signal processing for privacy protection: conveying the utility of homomorphic encryption and multiparty computation. IEEE Signal Process. Mag. 30(1), 82\u2013105 (2013). doi: 10.1109\/MSP.2012.2219653","journal-title":"IEEE Signal Process. Mag."},{"key":"381_CR24","doi-asserted-by":"publisher","unstructured":"Nikolaenko, V., Weinsberg, U., Ioannidis, S., Joye, M., Boneh, D., Taft, N.: Privacy-preserving ridge regression on hundreds of millions of records. In: Security and Privacy (SP), 2013 IEEE Symposium on, pp. 334\u2013348. doi: 10.1109\/SP.2013.30 (2013)","DOI":"10.1109\/SP.2013.30"},{"key":"381_CR25","doi-asserted-by":"crossref","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, Springer, Prague, Czech Republic, EUROCRYPT \u201999, vol 1592, pp. 223\u2013238 (1999)","DOI":"10.1007\/3-540-48910-X_16"},{"issue":"12","key":"381_CR26","doi-asserted-by":"publisher","first-page":"2046","DOI":"10.1109\/TIFS.2013.2288131","volume":"8","author":"A Peter","year":"2013","unstructured":"Peter, A., Tews, E., Katzenbeisser, S.: Efficiently outsourcing multiparty computation under multiple keys. IEEE Trans. Inf. For. Secur. 8(12), 2046\u20132058 (2013). doi: 10.1109\/TIFS.2013.2288131","journal-title":"IEEE Trans. Inf. For. Secur."},{"issue":"4","key":"381_CR27","first-page":"169","volume":"32","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. Found. Secure Comput. 32(4), 169\u2013178 (1978)","journal-title":"Found. Secure Comput."},{"key":"381_CR28","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1016\/j.datak.2012.06.001","volume":"79","author":"S Samet","year":"2012","unstructured":"Samet, S., Miri, A.: Privacy-preserving back-propagation and extreme learning machine algorithms. Data Knowl. Eng. 79, 40\u201361 (2012)","journal-title":"Data Knowl. Eng."},{"issue":"1","key":"381_CR29","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s10107-010-0420-4","volume":"127","author":"S Shalev-Shwartz","year":"2011","unstructured":"Shalev-Shwartz, S., Singer, Y., Srebro, N., Cotter, A.: Pegasos: primal estimated sub-gradient solver for svm. Math. Programm. 127(1), 3\u201330 (2011)","journal-title":"Math. Programm."},{"issue":"2","key":"381_CR30","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/MSP.2012.2228533","volume":"30","author":"J Troncoso-Pastoriza","year":"2013","unstructured":"Troncoso-Pastoriza, J., Perez-Gonzalez, F.: Secure signal processing in the cloud: enabling technologies for privacy-preserving multimedia cloud processing. IEEE Signal Process. Mag. 30(2), 29\u201341 (2013). doi: 10.1109\/MSP.2012.2228533","journal-title":"IEEE Signal Process. Mag."},{"key":"381_CR31","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Clifton, C.: Privacy-preserving k-means clustering over vertically partitioned data. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, pp. 206\u2013215 (2003)","DOI":"10.1145\/956750.956776"},{"issue":"2","key":"381_CR32","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/s10115-007-0073-7","volume":"14","author":"J Vaidya","year":"2008","unstructured":"Vaidya, J., Yu, H., Jiang, X.: Privacy-preserving svm classification. Knowl. Inf. Syst. 14(2), 161\u2013178 (2008)","journal-title":"Knowl. Inf. Syst."},{"key":"381_CR33","volume-title":"Statistical Learning Theory","author":"VN Vapnik","year":"1998","unstructured":"Vapnik, V.N.: Statistical Learning Theory, 1st edn. Wiley, Hoboken (1998). (September 30, 1998)","edition":"1"},{"key":"381_CR34","unstructured":"Veugen, T.: Comparing encrypted data. In: Technical Report, Multimedia Signal Processing Group, Delft University of Technology, The Netherlands, and TNO Information and Communication Technology, Delft, The Netherlands (2011)"},{"key":"381_CR35","doi-asserted-by":"publisher","unstructured":"Yao, A.C.: Protocols for secure computations. In: Foundations of Computer Science, 1982. SFCS \u201908. 23rd Annual Symposium on, pp. 160\u2013164. doi: 10.1109\/SFCS.1982.38 (1982)","DOI":"10.1109\/SFCS.1982.38"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-017-0381-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-017-0381-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-017-0381-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T19:23:26Z","timestamp":1750361006000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-017-0381-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,19]]},"references-count":35,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["381"],"URL":"https:\/\/doi.org\/10.1007\/s10207-017-0381-1","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2017,6,19]]}}}