{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T15:38:24Z","timestamp":1776353904748,"version":"3.51.2"},"reference-count":105,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,5,3]],"date-time":"2022-05-03T00:00:00Z","timestamp":1651536000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,5,3]],"date-time":"2022-05-03T00:00:00Z","timestamp":1651536000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2023,8]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Cloud computing and cloud storage have contributed to a big shift in data processing and its use. Availability and accessibility of resources with the reduction of substantial work is one of the main reasons for the cloud revolution. With this cloud computing revolution, outsourcing applications are in great demand. The client uses the service by uploading their data to the cloud and finally gets the result by processing it. It benefits users greatly, but it also exposes sensitive data to third-party service providers. In the healthcare industry, patient health records are digital records of a patient\u2019s medical history kept by hospitals or health care providers. Patient health records are stored in data centers for storage and processing. Before doing computations on data, traditional encryption techniques decrypt the data in their original form. As a result, sensitive medical information is lost. Homomorphic encryption can protect sensitive information by allowing data to be processed in an encrypted form such that only encrypted data is accessible to service providers. In this paper, an attempt is made to present a systematic review of homomorphic cryptosystems with its categorization and evolution over time. In addition, this paper also includes a review of homomorphic cryptosystem contributions in healthcare.<\/jats:p>","DOI":"10.1007\/s40747-022-00756-z","type":"journal-article","created":{"date-parts":[[2022,5,3]],"date-time":"2022-05-03T09:03:14Z","timestamp":1651568594000},"page":"3759-3786","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":200,"title":["A systematic review of homomorphic encryption and its contributions in healthcare industry"],"prefix":"10.1007","volume":"9","author":[{"given":"Kundan","family":"Munjal","sequence":"first","affiliation":[]},{"given":"Rekha","family":"Bhatia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,3]]},"reference":[{"key":"756_CR1","unstructured":"Healthcare-Cloud computing Market. https:\/\/www.acumenresearchandconsulting.com\/healthcare-cloud-computing-market. Accessed 1st May 2021"},{"key":"756_CR2","unstructured":"Kitchenham Barbara (2004) Procedures for performing systematic reviews. Keele, UK, Keele University 33(2004):1\u201326"},{"key":"756_CR3","doi-asserted-by":"crossref","unstructured":"Craig Gentry (2009) Fully homomorphic encryption using ideal lattices. In: Proceedings of the forty-first annual ACM symposium on Theory of computing, pp. 169\u2013178","DOI":"10.1145\/1536414.1536440"},{"key":"756_CR4","doi-asserted-by":"crossref","unstructured":"Craig Gentry (2009) A fully homomorphic encryption scheme. PhD thesis, Stanford University. www.crypto.stanford.edu\/craig","DOI":"10.1145\/1536414.1536440"},{"key":"756_CR5","doi-asserted-by":"crossref","unstructured":"Zhigang C, Gang H, Mengce Z, Xinxia S, Liqun C (2021) Bibliometrics of machine learning research using homomorphic encryption. Mathematics 9:2792, 11","DOI":"10.3390\/math9212792"},{"key":"756_CR6","first-page":"191","volume":"104","author":"A Act","year":"1996","unstructured":"Act A (1996) Health insurance portability and accountability act of 1996. Public Law 104:191","journal-title":"Public Law"},{"key":"756_CR7","unstructured":"US\u00a0Congress (2009) Health information technology for economic and clinical health (hitech) act, title xiii of division a and title iv of division b of the American recovery and reinvestment act of 2009 (arra)"},{"key":"756_CR8","unstructured":"Ronald\u00a0L. Rivest, Len Adleman, and Michael\u00a0L. Dertouzos. On data banks and privacy homomorphisms. pages 165\u2013179"},{"key":"756_CR9","unstructured":"Shaft G, Silvio M (1982) Probabilistic encryption & how to play mental poker keeping secret all partial information. In: Proceedings of the annual ACM symposium on theory of computing, pp 365\u2013377"},{"key":"756_CR10","first-page":"493","volume-title":"Quadratic Residuosity problem","author":"B Kaliski","year":"2005","unstructured":"Kaliski B (2005) Quadratic Residuosity problem. Springer, Boston, MA, p 493"},{"issue":"4","key":"756_CR11","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T Elgamal","year":"1985","unstructured":"Elgamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469\u2013472","journal-title":"IEEE Trans Inf Theory"},{"issue":"6","key":"756_CR12","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644\u2013654","journal-title":"IEEE Trans Inf Theory"},{"key":"756_CR13","unstructured":"Josh B. Dense probabilistic encryption. In Proceedings of the workshop on selected areas of cryptography, pp 120\u2013128"},{"key":"756_CR14","unstructured":"Yuliang Z, Tsutomu M, Hideki I Cryptographic applications of 7th-residuosity problem with 7 an odd integer"},{"key":"756_CR15","unstructured":"Pascal P (1999) Public-key cryptosystems based on composite degree residuosity classes. In Jacques S (ed), Advances in Cryptology \u2014 EUROCRYPT \u201999, pages 223\u2013238. Springer Berlin"},{"key":"756_CR16","doi-asserted-by":"crossref","unstructured":"Tatsuaki O, Shigenori U (1998) A new public-key cryptosystem as secure as factoring. In: International conference on the theory and applications of cryptographic techniques, pp 308\u2013318. Springer","DOI":"10.1007\/BFb0054135"},{"key":"756_CR17","unstructured":"David N, Jacques S (1998) A new public key cryptosystem based on higher residues. In: Proceedings of the 5th ACM conference on computer and communications security, pp 59\u201366"},{"key":"756_CR18","doi-asserted-by":"crossref","unstructured":"Ivan D, Mads J (2001) A generalisation, a simpli. cation and some applications of paillier\u2019s probabilistic public-key system. In International workshop on public key cryptography, pp 119\u2013136. Springer, New York","DOI":"10.1007\/3-540-44586-2_9"},{"key":"756_CR19","unstructured":"Akinori K, Keisuke T, Keita X (2007) Multi-bit cryptosystems based on lattice problems. In: International Workshop on Public Key Cryptography, pp 315\u2013329. Springer, New York"},{"key":"756_CR20","doi-asserted-by":"crossref","unstructured":"Steven\u00a0DG (2002) Elliptic curve paillier schemes. J Cryptol 15(2):129\u2013138","DOI":"10.1007\/s00145-001-0015-6"},{"key":"756_CR21","doi-asserted-by":"crossref","unstructured":"R[onald]\u00a0LR, Adi S, Leonard\u00a0MA () A method for obtaining digital signatures and public-key cryptosystems. CACM 26(1):96\u201399","DOI":"10.1145\/357980.358017"},{"key":"756_CR22","unstructured":"Andrew\u00a0CY (1982) Protocols for secure computations. In: 23rd annual symposium on foundations of computer science (sfcs 1982), pp 160\u2013164. IEEE"},{"key":"756_CR23","doi-asserted-by":"crossref","unstructured":"Dan B, Eu-Jin G, Kobbi N (2005) Evaluating 2-dnf formulas on ciphertexts. In: Theory of cryptography conference, pp 325\u2013341. Springer, New York","DOI":"10.1007\/978-3-540-30576-7_18"},{"key":"756_CR24","unstructured":"Yuval I, Anat P (2007) Evaluating branching programs on encrypted data. In Theory of Cryptography Conference, pp 575\u2013594. Springer, New York"},{"key":"756_CR25","doi-asserted-by":"crossref","unstructured":"Michael F, Neal K (1994) Combinatorial cryptosystems galore! Contemp Math 168:51","DOI":"10.1090\/conm\/168\/01688"},{"key":"756_CR26","doi-asserted-by":"crossref","unstructured":"Tomas Sander, Adam Young, and Moti Yung. Non-interactive cryptocomputing for nc1. In Proceedings of the 40th Annual Symposium on Foundations of Computer Science, FOCS \u201999, page 554, USA, 1999. IEEE Computer Society","DOI":"10.1109\/SFFCS.1999.814630"},{"key":"756_CR27","doi-asserted-by":"crossref","unstructured":"Kristian Gj\u00f8steen. Subgroup membership problems and public key cryptosystems. 2004","DOI":"10.1007\/978-3-540-30580-4_8"},{"key":"756_CR28","unstructured":"Jeffrey Hoffstein, Jill Pipher, Joseph\u00a0H Silverman, and Joseph\u00a0H Silverman. An introduction to mathematical cryptography, volume\u00a01. Springer, 2008"},{"key":"756_CR29","doi-asserted-by":"crossref","unstructured":"Craig G, Shai H (2011) Fully homomorphic encryption without squashing using depth-3 arithmetic circuits. In: 2011 IEEE 52nd annual symposium on foundations of computer science, pp 107\u2013109. IEEE","DOI":"10.1109\/FOCS.2011.94"},{"key":"756_CR30","doi-asserted-by":"crossref","unstructured":"Dan B (1998) The decision diffie-hellman problem. In: International algorithmic number theory symposium, pp 48\u201363. Springer, New York","DOI":"10.1007\/BFb0054851"},{"issue":"4","key":"756_CR31","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1561\/0400000074","volume":"10","author":"C Peikert","year":"2016","unstructured":"Peikert C (2016) A decade of lattice cryptography. Found Trends Theor Comput Sci 10(4):283\u2013424","journal-title":"Found Trends Theor Comput Sci"},{"key":"756_CR32","doi-asserted-by":"crossref","unstructured":"Nigel\u00a0PS, Frederik V (2014) Fully homomorphic simd operations. Des Codes Cryptogr 71(1):57\u201381","DOI":"10.1007\/s10623-012-9720-4"},{"key":"756_CR33","doi-asserted-by":"crossref","unstructured":"Marten Van\u00a0D, Craig G, Shai H, Vinod V (2010) Fully homomorphic encryption over the integers. In: Annual international conference on the theory and applications of cryptographic techniques, pages 24\u201343. Springer, New York","DOI":"10.1007\/978-3-642-13190-5_2"},{"key":"756_CR34","doi-asserted-by":"crossref","unstructured":"Steven\u00a0DG, Shishay\u00a0WG, Sean M (2016) Algorithms for the approximate common divisor problem. LMS J Comput Math 19(A):58\u201372","DOI":"10.1112\/S1461157016000218"},{"key":"756_CR35","doi-asserted-by":"crossref","unstructured":"Jung\u00a0Hee Cheon, Jean-S\u00e9bastien Coron, Jinsu Kim, Moon\u00a0Sung Lee, Tancrede Lepoint, Mehdi Tibouchi, and Aaram Yun. Batch fully homomorphic encryption over the integers. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 315\u2013335. Springer, 2013","DOI":"10.1007\/978-3-642-38348-9_20"},{"key":"756_CR36","doi-asserted-by":"crossref","unstructured":"Jean-S\u00e9bastien Coron, Tancrede Lepoint, and Mehdi Tibouchi. Scale-invariant fully homomorphic encryption over the integers. In International Workshop on Public Key Cryptography, pages 311\u2013328. Springer, 2014","DOI":"10.1007\/978-3-642-54631-0_18"},{"key":"756_CR37","doi-asserted-by":"crossref","unstructured":"Y\u00a0Govinda Ramaiah and G\u00a0Vijaya Kumari. Efficient public key homomorphic encryption over integer plaintexts. In 2012 International Conference on Information Security and Intelligent Control, pages 123\u2013128. IEEE, 2012","DOI":"10.1109\/ISIC.2012.6449723"},{"key":"756_CR38","doi-asserted-by":"crossref","unstructured":"Nitesh Aggarwal, CP\u00a0Gupta, and Iti Sharma. Fully homomorphic symmetric scheme without bootstrapping. In Proceedings of 2014 International Conference on Cloud Computing and Internet of Things, pages 14\u201317. IEEE, 2014","DOI":"10.1109\/CCIOT.2014.7062497"},{"key":"756_CR39","doi-asserted-by":"crossref","unstructured":"Pedro\u00a0Silveira Pisa, Michel Abdalla, and Otto Carlos Muniz\u00a0Bandeira Duarte. Somewhat homomorphic encryption scheme for arithmetic operations on large integers. In 2012 Global Information Infrastructure and Networking Symposium (GIIS), pages 1\u20138. IEEE, 2012","DOI":"10.1109\/GIIS.2012.6466769"},{"issue":"6","key":"756_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1568318.1568324","volume":"56","author":"O Regev","year":"2009","unstructured":"Regev O (2009) On lattices, learning with errors, random linear codes, and cryptography. Journal of the ACM (JACM) 56(6):1\u201340","journal-title":"Journal of the ACM (JACM)"},{"key":"756_CR41","doi-asserted-by":"crossref","unstructured":"Vadim Lyubashevsky, Chris Peikert, and Oded Regev. On ideal lattices and learning with errors over rings. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 1\u201323. Springer, 2010","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"756_CR42","doi-asserted-by":"crossref","unstructured":"Zvika Brakerski and Vinod Vaikuntanathan. Fully homomorphic encryption from ring-lwe and security for key dependent messages. In Annual cryptology conference, pages 505\u2013524. Springer, 2011","DOI":"10.1007\/978-3-642-22792-9_29"},{"issue":"3","key":"756_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2633600","volume":"6","author":"Z Brakerski","year":"2014","unstructured":"Brakerski Z, Gentry C, Vaikuntanathan V (2014) (leveled) fully homomorphic encryption without bootstrapping. ACM Transactions on Computation Theory (TOCT) 6(3):1\u201336","journal-title":"ACM Transactions on Computation Theory (TOCT)"},{"key":"756_CR44","doi-asserted-by":"crossref","unstructured":"Craig Gentry, Shai Halevi, and Nigel\u00a0P Smart. Homomorphic evaluation of the aes circuit. In Annual Cryptology Conference, pages 850\u2013867. Springer, 2012","DOI":"10.1007\/978-3-642-32009-5_49"},{"key":"756_CR45","doi-asserted-by":"crossref","unstructured":"Zvika Brakerski. Fully homomorphic encryption without modulus switching from classical gapsvp. In Annual Cryptology Conference, pages 868\u2013886. Springer, 2012","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"756_CR46","first-page":"144","volume":"2012","author":"J Fan","year":"2012","unstructured":"Fan J, Vercauteren F (2012) Somewhat practical fully homomorphic encryption. IACR Cryptol. ePrint Arch. 2012:144","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"756_CR47","doi-asserted-by":"crossref","unstructured":"Thore Graepel, Kristin Lauter, and Michael Naehrig. Ml confidential: Machine learning on encrypted data. In International Conference on Information Security and Cryptology, pages 1\u201321. Springer, 2012","DOI":"10.1007\/978-3-642-37682-5_1"},{"issue":"2","key":"756_CR48","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1137\/120868669","volume":"43","author":"Z Brakerski","year":"2014","unstructured":"Brakerski Z, Vaikuntanathan V (2014) Efficient fully homomorphic encryption from (standard) lwe. SIAM J Comput 43(2):831\u2013871","journal-title":"SIAM J Comput"},{"key":"756_CR49","doi-asserted-by":"crossref","unstructured":"Craig Gentry, Amit Sahai, and Brent Waters. Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based. In Annual Cryptology Conference, pages 75\u201392. Springer, 2013","DOI":"10.1007\/978-3-642-40041-4_5"},{"key":"756_CR50","doi-asserted-by":"crossref","unstructured":"Jeffrey Hoffstein, Jill Pipher, and Joseph\u00a0H Silverman. Ntru: A ring-based public key cryptosystem. In International Algorithmic Number Theory Symposium, pages 267\u2013288. Springer, 1998","DOI":"10.1007\/BFb0054868"},{"key":"756_CR51","doi-asserted-by":"crossref","unstructured":"Adriana L\u00f3pez-Alt, Eran Tromer, and Vinod Vaikuntanathan. On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In Proceedings of the forty-fourth annual ACM symposium on Theory of computing, pages 1219\u20131234, 2012","DOI":"10.1145\/2213977.2214086"},{"key":"756_CR52","doi-asserted-by":"crossref","unstructured":"Damien Stehl\u00e9 and Ron Steinfeld. Making ntru as secure as worst-case problems over ideal lattices. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 27\u201347. Springer, 2011","DOI":"10.1007\/978-3-642-20465-4_4"},{"key":"756_CR53","doi-asserted-by":"crossref","unstructured":"Joppe\u00a0W Bos, Kristin Lauter, Jake Loftus, and Michael Naehrig. Improved security for a ring-based fully homomorphic encryption scheme. In IMA International Conference on Cryptography and Coding, pages 45\u201364. Springer, 2013","DOI":"10.1007\/978-3-642-45239-0_4"},{"key":"756_CR54","first-page":"1","volume":"2021","author":"X Qin","year":"2021","unstructured":"Qin X, Huang R, Fan H (2021) An effective NTRU-based fully homomorphic encryption scheme. Math Probl Eng 2021:1\u20139","journal-title":"Math Probl Eng"},{"key":"756_CR55","unstructured":"S\u00a0Halevi and V\u00a0Shoup. Helib. url: https:\/\/github.com\/shaih"},{"key":"756_CR56","unstructured":"Zvika B, Craig G, Vinod V (2011) Fully homomorphic encryption without bootstrapping. Cryptology ePrint Archive, Report 2011\/277. https:\/\/eprint.iacr.org\/2011\/277"},{"key":"756_CR57","doi-asserted-by":"crossref","unstructured":"Jung\u00a0Hee Cheon, Andrey Kim, Miran Kim, and Yongsoo Song. Homomorphic encryption for arithmetic of approximate numbers. In International Conference on the Theory and Application of Cryptology and Information Security, pages 409\u2013437. Springer, 2017","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"756_CR58","volume-title":"and Malika Izabach\u00e8ne","author":"I Chillotti","year":"2019","unstructured":"Chillotti I, Gama N, Georgieva M (2019) and Malika Izabach\u00e8ne. Fast fully homomorphic encryption library, Tfhe"},{"key":"756_CR59","doi-asserted-by":"crossref","unstructured":"Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, and Malika Izabachene. Faster fully homomorphic encryption: Bootstrapping in less than $$0.1$$ seconds. In international conference on the theory and application of cryptology and information security, pages 3\u201333. Springer, 2016","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"756_CR60","unstructured":"Microsoft SEAL (release 3.6). https:\/\/github.com\/Microsoft\/SEAL, November 2020. Microsoft Research, Redmond, WA"},{"key":"756_CR61","unstructured":"\u201cFHEW Library\u201d. https:\/\/github.com\/lducas\/FHEW\/, Accessed 21st May 2021"},{"key":"756_CR62","doi-asserted-by":"crossref","unstructured":"L\u00e9o Ducas and Daniele Micciancio. Fhew: bootstrapping homomorphic encryption in less than a second. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 617\u2013640. Springer, 2015","DOI":"10.1007\/978-3-662-46800-5_24"},{"key":"756_CR63","unstructured":"HEAAN\u00a0Software Library. Cryptolab inc. 2018. https:\/\/github.com\/snucrypto\/HEAAN Accessed 21st May 2021"},{"key":"756_CR64","unstructured":"\u201cNTT based Fast Lattice\u00a0library\u201d. https:\/\/github.com\/CryptoExperts\/FV-NFLlib, Accessed 22nd May 2021"},{"key":"756_CR65","unstructured":"PALISADE Lattice\u00a0Cryptography Library. https:\/\/github.com\/holybao\/PALISADE, Accessed 22nd May 2021"},{"key":"756_CR66","unstructured":"Cingulata Library. https:\/\/github.com\/CEA-LIST\/Cingulata#cingulata, Accessed 22nd May 2021"},{"key":"756_CR67","unstructured":"Lattigo: lattice-based multiparty homomorphic encryption library\u00a0in Go. https:\/\/github.com\/ldsec\/lattigo, Accessed 23rd May 2021"},{"key":"756_CR68","unstructured":"Pyfhel: PYthon For Homomorphic\u00a0Encryption Libraries. https:\/\/github.com\/ibarrond\/Pyfhel, Accessed 23rd May 2021"},{"key":"756_CR69","unstructured":"$$\\wedge $$$$\\circ $$\u00a0$$\\lambda $$:Functional Lattice\u00a0Cryptography. https:\/\/github.com\/cpeikert\/Loll, Accessed 23rd May 2021"},{"key":"756_CR70","unstructured":"Pedro G. M.\u00a0R. Alves and Diego\u00a0F. Aranha. Efficient GPGPU implementation of the Leveled Fully Homomorphic Encryption scheme YASHE. Master\u2019s thesis, Institute of Computing, University of Campinas, Brazil, 2016. (In Portuguese)"},{"issue":"9","key":"756_CR71","doi-asserted-by":"publisher","first-page":"1927","DOI":"10.1109\/TMC.2013.84","volume":"13","author":"L Guo","year":"2014","unstructured":"Guo L, Zhang C, Sun J, Fang Y (2014) A privacy-preserving attribute-based authentication system for mobile health networks. IEEE Trans Mob Comput 13(9):1927\u20131941","journal-title":"IEEE Trans Mob Comput"},{"key":"756_CR72","doi-asserted-by":"crossref","unstructured":"Ovunc Kocabas, Tolga Soyata, Jean\u00a0Philippe Couderc, Mehmet Aktas, Jean Xia, and Michael Huang. Assessment of cloud-based health monitoring using homomorphic encryption. 2013 IEEE 31st International Conference on Computer Design, ICCD 2013, pages 443\u2013446, 2013","DOI":"10.1109\/ICCD.2013.6657078"},{"key":"756_CR73","doi-asserted-by":"crossref","unstructured":"Jean-Philippe Couderc. The telemetric and holter ecg warehouse initiative (thew): a data repository for the design, implementation and validation of ecg-related technologies. In 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology, pages 6252\u20136255. IEEE, 2010","DOI":"10.1109\/IEMBS.2010.5628067"},{"issue":"May","key":"756_CR74","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.jbi.2014.04.003","volume":"50","author":"JW Bos","year":"2014","unstructured":"Bos JW, Lauter K, Naehrig M (2014) Private predictive analysis on encrypted medical data. J Biomed Inform 50(May):234\u2013243","journal-title":"J Biomed Inform"},{"key":"756_CR75","doi-asserted-by":"crossref","unstructured":"Alex Page, Ovunc Kocabas, Scott Ames, Muthuramakrishnan Venkitasubramaniam, and Tolga Soyata. Cloud-based secure health monitoring: Optimizing fully-homomorphic encryption for streaming algorithms. 2014 IEEE Globecom Workshops, GC Wkshps 2014, pages 48\u201352, 2014","DOI":"10.1109\/GLOCOMW.2014.7063384"},{"key":"756_CR76","doi-asserted-by":"crossref","unstructured":"Mentari Djatmiko, Arik Friedman, Roksana Boreli, Felix Lawrence, Brian Thorne, and Stephen Hardy. Secure evaluation protocol for personalized medicine. In Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES \u201914, page 159\u2013162, New York, NY, USA, 2014. Association for Computing Machinery","DOI":"10.1145\/2665943.2665967"},{"key":"756_CR77","doi-asserted-by":"crossref","unstructured":"Ovunc Kocabas and Tolga Soyata. Utilizing Homomorphic Encryption to Implement Secure and Private Medical Cloud Computing. Proceedings - 2015 IEEE 8th International Conference on Cloud Computing, CLOUD 2015, pages 540\u2013547, 2015","DOI":"10.1109\/CLOUD.2015.78"},{"key":"756_CR78","doi-asserted-by":"crossref","unstructured":"Miran Kim and Kristin Lauter. Private genome analysis through homomorphic encryption. In BMC medical informatics and decision making, volume\u00a015, pages 1\u201312. BioMed Central, 2015","DOI":"10.1186\/1472-6947-15-S5-S3"},{"issue":"12","key":"756_CR79","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-015-0340-1","volume":"39","author":"X Wang","year":"2015","unstructured":"Wang X, Zhang Z (2015) Data Division Scheme Based on Homomorphic Encryption in WSNs for Health Care. J Med Syst 39(12):1\u20137","journal-title":"J Med Syst"},{"key":"756_CR80","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1016\/j.procs.2017.09.150","volume":"115","author":"AM Vengadapurvaja","year":"2017","unstructured":"Vengadapurvaja AM, Nisha G, Aarthy R, Sasikaladevi N (2017) An Efficient Homomorphic Medical Image Encryption Algorithm for Cloud Storage Security. Procedia Computer Science 115:643\u2013650","journal-title":"Procedia Computer Science"},{"key":"756_CR81","doi-asserted-by":"crossref","unstructured":"Lichun Li, Rongxing Lu, Kim-Kwang\u00a0Raymond Choo, Anwitaman Datta, and Jun Shao. Privacy-preserving-outsourced association rule mining on vertically partitioned databases. IEEE Transactions on Information Forensics and Security, 11(8):1847\u20131861, 2016","DOI":"10.1109\/TIFS.2016.2561241"},{"key":"756_CR82","doi-asserted-by":"crossref","unstructured":"Diptendu\u00a0Mohan Kar, Ibrahim Lazrig, Indrajit Ray, and Indrakshi Ray. Poster: Priremat: A distributed tool for privacy preserving record linking in healthcare. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201917, page 2507\u20132509, New York, NY, USA, 2017. Association for Computing Machinery","DOI":"10.1145\/3133956.3138845"},{"key":"756_CR83","doi-asserted-by":"publisher","first-page":"12601","DOI":"10.1109\/ACCESS.2017.2716439","volume":"5","author":"A Ara","year":"2017","unstructured":"Ara A, Al-Rodhaan M, Tian Y, Al-Dhelaan A (2017) A secure privacy-preserving data aggregation scheme based on bilinear elgamal cryptosystem for remote health monitoring systems. IEEE Access 5:12601\u201312617","journal-title":"IEEE Access"},{"key":"756_CR84","doi-asserted-by":"crossref","unstructured":"Sergiu Carpov, Nicolas Gama, Mariya Georgieva, and Juan\u00a0Ramon Troncoso-Pastoriza. Privacy-preserving semi-parallel logistic regression training with fully homomorphic encryption. BMC Medical Genomics, 13(7):1\u201310, 2020","DOI":"10.1186\/s12920-020-0723-0"},{"issue":"2","key":"756_CR85","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1109\/JBHI.2017.2657458","volume":"22","author":"A Khedr","year":"2018","unstructured":"Khedr A, Gulak G (2018) SecureMed: Secure Medical Computation Using GPU-Accelerated Homomorphic Encryption Scheme. IEEE J Biomed Health Inform 22(2):597\u2013606","journal-title":"IEEE J Biomed Health Inform"},{"issue":"3","key":"756_CR86","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/TCBB.2016.2520933","volume":"13","author":"O Kocabas","year":"2016","unstructured":"Kocabas O, Soyata T, Aktas MK (2016) Emerging Security Mechanisms for Medical Cyber Physical Systems. IEEE\/ACM Trans Comput Biol Bioinf 13(3):401\u2013416","journal-title":"IEEE\/ACM Trans Comput Biol Bioinf"},{"issue":"5","key":"756_CR87","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1007\/s00779-017-1056-7","volume":"21","author":"X Sun","year":"2017","unstructured":"Sun X, Zhang P, Sookhak M, Jianping Yu, Xie W (2017) Utilizing fully homomorphic encryption to implement secure medical computation in smart cities. Pers Ubiquit Comput 21(5):831\u2013839","journal-title":"Pers Ubiquit Comput"},{"issue":"3","key":"756_CR88","first-page":"552","volume":"105","author":"N Dowlin","year":"2017","unstructured":"Dowlin N, Gilad-Bachrach R, Laine K, Lauter K, Naehrig M, Wernsing J (2017) Manual for using homomorphic encryption for bioinformatics. Proc IEEE 105(3):552\u2013567","journal-title":"Proc IEEE"},{"key":"756_CR89","unstructured":"Jean\u00a0Louis Raisaro, Jeffrey\u00a0G Klann, Kavishwar\u00a0B Wagholikar, Hossein Estiri, Jean-Pierre Hubaux, and Shawn\u00a0N Murphy. Feasibility of homomorphic encryption for sharing i2b2 aggregate-level data in the cloud. AMIA Summits on Translational Science Proceedings, 2018:176, 2018"},{"issue":"1","key":"756_CR90","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1147\/JRD.2017.2755524","volume":"62","author":"R Bocu","year":"2018","unstructured":"Bocu R, Costache C (2018) A homomorphic encryption-based system for securely managing personal health metrics data. IBM J Res Dev 62(1):1\u201310","journal-title":"IBM J Res Dev"},{"key":"756_CR91","doi-asserted-by":"crossref","unstructured":"Jean\u00a0Louis Raisaro, Gwangbae Choi, Sylvain Pradervand, Raphael Colsenet, Nathalie Jacquemont, Nicolas Rosat, Vincent Mooser, and Jean-Pierre Hubaux. Protecting privacy and security of genomic data in i2b2 with homomorphic encryption and differential privacy. IEEE\/ACM transactions on computational biology and bioinformatics, 15(5):1413\u20131426, 2018","DOI":"10.1109\/TCBB.2018.2854782"},{"key":"756_CR92","doi-asserted-by":"crossref","unstructured":"Wei Guo, Jun Shao, Rongxing Lu, Yining Liu, and Ali\u00a0A. Ghorbani. A privacy-preserving online medical prediagnosis scheme for cloud environment, 2018","DOI":"10.1109\/ACCESS.2018.2866971"},{"key":"756_CR93","first-page":"1","volume":"2019","author":"S Yin","year":"2019","unstructured":"Yin S, Liu J, Teng L (2019) Improved Elliptic Curve Cryptography with Homomorphic Encryption for Medical Image Encryption. 2019:1\u20136","journal-title":"Improved Elliptic Curve Cryptography with Homomorphic Encryption for Medical Image Encryption."},{"key":"756_CR94","doi-asserted-by":"crossref","unstructured":"Yusheng Jiang, Tamotsu Noguchi, Nobuyuki Kanno, Yoshiko Yasumura, Takuya Suzuki, Yu\u00a0Ishimaki, and Hayato Yamana. A privacy-preserving query system using fully homomorphic encryption with real-world implementation for medicine-side effect search. ACM International Conference Proceeding Series, 2019","DOI":"10.1145\/3366030.3366061"},{"issue":"1","key":"756_CR95","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12911-019-0983-9","volume":"19","author":"S Paddock","year":"2019","unstructured":"Paddock S, Abedtash H, Zummo J, Thomas S (2019) Proof-of-concept study: Homomorphically encrypted data can support real-time learning in personalized cancer medicine. BMC Med Inform Decis Mak 19(1):1\u201310","journal-title":"BMC Med Inform Decis Mak"},{"key":"756_CR96","doi-asserted-by":"crossref","unstructured":"Ramaprabha Jayaram and S.\u00a0Prabakaran. Onboard disease prediction and rehabilitation monitoring on secure edge-cloud integrated privacy preserving healthcare system. Egyptian Informatics Journal, 2020","DOI":"10.1016\/j.eij.2020.12.003"},{"key":"756_CR97","doi-asserted-by":"publisher","first-page":"96900","DOI":"10.1109\/ACCESS.2019.2929298","volume":"7","author":"Y Yang","year":"2019","unstructured":"Yang Y, Xiao X, Cai X, Zhang W (2019) A secure and high visual-quality framework for medical images by contrast-enhancement reversible data hiding and homomorphic encryption. IEEE Access 7:96900\u201396911","journal-title":"IEEE Access"},{"key":"756_CR98","doi-asserted-by":"crossref","unstructured":"Koushik Sinha, Pratham Majumder, and Subhas\u00a0K. Ghosh. Fully Homomorphic Encryption based Privacy-Preserving Data Acquisition and Computation for Contact Tracing. International Symposium on Advanced Networks and Telecommunication Systems, ANTS, 2020-Decem:3\u20138, 2020","DOI":"10.1109\/ANTS50601.2020.9342834"},{"key":"756_CR99","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101701","volume":"90","author":"D Li","year":"2020","unstructured":"Li D, Liao X, Xiang T, Jiahui W, Le J (2020) Privacy-preserving self-serviced medical diagnosis scheme based on secure multi-party computation. Computers & Security 90:101701","journal-title":"Computers & Security"},{"key":"756_CR100","doi-asserted-by":"crossref","unstructured":"Yepeng Ding and Hiroyuki Sato. Derepo: A distributed privacy-preserving data repository with decentralized access control for smart health. In 2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)\/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), pages 29\u201335, 2020","DOI":"10.1109\/CSCloud-EdgeCom49738.2020.00015"},{"key":"756_CR101","doi-asserted-by":"crossref","unstructured":"Ovunc Kocabas and Tolga Soyata. Towards privacy-preserving medical cloud computing using homomorphic encryption. Enabling Real-Time Mobile Cloud Computing through Emerging Technologies, pages 213\u2013246, 2015","DOI":"10.4018\/978-1-4666-8662-5.ch007"},{"key":"756_CR102","doi-asserted-by":"crossref","unstructured":"David Froelicher, Juan\u00a0R. Troncoso-Pastoriza, Jean\u00a0Louis Raisaro, Michel\u00a0A. Cuendet, Joao\u00a0Sa Sousa, Hyunghoon Cho, Bonnie Berger, Jacques Fellay, and Jean-Pierre Hubaux. Truly privacy-preserving federated analytics for precision medicine with multiparty homomorphic encryption. Nature Communications, 12(1), October 2021","DOI":"10.1038\/s41467-021-25972-y"},{"key":"756_CR103","doi-asserted-by":"crossref","unstructured":"K.\u00a0Anitha Kumari, Avinash Sharma, Chinmay Chakraborty, and M.\u00a0Ananyaa. Preserving health care data security and privacy using carmichael\u2019s theorem-based homomorphic encryption and modified enhanced homomorphic encryption schemes in edge computing systems. Big Data, 10(1):1\u201317, 2022. PMID: 34375143","DOI":"10.1089\/big.2021.0012"},{"issue":"4","key":"756_CR104","first-page":"1545","volume":"13","author":"R Sendhil","year":"2021","unstructured":"Sendhil R, Amuthan A (2021) Contextual fully homomorphic encryption schemes-based privacy preserving framework for securing fog-assisted healthcare data exchanging applications. Int J Inf Technol 13(4):1545\u20131553","journal-title":"Int J Inf Technol"},{"issue":"1","key":"756_CR105","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1515\/jmc-2015-0052","volume":"14","author":"Y Dor\u00f6z","year":"2016","unstructured":"Dor\u00f6z Y, Sunar B (2016) Flattening ntru for evaluation key free homomorphic encryption. Journal of Mathematical Cryptology 14(1):66\u201383","journal-title":"Journal of Mathematical Cryptology"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-022-00756-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-022-00756-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-022-00756-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,23]],"date-time":"2024-09-23T16:45:43Z","timestamp":1727109943000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-022-00756-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,3]]},"references-count":105,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["756"],"URL":"https:\/\/doi.org\/10.1007\/s40747-022-00756-z","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,3]]},"assertion":[{"value":"8 July 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 April 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 May 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}