{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:50:23Z","timestamp":1774630223719,"version":"3.50.1"},"reference-count":84,"publisher":"Oxford University Press (OUP)","issue":"3","license":[{"start":{"date-parts":[[2017,11,7]],"date-time":"2017-11-07T00:00:00Z","timestamp":1510012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"funder":[{"DOI":"10.13039\/100000070","name":"National Institute of Biomedical Imaging and Bioengineering","doi-asserted-by":"publisher","award":["U01EB023685"],"award-info":[{"award-number":["U01EB023685"]}],"id":[{"id":"10.13039\/100000070","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006093","name":"Patient-Centered Outcomes Research Institute","doi-asserted-by":"publisher","award":["ME-1310-07058"],"award-info":[{"award-number":["ME-1310-07058"]}],"id":[{"id":"10.13039\/100006093","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000057","name":"National Institute of General Medical Sciences","doi-asserted-by":"publisher","award":["R01GM118574"],"award-info":[{"award-number":["R01GM118574"]}],"id":[{"id":"10.13039\/100000057","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000092","name":"U.S. National Library of Medicine","doi-asserted-by":"publisher","award":["R21LM012060"],"award-info":[{"award-number":["R21LM012060"]}],"id":[{"id":"10.13039\/100000092","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["RGPIN-2015-04147"],"award-info":[{"award-number":["RGPIN-2015-04147"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000051","name":"National Human Genome Research Institute","doi-asserted-by":"publisher","award":["R00HG008175"],"award-info":[{"award-number":["R00HG008175"]}],"id":[{"id":"10.13039\/100000051","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000051","name":"National Human Genome Research Institute","doi-asserted-by":"publisher","award":["R01GM118609"],"award-info":[{"award-number":["R01GM118609"]}],"id":[{"id":"10.13039\/100000051","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,5,21]]},"DOI":"10.1093\/bib\/bbx139","type":"journal-article","created":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T19:09:59Z","timestamp":1507057799000},"page":"887-895","source":"Crossref","is-referenced-by-count":56,"title":["Privacy-preserving techniques of genomic data\u2014a survey"],"prefix":"10.1093","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6161-8275","authenticated-orcid":false,"given":"Md Momin Al","family":"Aziz","sequence":"first","affiliation":[{"name":"Department of Computer Science at the University of Manitoba, Winnipeg, Canada"}]},{"given":"Md Nazmus","family":"Sadat","sequence":"additional","affiliation":[{"name":"Department of Computer Science at the University of Manitoba, Winnipeg, Canada"}]},{"given":"Dima","family":"Alhadidi","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science at the University of New Brunswick, Frederiction, Canada"}]},{"given":"Shuang","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Biomedical Informatics at the University of California in San Diego, La Jolla, CA, USA"}]},{"given":"Xiaoqian","family":"Jiang","sequence":"additional","affiliation":[{"name":"Department of Biomedical Informatics at the University of California in San Diego, La Jolla, CA, USA"}]},{"given":"Cheryl L","family":"Brown","sequence":"additional","affiliation":[{"name":"Department of Political Science and Public Administration at the University of North Carolina at Charlotte, NC, USA"}]},{"given":"Noman","family":"Mohammed","sequence":"additional","affiliation":[{"name":"Department of Computer Science at the University of Manitoba, Winnipeg, Canada"}]}],"member":"286","published-online":{"date-parts":[[2017,11,7]]},"reference":[{"key":"2019062007300791300_bbx139-B1","author":"DNA Sequencing Costs"},{"key":"2019062007300791300_bbx139-B2","volume-title":"Genomes and What to Make of Them","author":"Barnes","year":"2009"},{"issue":"8","key":"2019062007300791300_bbx139-B3","doi-asserted-by":"crossref","first-page":"486","DOI":"10.1097\/GIM.0b013e3181e38f9e","article-title":"Genomic research and wide data sharing: views of prospective participants","volume":"12","author":"Trinidad","year":"2010","journal-title":"Genet Med"},{"key":"2019062007300791300_bbx139-B4","author":"Malin","year":"2000"},{"issue":"7284","key":"2019062007300791300_bbx139-B5","first-page":"449","article-title":"Us employer agrees to stop genetic testing","volume":"322","author":"Gottlieb","year":"2001","journal-title":"BMJ"},{"issue":"5681","key":"2019062007300791300_bbx139-B6","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1126\/science.1095019","article-title":"Genomic research and human subject privacy","volume":"305","author":"Lin","year":"2004","journal-title":"Science"},{"issue":"8","key":"2019062007300791300_bbx139-B7","doi-asserted-by":"crossref","first-page":"e1000167","DOI":"10.1371\/journal.pgen.1000167","article-title":"Resolving individuals contributing trace amounts of dna to highly complex mixtures using high-density SNP genotyping microarrays","volume":"4","author":"Homer","year":"2008","journal-title":"PLoS Genet"},{"key":"2019062007300791300_bbx139-B8","author":"Goodrich","year":"2009"},{"key":"2019062007300791300_bbx139-B9","author":"Humbert","year":"2013"},{"key":"2019062007300791300_bbx139-B10","doi-asserted-by":"crossref","DOI":"10.2139\/ssrn.2257732","article-title":"Identifying participants in the personal genome project by name","author":"Sweeney","year":"2013"},{"issue":"6117","key":"2019062007300791300_bbx139-B11","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1126\/science.1229566","article-title":"Identifying personal genomes by surname inference","volume":"339","author":"Gymrek","year":"2013","journal-title":"Science"},{"key":"2019062007300791300_bbx139-B12","author":"Fredrikson","year":"2014"},{"issue":"5","key":"2019062007300791300_bbx139-B13","doi-asserted-by":"crossref","first-page":"631","DOI":"10.1016\/j.ajhg.2015.09.010","article-title":"Privacy risks from genomic data-sharing beacons","volume":"97","author":"Shringarpure","year":"2015","journal-title":"Am J Hum Genet"},{"issue":"4","key":"2019062007300791300_bbx139-B14","doi-asserted-by":"crossref","first-page":"799","DOI":"10.1093\/jamia\/ocw167","article-title":"Addressing beacon re-identification attacks: quantification and mitigation of privacy risks","volume":"24","author":"Raisaro","year":"2017","journal-title":"J Am Med Inform Assoc"},{"issue":"3","key":"2019062007300791300_bbx139-B15","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1038\/nmeth.3746","article-title":"Quantification of private information leakage from phenotype-genotype data: linking attacks","volume":"13","author":"Harmanci","year":"2016","journal-title":"Nat Methods"},{"issue":"12","key":"2019062007300791300_bbx139-B16","doi-asserted-by":"crossref","first-page":"1687","DOI":"10.1101\/gr.206870.116","article-title":"A privacy-preserving solution for compressed storage and selective retrieval of genomic data","volume":"26","author":"Huang","year":"2016","journal-title":"Genome Res"},{"issue":"1","key":"2019062007300791300_bbx139-B17","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1145\/2767007","article-title":"Privacy in the genomic era","volume":"48","author":"Naveed","year":"2015","journal-title":"ACM Comput Surv"},{"issue":"6","key":"2019062007300791300_bbx139-B18","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1038\/nrg3723","article-title":"Routes for breaching and protecting genetic privacy","volume":"15","author":"Erlich","year":"2014","journal-title":"Nat Rev Genet"},{"issue":"1","key":"2019062007300791300_bbx139-B19","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1111\/nyas.13259","article-title":"Genome privacy: challenges, technical approaches to mitigate risk, and ethical considerations in the united states","volume":"1387","author":"Wang","year":"2017","journal-title":"Ann N Y Acad Sci"},{"key":"2019062007300791300_bbx139-B20","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/j.jbi.2015.05.022","article-title":"Privacy preserving processing of genomic data: a survey","volume":"56","author":"Akg\u00fcn","year":"2015","journal-title":"J Biomed Inform"},{"key":"2019062007300791300_bbx139-B21","author":"Raisaro","year":"2017"},{"key":"2019062007300791300_bbx139-B22","author":"Armknecht","year":"2015"},{"key":"2019062007300791300_bbx139-B23","author":"Paillier","year":"1999"},{"issue":"5","key":"2019062007300791300_bbx139-B24","doi-asserted-by":"crossref","first-page":"606","DOI":"10.1109\/TITB.2007.908465","article-title":"A cryptographic approach to securely share and query genomic sequences","volume":"12","author":"Kantarcioglu","year":"2008","journal-title":"IEEE Trans Inf Technol Biomed"},{"key":"2019062007300791300_bbx139-B25","author":"Aziz","year":"2016"},{"issue":"5","key":"2019062007300791300_bbx139-B26","doi-asserted-by":"crossref","first-page":"1466","DOI":"10.1109\/JBHI.2016.2625299","article-title":"Private and efficient query processing on outsourced genomic databases","volume":"21","author":"Ghasemi","year":"2017","journal-title":"IEEE J Biomed Health Inform"},{"key":"2019062007300791300_bbx139-B27","author":"Ayday","year":"2013"},{"key":"2019062007300791300_bbx139-B28","author":"Damg\u00e5rd","year":"2007"},{"key":"2019062007300791300_bbx139-B29","author":"Lauter","year":"2014"},{"key":"2019062007300791300_bbx139-B30","author":"Gentry","year":"2011"},{"key":"2019062007300791300_bbx139-B31","author":"Dijk","year":"2010"},{"key":"2019062007300791300_bbx139-B32","author":"Chillotti","year":"2016"},{"key":"2019062007300791300_bbx139-B33","author":"Cheon","year":"2015"},{"key":"2019062007300791300_bbx139-B34","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1016\/j.jbi.2014.04.003","article-title":"Private predictive analysis on encrypted medical data","volume":"50","author":"Bos","year":"2014","journal-title":"J Biomed Inform"},{"issue":"2","key":"2019062007300791300_bbx139-B35","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1093\/bioinformatics\/btv563","article-title":"HEALER: homomorphic computation of ExAct logistic rEgRession for secure rare disease variants analysis in GWAS","volume":"32","author":"Wang","year":"2016","journal-title":"Bioinformatics"},{"key":"2019062007300791300_bbx139-B36","author":"Lu","year":"2015"},{"key":"2019062007300791300_bbx139-B37","doi-asserted-by":"crossref","first-page":"S5","DOI":"10.1186\/1472-6947-15-S5-S5","article-title":"FORESEE: fully outsourced secuRe gEnome Study basEd on homomorphic Encryption","volume":"15","author":"Zhang","year":"2015","journal-title":"BMC Med Inform Decis Mak"},{"issue":"11","key":"2019062007300791300_bbx139-B38","doi-asserted-by":"crossref","first-page":"1652","DOI":"10.1093\/bioinformatics\/btw050","article-title":"Efficient privacy-preserving string search and an application in genomics","volume":"32","author":"Shimizu","year":"2016","journal-title":"Bioinformatics"},{"issue":"4","key":"2019062007300791300_bbx139-B39","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1515\/popets-2016-0033","article-title":"Efficient server-aided secure two-party function evaluation with applications to genomic computation","volume":"2016","author":"Blanton","year":"2016","journal-title":"Proc Priv Enhanc Technol"},{"key":"2019062007300791300_bbx139-B40","author":"Baldi","year":"2011"},{"key":"2019062007300791300_bbx139-B41","year":"2017"},{"issue":"2","key":"2019062007300791300_bbx139-B42","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1186\/s12920-017-0276-z","article-title":"Private queries on encrypted genomic data","volume":"10","author":"\u00c7etin","year":"2017","journal-title":"BMC Med Genomics"},{"issue":"2","key":"2019062007300791300_bbx139-B43","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1186\/s12920-017-0280-3","article-title":"Secure searching of biomarkers through hybrid homomorphic encryption scheme","volume":"10","author":"Kim","year":"2017","journal-title":"BMC Med Genomics"},{"issue":"2","key":"2019062007300791300_bbx139-B44","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1186\/s12920-017-0277-y","article-title":"Bloom: bloom filter based oblivious outsourced matchings","volume":"10","author":"Ziegeldorf","year":"2017","journal-title":"BMC Med Genomics"},{"issue":"2","key":"2019062007300791300_bbx139-B45","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1186\/s12920-017-0275-0","article-title":"Efficient and secure outsourcing of genomic data storage","volume":"10","author":"Sousa","year":"2017","journal-title":"BMC Med Genomics"},{"key":"2019062007300791300_bbx139-B46","author":"Brakerski","year":"2012"},{"key":"2019062007300791300_bbx139-B47","author":"Fan","year":"2012"},{"key":"2019062007300791300_bbx139-B48","author":"Dai","year":"2015"},{"key":"2019062007300791300_bbx139-B49","author":"Ducas","year":"2015"},{"key":"2019062007300791300_bbx139-B50","volume-title":"Proceedings of the 3rd ACM Workshop on Cloud","author":"Naehrig","year":"2011"},{"key":"2019062007300791300_bbx139-B51","author":"Yao","year":"1982"},{"key":"2019062007300791300_bbx139-B52","author":"Jha","year":"2008"},{"key":"2019062007300791300_bbx139-B53","author":"Wang","year":"2015"},{"key":"2019062007300791300_bbx139-B54","author":"Wang","year":"2015"},{"key":"2019062007300791300_bbx139-B55","author":"Wang","year":"2009"},{"key":"2019062007300791300_bbx139-B56","author":"Gilad","year":"2017"},{"key":"2019062007300791300_bbx139-B57","author":"Hasan","year":"2017"},{"key":"2019062007300791300_bbx139-B58","author":"Zhu","year":"2017"},{"issue":"2","key":"2019062007300791300_bbx139-B59","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1186\/s12920-017-0279-9","article-title":"Secure approximation of edit distance on genomic data","volume":"10","author":"Aziz","year":"2017","journal-title":"BMC Med Genomics"},{"key":"2019062007300791300_bbx139-B60","author":"Liu"},{"key":"2019062007300791300_bbx139-B61","author":"Huang"},{"key":"2019062007300791300_bbx139-B62","author":"Wang","year":"2015"},{"key":"2019062007300791300_bbx139-B63","author":"Demmler","year":"2015"},{"key":"2019062007300791300_bbx139-B64","author":"Songhori","year":"2015"},{"issue":"7","key":"2019062007300791300_bbx139-B65","doi-asserted-by":"crossref","first-page":"886","DOI":"10.1093\/bioinformatics\/btt066","article-title":"A new way to protect privacy in large-scale genome-wide association studies","volume":"29","author":"Kamm","year":"2013","journal-title":"Bioinformatics"},{"issue":"1","key":"2019062007300791300_bbx139-B66","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1109\/TITB.2011.2171701","article-title":"Secure management of biomedical data with cryptographic hardware","volume":"16","author":"Canim","year":"2012","journal-title":"IEEE Trans Inf Technol Biomed"},{"key":"2019062007300791300_bbx139-B67","author":"Chen","year":"2016"},{"key":"2019062007300791300_bbx139-B68","doi-asserted-by":"crossref","first-page":"871","DOI":"10.1093\/bioinformatics\/btw758","article-title":"PRINCESS: privacy-protecting rare disease International Network Collaboration via Encryption through software guard extensionS","volume":"33","author":"Chen","year":"2017","journal-title":"Bioinformatics"},{"key":"2019062007300791300_bbx139-B69","author":"Kerschbaum","year":"2017"},{"key":"2019062007300791300_bbx139-B70","author":"Vavala","year":"2017"},{"key":"2019062007300791300_bbx139-B71","author":"Kaplan","year":"2016"},{"key":"2019062007300791300_bbx139-B72","author":"Johnson","year":"2013"},{"key":"2019062007300791300_bbx139-B73","author":"Yu","year":"2014"},{"key":"2019062007300791300_bbx139-B74","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/j.jbi.2014.01.008","article-title":"Scalable privacy-preserving data sharing methodology for genome-wide association studies","volume":"50","author":"Yu","year":"2014","journal-title":"J Biomed Inform"},{"key":"2019062007300791300_bbx139-B75","author":"Tram\u00e8r","year":"2015"},{"issue":"9","key":"2019062007300791300_bbx139-B76","doi-asserted-by":"crossref","first-page":"1293","DOI":"10.1093\/bioinformatics\/btw009","article-title":"Realizing privacy preserving genome-wide association studies","volume":"32","author":"Simmons","year":"2016","journal-title":"Bioinformatics"},{"issue":"1","key":"2019062007300791300_bbx139-B77","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1016\/j.cels.2016.04.013","article-title":"Enabling privacy-preserving GWASs in heterogeneous human populations","volume":"3","author":"Simmons","year":"2016","journal-title":"Cell Syst"},{"issue":"1","key":"2019062007300791300_bbx139-B78","first-page":"137","article-title":"Privacy-preserving data sharing for genome-wide association studies","volume":"5","author":"Uhlerop","year":"2013","journal-title":"J Priv Confid"},{"key":"2019062007300791300_bbx139-B79","doi-asserted-by":"crossref","first-page":"S2","DOI":"10.1186\/1472-6947-14-S1-S2","article-title":"Differentially private genome data dissemination through top-down specialization","volume":"14(Suppl 1)","author":"Wang","year":"2014","journal-title":"BMC Med Inform Decis Mak"},{"key":"2019062007300791300_bbx139-B80","author":"Froelicher","year":"2017"},{"issue":"2","key":"2019062007300791300_bbx139-B81","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1186\/s12920-017-0278-x","article-title":"Aftermath of bustamante attack on genomic beacon service","volume":"10","author":"Aziz","year":"2017","journal-title":"BMC Med Genomics"},{"key":"2019062007300791300_bbx139-B82","year":"2016"},{"issue":"2","key":"2019062007300791300_bbx139-B83","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1186\/s12920-017-0282-1","article-title":"Controlling the signal: practical privacy protection of genomic data sharing through beacon services","volume":"10","author":"Wan","year":"2017","journal-title":"BMC Med Genomics"},{"key":"2019062007300791300_bbx139-B84","author":"McSherry","year":"2009"}],"container-title":["Briefings in Bioinformatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/bib\/article-pdf\/20\/3\/887\/28847149\/bbx139.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,26]],"date-time":"2023-08-26T18:31:30Z","timestamp":1693074690000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/bib\/article\/20\/3\/887\/4600334"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,7]]},"references-count":84,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2017,11,7]]},"published-print":{"date-parts":[[2019,5,21]]}},"URL":"https:\/\/doi.org\/10.1093\/bib\/bbx139","relation":{},"ISSN":["1477-4054"],"issn-type":[{"value":"1477-4054","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2019,5]]},"published":{"date-parts":[[2017,11,7]]}}}