{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T14:45:02Z","timestamp":1774622702481,"version":"3.50.1"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100012025","name":"New York University Abu Dhabi Global Ph.D. Fellowship Program","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100012025","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000002","name":"U.S. National Institutes of Health","doi-asserted-by":"publisher","award":["K99 HG010909"],"award-info":[{"award-number":["K99 HG010909"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000002","name":"U.S. National Institutes of Health","doi-asserted-by":"publisher","award":["R01 HG010749"],"award-info":[{"award-number":["R01 HG010749"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3093005","type":"journal-article","created":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T21:23:08Z","timestamp":1624915388000},"page":"93097-93110","source":"Crossref","is-referenced-by-count":37,"title":["Fast and Scalable Private Genotype Imputation Using Machine Learning and Partially Homomorphic Encryption"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4473-7368","authenticated-orcid":false,"given":"Esha","family":"Sarkar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1938-912X","authenticated-orcid":false,"given":"Eduardo","family":"Chielle","sequence":"additional","affiliation":[]},{"given":"Gamze","family":"Gursoy","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5131-9044","authenticated-orcid":false,"given":"Oleg","family":"Mazonka","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9746-3719","authenticated-orcid":false,"given":"Mark","family":"Gerstein","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6899-0651","authenticated-orcid":false,"given":"Michail","family":"Maniatakos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s00439-013-1266-7"},{"key":"ref38","year":"2020","journal-title":"iDASH&#x2019;19 Genome Security and Privacy Challenge"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_14"},{"key":"ref32","author":"chillotti","year":"2016","journal-title":"TFHE Fast Fully Homomorphic Encryption Library"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pgen.1007856"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1111\/j.1529-8817.2005.00236.x"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"ref35","first-page":"201","article-title":"CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy","volume":"48","author":"dowlin","year":"2016","journal-title":"Proc ICML"},{"key":"ref34","article-title":"E3: A framework for compiling C++ programs with encrypted operands","author":"chielle","year":"2018"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1038\/ng.2354"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1159\/000489758"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ajhg.2009.01.005"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-42045-0_12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1038\/nbt.4108"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00035"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-5864-6.ch019"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2014.04.003"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2019.8741036"},{"key":"ref19","year":"2019"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3394658"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1038\/nrg.2016.162"},{"key":"ref27","first-page":"493","article-title":"BatchCrypt: Efficient homomorphic encryption for cross-silo federated learning","author":"zhang","year":"2020","journal-title":"Proc Annu Tech Conf (USENIX ATC)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1038\/527S2a"},{"key":"ref6","author":"cloud","year":"2021","journal-title":"Handling Genomic Data in the Cloud White Paper"},{"key":"ref29","article-title":"NAOMI: Non-autoregressive multiresolution sequence imputation","volume":"32","author":"liu","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref5","year":"2016","journal-title":"NHLBI Trans-Omics for Precision Medicine"},{"key":"ref8","year":"2021","journal-title":"Provides Molecular Genetics Laboratories"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1038\/ng.3656"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1038\/ng.3656"},{"key":"ref9","year":"2021","journal-title":"General Data Protection Regulation"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMra0905980"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1038\/ng.2653"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1038\/nature15393"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1038\/ng.3643"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(96)00142-2"},{"key":"ref41","year":"2016","journal-title":"Recommendation for key management"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2767007"},{"key":"ref26","article-title":"Encryption performance improvements of the Paillier cryptosystem","author":"jost","year":"2015"},{"key":"ref25","year":"2016","journal-title":"Gnu Multiple Precision Arithmetic Library"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09466098.pdf?arnumber=9466098","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:56:47Z","timestamp":1639771007000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9466098\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3093005","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}