{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:16:11Z","timestamp":1750306571473,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T00:00:00Z","timestamp":1414972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"CASED"},{"name":"COMMIT"},{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,3]]},"DOI":"10.1145\/2665943.2665962","type":"proceedings-article","created":{"date-parts":[[2014,11,7]],"date-time":"2014-11-07T17:10:54Z","timestamp":1415380254000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM"],"prefix":"10.1145","author":[{"given":"Nikolaos","family":"Karvelas","sequence":"first","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]},{"given":"Andreas","family":"Peter","sequence":"additional","affiliation":[{"name":"University of Twente, Twente, Netherlands"}]},{"given":"Stefan","family":"Katzenbeisser","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]},{"given":"Erik","family":"Tews","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]},{"given":"Kay","family":"Hamacher","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2014,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1093\/hmg\/8.5.805"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27576-0_23"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1089\/bio.2013.0036"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1038\/nrg2346"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315309"},{"key":"e_1_3_2_1_6_1","first-page":"49","article-title":"Secure outsourcing of DNA searching via finite automata","author":"Blanton M.","year":"2010","unstructured":"M. Blanton and M. Aliasgari , \" Secure outsourcing of DNA searching via finite automata ,\" in DBSec , 2010 , pp. 49 -- 64 . M. Blanton and M. Aliasgari, \"Secure outsourcing of DNA searching via finite automata,\" in DBSec, 2010, pp. 49--64.","journal-title":"DBSec"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03007-9_6"},{"key":"e_1_3_2_1_8_1","first-page":"523","article-title":"Third-party private DFA evaluation on encrypted files in the cloud","author":"Wei L.","year":"2012","unstructured":"L. Wei and M. K. Reiter , \" Third-party private DFA evaluation on encrypted files in the cloud ,\" in ESORICS , 2012 , pp. 523 -- 540 . L. Wei and M. K. Reiter, \"Third-party private DFA evaluation on encrypted files in the cloud,\" in ESORICS, 2012, pp. 523--540.","journal-title":"ESORICS"},{"key":"e_1_3_2_1_9_1","first-page":"147","article-title":"Ensuring file authenticity in private DFA evaluation on encrypted files in the cloud","author":"Wei L.","year":"2013","unstructured":"L. Wei and M. K. Reiter , \" Ensuring file authenticity in private DFA evaluation on encrypted files in the cloud ,\" in ESORICS , 2013 , pp. 147 -- 163 . ___, \"Ensuring file authenticity in private DFA evaluation on encrypted files in the cloud,\" in ESORICS, 2013, pp. 147--163.","journal-title":"ESORICS"},{"key":"e_1_3_2_1_10_1","volume-title":"Privacy-preserving matching of DNA profiles,\" IACR ePrint","author":"Bruekers F.","year":"2008","unstructured":"F. Bruekers , S. Katzenbeisser , K. Kursawe , and P. Tuyls , \" Privacy-preserving matching of DNA profiles,\" IACR ePrint , vol. 2008 , 2008 . F. Bruekers, S. Katzenbeisser, K. Kursawe, and P. Tuyls, \"Privacy-preserving matching of DNA profiles,\" IACR ePrint, vol. 2008, 2008."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866361"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046785"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517843"},{"key":"e_1_3_2_1_14_1","volume-title":"Large-scale privacy-preserving mapping of human genomic sequences on hybrid clouds,\" in NDSS","author":"Chen Y.","year":"2012","unstructured":"Y. Chen , B. Peng , X. Wang , and H. Tang , \" Large-scale privacy-preserving mapping of human genomic sequences on hybrid clouds,\" in NDSS , 2012 . Y. Chen, B. Peng, X. Wang, and H. Tang, \"Large-scale privacy-preserving mapping of human genomic sequences on hybrid clouds,\" in NDSS, 2012."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"e_1_3_2_1_16_1","first-page":"37","article-title":"A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications","author":"Bresson E.","year":"2003","unstructured":"E. Bresson , D. Catalano , and D. Pointcheval , \" A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications ,\" in ASIACRYPT , 2003 , pp. 37 -- 54 . E. Bresson, D. Catalano, and D. Pointcheval, \"A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications,\" in ASIACRYPT, 2003, pp. 37--54.","journal-title":"ASIACRYPT"},{"key":"e_1_3_2_1_17_1","first-page":"127","article-title":"Divertible protocols and atomic proxy cryptography","author":"Blaze M.","year":"1998","unstructured":"M. Blaze , G. Bleumer , and M. Strauss , \" Divertible protocols and atomic proxy cryptography ,\" in EUROCRYPT , 1998 , pp. 127 -- 144 . M. Blaze, G. Bleumer, and M. Strauss, \"Divertible protocols and atomic proxy cryptography,\" in EUROCRYPT, 1998, pp. 127--144.","journal-title":"EUROCRYPT"},{"key":"e_1_3_2_1_18_1","volume-title":"Proxy cryptography revisited,\" in NDSS","author":"Ivan A.-A.","year":"2003","unstructured":"A.-A. Ivan and Y. Dodis , \" Proxy cryptography revisited,\" in NDSS . The Internet Society , 2003 . A.-A. Ivan and Y. Dodis, \"Proxy cryptography revisited,\" in NDSS. The Internet Society, 2003."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"e_1_3_2_1_20_1","first-page":"470","article-title":"Cryptographically strong undeniable signatures, unconditionally secure for the signer","author":"Chaum D.","year":"1991","unstructured":"D. Chaum , E. van Heijst , and B. Pfitzmann , \" Cryptographically strong undeniable signatures, unconditionally secure for the signer ,\" in CRYPTO , 1991 , pp. 470 -- 484 . D. Chaum, E. van Heijst, and B. Pfitzmann, \"Cryptographically strong undeniable signatures, unconditionally secure for the signer,\" in CRYPTO, 1991, pp. 470--484.","journal-title":"CRYPTO"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-008-9036-8"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382278"},{"key":"e_1_3_2_1_24_1","volume-title":"Faster secure two-party computation using garbled circuits,\" in USENIX Security","author":"Huang Y.","year":"2011","unstructured":"Y. Huang , D. Evans , J. Katz , and L. Malka , \" Faster secure two-party computation using garbled circuits,\" in USENIX Security , 2011 . Y. Huang, D. Evans, J. Katz, and L. Malka, \"Faster secure two-party computation using garbled circuits,\" in USENIX Security, 2011."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455790"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382299"},{"key":"e_1_3_2_1_27_1","first-page":"143","article-title":"On the (in) security of hash-based oblivious RAM and a new balancing scheme","author":"Kushilevitz E.","year":"2012","unstructured":"E. Kushilevitz , S. Lu , and R. Ostrovsky , \" On the (in) security of hash-based oblivious RAM and a new balancing scheme ,\" in SODA , 2012 , pp. 143 -- 156 . E. Kushilevitz, S. Lu, and R. Ostrovsky, \"On the (in) security of hash-based oblivious RAM and a new balancing scheme,\" in SODA, 2012, pp. 143--156.","journal-title":"SODA"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2010.07.024"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516660"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27576-0_11"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_7"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516673"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.39"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1186\/2041-2223-4-22"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1122655"},{"key":"e_1_3_2_1_36_1","unstructured":"\"European network of excellence in cryptology II \" http:\/\/www.keylength.com\/en\/3\/.  \"European network of excellence in cryptology II \" http:\/\/www.keylength.com\/en\/3\/."}],"event":{"name":"CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Scottsdale Arizona USA","acronym":"CCS'14"},"container-title":["Proceedings of the 13th Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2665943.2665962","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2665943.2665962","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:13:25Z","timestamp":1750227205000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2665943.2665962"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,3]]},"references-count":36,"alternative-id":["10.1145\/2665943.2665962","10.1145\/2665943"],"URL":"https:\/\/doi.org\/10.1145\/2665943.2665962","relation":{},"subject":[],"published":{"date-parts":[[2014,11,3]]},"assertion":[{"value":"2014-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}