{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T19:09:05Z","timestamp":1772910545438,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1111599,1464113,1117106,1223477,1223495,1408874"],"award-info":[{"award-number":["1111599,1464113,1117106,1223477,1223495,1408874"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000002","name":"National Institutes of Health","doi-asserted-by":"publisher","award":["HG007078"],"award-info":[{"award-number":["HG007078"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813725","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"492-503","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":89,"title":["Efficient Genome-Wide, Privacy-Preserving Similar Patient Query based on Private Edit Distance"],"prefix":"10.1145","author":[{"given":"Xiao Shaun","family":"Wang","sequence":"first","affiliation":[{"name":"Univeristy of Maryland, College Park, MD, USA"}]},{"given":"Yan","family":"Huang","sequence":"additional","affiliation":[{"name":"Indiana University, Bloomington, IN, USA"}]},{"given":"Yongan","family":"Zhao","sequence":"additional","affiliation":[{"name":"Indiana University, Bloomington, IN, USA"}]},{"given":"Haixu","family":"Tang","sequence":"additional","affiliation":[{"name":"Indiana University, Bloomington, IN, USA"}]},{"given":"XiaoFeng","family":"Wang","sequence":"additional","affiliation":[{"name":"Indiana University, Bloomington, IN, USA"}]},{"given":"Diyue","family":"Bu","sequence":"additional","affiliation":[{"name":"Indiana University, Bloomington, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"PatientsLikeMe. https:\/\/www.patientslikeme.com. Accessed on May 8 2015.  PatientsLikeMe. https:\/\/www.patientslikeme.com. Accessed on May 8 2015."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237823"},{"key":"e_1_3_2_1_3_1","volume-title":"Construction of age-related reference centiles using absolute residuals. Statistics in medicine","author":"Altman D. G.","year":"1993","unstructured":"Altman , D. G. Construction of age-related reference centiles using absolute residuals. Statistics in medicine ( 1993 ). Altman, D. G. Construction of age-related reference centiles using absolute residuals. Statistics in medicine (1993)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536444"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516738"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1005140.1005147"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046785"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2004.14"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196771"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237996"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258637"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.39"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62213"},{"key":"e_1_3_2_1_14_1","volume-title":"Aligning multiple genomic sequences with the threaded blockset aligner. Genome research","author":"Blanchette M.","year":"2004","unstructured":"Blanchette , M. , Kent , W. J. , Riemer , C. , Elnitski , L. , Smit , A. F. , Roskin , K. M. , Baertsch , R. , Rosenbloom , K. , Clawson , H. , Green , E. D. , Aligning multiple genomic sequences with the threaded blockset aligner. Genome research ( 2004 ). Blanchette, M., Kent, W. J., Riemer, C., Elnitski, L., Smit, A. F., Roskin, K. M., Baertsch, R., Rosenbloom, K., Clawson, H., Green, E. D., et al. Aligning multiple genomic sequences with the threaded blockset aligner. Genome research (2004)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"e_1_3_2_1_16_1","volume-title":"Espresso: efficient privacy-preserving evaluation of sample set similarity. Journal of Computer Security","author":"Blundo C.","year":"2014","unstructured":"Blundo , C. , De Cristofaro , E. , and Gasti , P . Espresso: efficient privacy-preserving evaluation of sample set similarity. Journal of Computer Security ( 2014 ). Blundo, C., De Cristofaro, E., and Gasti, P. Espresso: efficient privacy-preserving evaluation of sample set similarity. Journal of Computer Security (2014)."},{"key":"e_1_3_2_1_17_1","volume-title":"Lagan and multi-lagan: efficient tools for large-scale multiple alignment of genomic dna. Genome research","author":"Brudno M.","year":"2003","unstructured":"Brudno , M. , Do , C. B. , Cooper , G. M. , Kim , M. F. , Davydov , E. , Green , E. D. , Sidow , A. , Batzoglou , S. , Program , N. C. S. , Lagan and multi-lagan: efficient tools for large-scale multiple alignment of genomic dna. Genome research ( 2003 ). Brudno, M., Do, C. B., Cooper, G. M., Kim, M. F., Davydov, E., Green, E. D., Sidow, A., Batzoglou, S., Program, N. C. S., et al. Lagan and multi-lagan: efficient tools for large-scale multiple alignment of genomic dna. Genome research (2003)."},{"key":"e_1_3_2_1_18_1","volume-title":"The personal genome project. Molecular Systems Biology","author":"Church G. M.","year":"2005","unstructured":"Church , G. M. The personal genome project. Molecular Systems Biology ( 2005 ). Church, G. M. The personal genome project. Molecular Systems Biology (2005)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"e_1_3_2_1_20_1","volume-title":"N. P., and Zakarias, S. Multiparty computation from somewhat homomorphic encryption. In CRYPTO","author":"Damg\u00e5rd I.","year":"2012","unstructured":"Damg\u00e5rd , I. , Pastro , V. , Smart , N. P., and Zakarias, S. Multiparty computation from somewhat homomorphic encryption. In CRYPTO ( 2012 ). Damg\u00e5rd, I., Pastro, V., Smart, N. P., and Zakarias, S. Multiparty computation from somewhat homomorphic encryption. In CRYPTO (2012)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516701"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018462"},{"key":"e_1_3_2_1_23_1","volume-title":"Moving towards individualized medicine with pharmacogenomics. Nature","author":"Evans W. E.","year":"2004","unstructured":"Evans , W. E. , and Relling , M. V . Moving towards individualized medicine with pharmacogenomics. Nature ( 2004 ). Evans, W. E., and Relling, M. V. Moving towards individualized medicine with pharmacogenomics. Nature (2004)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/646254.684251"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539799361701"},{"key":"e_1_3_2_1_26_1","volume-title":"DMTCS Proceedings","author":"Flajolet P.","year":"2008","unstructured":"Flajolet , P. , Fusy , \u00c9., Gandouet , O. , and Meunier , F . Hyperloglog: the analysis of a near-optimal cardinality estimation algorithm . DMTCS Proceedings ( 2008 ). Flajolet, P., Fusy, \u00c9., Gandouet, O., and Meunier, F. Hyperloglog: the analysis of a near-optimal cardinality estimation algorithm. DMTCS Proceedings (2008)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_32"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74208-1_35"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"e_1_3_2_1_30_1","volume-title":"Assessing the privacy risks of data sharing in genomics. Public health genomics","author":"Heeney C.","year":"2011","unstructured":"Heeney , C. , Hawkins , N. , De Vries , J. , Boddington , P. , and Kaye , J . Assessing the privacy risks of data sharing in genomics. Public health genomics ( 2011 ). Heeney, C., Hawkins, N., De Vries, J., Boddington, P., and Kaye, J. Assessing the privacy risks of data sharing in genomics. Public health genomics (2011)."},{"key":"e_1_3_2_1_31_1","volume-title":"USENIX Security Symposium","author":"Huang Y.","year":"2011","unstructured":"Huang , Y. , Evans , D. , Katz , J. , and Malka , L . Faster secure two-party computation using garbled circuits . In USENIX Security Symposium ( 2011 ). Huang, Y., Evans, D., Katz, J., and Malka, L. Faster secure two-party computation using garbled circuits. In USENIX Security Symposium (2011)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.43"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_9"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_32"},{"key":"e_1_3_2_1_35_1","volume-title":"Algorithms for clustering data","author":"Jain A. K.","year":"1988","unstructured":"Jain , A. K. , Dubes , R. C. , Algorithms for clustering data . 1988 . Jain, A. K., Dubes, R. C., et al. Algorithms for clustering data. 1988."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72540-4_6"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70583-3_40"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/646765.704129"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72540-4_4"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-008-9036-8"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.46"},{"key":"e_1_3_2_1_42_1","volume-title":"USENIX Security Symposium","author":"Malkhi D.","year":"2004","unstructured":"Malkhi , D. , Nisan , N. , Pinkas , B. , and Sella , Y . Fairplay -- a secure two-party computation system . In USENIX Security Symposium ( 2004 ). Malkhi, D., Nisan, N., Pinkas, B., and Sella, Y. Fairplay -- a secure two-party computation system. In USENIX Security Symposium (2004)."},{"key":"e_1_3_2_1_43_1","volume-title":"SODA","author":"Naor M.","year":"2001","unstructured":"Naor , M. , and Pinkas , B . Efficient oblivious transfer protocols . In SODA ( 2001 ). Naor, M., and Pinkas, B. Efficient oblivious transfer protocols. In SODA (2001)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807085.1807101"},{"key":"e_1_3_2_1_45_1","volume-title":"Comprehensive molecular portraits of human breast tumours. Nature","author":"Network C. G. A.","year":"2012","unstructured":"Network , C. G. A. , Comprehensive molecular portraits of human breast tumours. Nature ( 2012 ). Network, C. G. A., et al. Comprehensive molecular portraits of human breast tumours. Nature (2012)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_40"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_15"},{"key":"e_1_3_2_1_48_1","volume-title":"dbsnp: the ncbi database of genetic variation. Nucleic acids research","author":"Sherry S. T.","year":"2001","unstructured":"Sherry , S. T. , Ward , M.-H. , Kholodov , M. , Baker , J. , Phan , L. , Smigielski , E. M. , and Sirotkin , K . dbsnp: the ncbi database of genetic variation. Nucleic acids research ( 2001 ). Sherry, S. T., Ward, M.-H., Kholodov, M., Baker, J., Phan, L., Smigielski, E. M., and Sirotkin, K. dbsnp: the ncbi database of genetic variation. Nucleic acids research (2001)."},{"key":"e_1_3_2_1_49_1","volume-title":"Mathematical correction for fingerprint similarity measures to improve chemical retrieval. Journal of chemical information and modeling","author":"Swamidass S. J.","year":"2007","unstructured":"Swamidass , S. J. , and Baldi , P . Mathematical correction for fingerprint similarity measures to improve chemical retrieval. Journal of chemical information and modeling ( 2007 ). Swamidass, S. J., and Baldi, P. Mathematical correction for fingerprint similarity measures to improve chemical retrieval. Journal of chemical information and modeling (2007)."},{"key":"e_1_3_2_1_50_1","volume-title":"Using genetic variation to study human disease. Trends in molecular medicine","author":"Taylor J. G.","year":"2001","unstructured":"Taylor , J. G. , Choi , E.-H. , Foster , C. B. , and Chanock , S. J . Using genetic variation to study human disease. Trends in molecular medicine ( 2001 ). Taylor, J. G., Choi, E.-H., Foster, C. B., and Chanock, S. J. Using genetic variation to study human disease. Trends in molecular medicine (2001)."},{"key":"e_1_3_2_1_51_1","volume-title":"SODA","author":"Thorup M.","year":"2004","unstructured":"Thorup , M. , and Zhang , Y . Tabulation based 4-universal hashing with applications to second moment estimation . In SODA ( 2004 ). Thorup, M., and Zhang, Y. Tabulation based 4-universal hashing with applications to second moment estimation. In SODA (2004)."},{"key":"e_1_3_2_1_52_1","volume-title":"Whole genomes redefine the mutational landscape of pancreatic cancer. Nature","author":"Waddell N.","year":"2015","unstructured":"Waddell , N. , Pajic , M. , Patch , A.-M. , Chang , D. K. , Kassahn , K. S. , Bailey , P. , Johns , A. L. , Miller , D. , Nones , K. , Quek , K. , Whole genomes redefine the mutational landscape of pancreatic cancer. Nature ( 2015 ). Waddell, N., Pajic, M., Patch, A.-M., Chang, D. K., Kassahn, K. S., Bailey, P., Johns, A. L., Miller, D., Nones, K., Quek, K., et al. Whole genomes redefine the mutational landscape of pancreatic cancer. Nature (2015)."},{"key":"e_1_3_2_1_53_1","volume-title":"Illuminating the future of dna sequencing. Genome Biol","author":"Watson M.","year":"2014","unstructured":"Watson , M. Illuminating the future of dna sequencing. Genome Biol ( 2014 ). Watson, M. Illuminating the future of dna sequencing. Genome Biol (2014)."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.5555\/1382436.1382751"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_8"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","location":"Denver Colorado USA","acronym":"CCS'15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813725","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813725","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:25Z","timestamp":1750225705000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813725"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":56,"alternative-id":["10.1145\/2810103.2813725","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813725","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}