{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:11:19Z","timestamp":1763017879416,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation of China","award":["U1736216"],"award-info":[{"award-number":["U1736216"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3196535","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"237-251","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":43,"title":["Secure Similar Sequence Query on Outsourced Genomic Data"],"prefix":"10.1145","author":[{"given":"Ke","family":"Cheng","sequence":"first","affiliation":[{"name":"Boise State University &amp;Anhui University, Boise, ID, USA"}]},{"given":"Yantian","family":"Hou","sequence":"additional","affiliation":[{"name":"Boise State University, Boise, ID, USA"}]},{"given":"Liangmin","family":"Wang","sequence":"additional","affiliation":[{"name":"Jiangsu University, Zhenjiang, China"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Secure approximation of edit distance on genomic data. BMC medical genomics","author":"Al Aziz Md Momin","year":"2017","unstructured":"Md Momin Al Aziz , Dima Alhadidi , and Noman Mohammed . 2017. Secure approximation of edit distance on genomic data. BMC medical genomics , Vol. 10 , 2 ( 2017 ), 41. Md Momin Al Aziz, Dima Alhadidi, and Noman Mohammed . 2017. Secure approximation of edit distance on genomic data. BMC medical genomics, Vol. 10, 2 (2017), 41."},{"key":"e_1_3_2_1_2_1","first-page":"144","article-title":"Privacy-Preserving Search of Similar Patients in Genomic Data","volume":"2017","author":"Asharov Gilad","year":"2017","unstructured":"Gilad Asharov , Shai Halevi , Yehuda Lindell , and Tal Rabin . 2017 . Privacy-Preserving Search of Similar Patients in Genomic Data . IACR Cryptology ePrint Archive Vol. 2017 (2017), 144 . Gilad Asharov, Shai Halevi, Yehuda Lindell, and Tal Rabin . 2017. Privacy-Preserving Search of Similar Patients in Genomic Data. IACR Cryptology ePrint Archive Vol. 2017 (2017), 144.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029179.1029204"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-005-0070-3"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2036230"},{"key":"e_1_3_2_1_6_1","volume-title":"Md Nazmus Sadat, Cenk Sahinalp, Kristin Lauter, and Shuang Wang .","author":"Chen Feng","year":"2017","unstructured":"Feng Chen , Chenghong Wang , Wenrui Dai , Xiaoqian Jiang , Noman Mohammed , Md Momin Al Aziz , Md Nazmus Sadat, Cenk Sahinalp, Kristin Lauter, and Shuang Wang . 2017 . PRESAGE : PRivacy-preserving gEnetic testing via SoftwAre Guard Extension. BMC medical genomics, Vol. 10 , 2 (2017), 48. Feng Chen, Chenghong Wang, Wenrui Dai, Xiaoqian Jiang, Noman Mohammed, Md Momin Al Aziz, Md Nazmus Sadat, Cenk Sahinalp, Kristin Lauter, and Shuang Wang . 2017. PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre Guard Extension. BMC medical genomics, Vol. 10, 2 (2017), 48."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Ke Cheng Yantian Hou and Liangmin Wang . 2018. Secure Similar Sequence Query on Outsourced Genomic Data. (2018). http:\/\/cs.boisestate.edu\/ yhou\/gene_search_tech_report.pdf  Ke Cheng Yantian Hou and Liangmin Wang . 2018. Secure Similar Sequence Query on Outsourced Genomic Data. (2018). http:\/\/cs.boisestate.edu\/ yhou\/gene_search_tech_report.pdf","DOI":"10.1145\/3196494.3196535"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_15"},{"key":"e_1_3_2_1_9_1","volume-title":"Privacy-Preserving Genetic Relatedness Test. arXiv preprint arXiv:1611.03006","author":"Cristofaro Emiliano De","year":"2016","unstructured":"Emiliano De Cristofaro , Kaitai Liang , and Yuruo Zhang . 2016. Privacy-Preserving Genetic Relatedness Test. arXiv preprint arXiv:1611.03006 ( 2016 ). Emiliano De Cristofaro, Kaitai Liang, and Yuruo Zhang . 2016. Privacy-Preserving Genetic Relatedness Test. arXiv preprint arXiv:1611.03006 (2016)."},{"key":"e_1_3_2_1_10_1","volume-title":"International Conference on Cryptology And Network Security (CANS'17)","author":"Demmler Daniel","year":"2017","unstructured":"Daniel Demmler , Kay Hamacher , Thomas Schneider , and Sebastian Stammler . 2017 . Privacy-Preserving Whole-Genome Variant Queries. 16 . International Conference on Cryptology And Network Security (CANS'17) (LNCS). Springer. http:\/\/thomaschneider.de\/papers\/DHSS17.pdf To appear. Daniel Demmler, Kay Hamacher, Thomas Schneider, and Sebastian Stammler . 2017. Privacy-Preserving Whole-Genome Variant Queries. 16. International Conference on Cryptology And Network Security (CANS'17) (LNCS). Springer. http:\/\/thomaschneider.de\/papers\/DHSS17.pdf To appear."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Daniel Demmler Thomas Schneider and Michael Zohner . 2015. ABY-A Framework for Efficient Mixed-Protocol Secure Two-Party Computation NDSS.  Daniel Demmler Thomas Schneider and Michael Zohner . 2015. ABY-A Framework for Efficient Mixed-Protocol Secure Two-Party Computation NDSS.","DOI":"10.14722\/ndss.2015.23113"},{"key":"e_1_3_2_1_12_1","volume-title":"2014 IEEE 30th International Conference on. IEEE, 664--675","author":"Elmehdwi Yousef","year":"2014","unstructured":"Yousef Elmehdwi , Bharath K Samanthula , and Wei Jiang . 2014 . Secure k-nearest neighbor query over encrypted data in outsourced environments Data Engineering (ICDE) , 2014 IEEE 30th International Conference on. IEEE, 664--675 . Yousef Elmehdwi, Bharath K Samanthula, and Wei Jiang . 2014. Secure k-nearest neighbor query over encrypted data in outsourced environments Data Engineering (ICDE), 2014 IEEE 30th International Conference on. IEEE, 664--675."},{"key":"e_1_3_2_1_13_1","volume-title":"Privacy-Preserving Genetic Relatedness Test. In GenoPri'16: 3rd International Workshop on Genome Privacy and Security","author":"Emiliano De Cristofaro","year":"2016","unstructured":"De Cristofaro Emiliano , Liang Kaitai , and Zhang Yuruo . 2016 . Privacy-Preserving Genetic Relatedness Test. In GenoPri'16: 3rd International Workshop on Genome Privacy and Security . Chicago, IL, USA. De Cristofaro Emiliano, Liang Kaitai, and Zhang Yuruo . 2016. Privacy-Preserving Genetic Relatedness Test. In GenoPri'16: 3rd International Workshop on Genome Privacy and Security. Chicago, IL, USA."},{"volume-title":"Foundations of cryptography","author":"Oded Goldreich","key":"e_1_3_2_1_14_1","unstructured":"Oded Goldreich . 2009. Foundations of cryptography : volume 2 , basic applications. Cambridge university press . Oded Goldreich . 2009. Foundations of cryptography: volume 2, basic applications. Cambridge university press."},{"key":"e_1_3_2_1_15_1","volume-title":"Md Safiur Rahman Mahdi, and Noman Mohammed","author":"Hasan Mohammad Zahidul","year":"2017","unstructured":"Mohammad Zahidul Hasan , Md Safiur Rahman Mahdi, and Noman Mohammed . 2017 . Secure Count Query on Encrypted Genomic Data . arXiv preprint arXiv:1703.01534 (2017). Mohammad Zahidul Hasan, Md Safiur Rahman Mahdi, and Noman Mohammed . 2017. Secure Count Query on Encrypted Genomic Data. arXiv preprint arXiv:1703.01534 (2017)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27954-6_20"},{"key":"e_1_3_2_1_17_1","volume-title":"Faster Secure Two-Party Computation Using Garbled Circuits. USENIX Security Symposium","volume":"201","author":"Huang Yan","year":"2011","unstructured":"Yan Huang , David Evans , Jonathan Katz , and Lior Malka . 2011 . Faster Secure Two-Party Computation Using Garbled Circuits. USENIX Security Symposium , Vol. Vol. 201 . Yan Huang, David Evans, Jonathan Katz, and Lior Malka . 2011. Faster Secure Two-Party Computation Using Garbled Circuits. USENIX Security Symposium, Vol. Vol. 201."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516707"},{"volume-title":"Crypto","author":"Ishai Yuval","key":"e_1_3_2_1_19_1","unstructured":"Yuval Ishai , Joe Kilian , Kobbi Nissim , and Erez Petrank . 2003. Extending Oblivious Transfers Efficiently .. In Crypto , Vol. Vol. 2729 . Springer , 145--161. Yuval Ishai, Joe Kilian, Kobbi Nissim, and Erez Petrank . 2003. Extending Oblivious Transfers Efficiently.. In Crypto, Vol. Vol. 2729. Springer, 145--161."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1216206110"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.34"},{"key":"e_1_3_2_1_22_1","volume-title":"Private genome analysis through homomorphic encryption. BMC medical informatics and decision making","author":"Kim Miran","year":"2015","unstructured":"Miran Kim and Kristin Lauter . 2015. Private genome analysis through homomorphic encryption. BMC medical informatics and decision making , Vol. 15 , 5 ( 2015 ). Miran Kim and Kristin Lauter . 2015. Private genome analysis through homomorphic encryption. BMC medical informatics and decision making, Vol. 15, 5 (2015)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70583-3_40"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-008-9036-8"},{"key":"e_1_3_2_1_25_1","volume-title":"2015 IEEE 31st International Conference on. IEEE, 66--77","author":"Liu An","year":"2015","unstructured":"An Liu , Kai Zhengy , Lu Liz , Guanfeng Liu , Lei Zhao , and Xiaofang Zhou . 2015 . Efficient secure similarity computation on encrypted trajectory data Data Engineering (ICDE) , 2015 IEEE 31st International Conference on. IEEE, 66--77 . An Liu, Kai Zhengy, Lu Liz, Guanfeng Liu, Lei Zhao, and Xiaofang Zhou . 2015. Efficient secure similarity computation on encrypted trajectory data Data Engineering (ICDE), 2015 IEEE 31st International Conference on. IEEE, 66--77."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CHASE.2017.79"},{"key":"e_1_3_2_1_27_1","volume-title":"SecureML: A System for Scalable Privacy-Preserving Machine Learning 2017 IEEE Symposium on Security and Privacy (SP). 19--38","author":"Mohassel P.","year":"2017","unstructured":"P. Mohassel and Y. Zhang . 2017 . SecureML: A System for Scalable Privacy-Preserving Machine Learning 2017 IEEE Symposium on Security and Privacy (SP). 19--38 . P. Mohassel and Y. Zhang . 2017. SecureML: A System for Scalable Privacy-Preserving Machine Learning 2017 IEEE Symposium on Security and Privacy (SP). 19--38."},{"key":"e_1_3_2_1_28_1","volume-title":"mbox","author":"Atlas Network Cancer Genome","year":"2012","unstructured":"Cancer Genome Atlas Network mbox . . 2012 . Comprehensive molecular portraits of human breast tumours. Nature , Vol. 490 , 7418 (2012), 61--70. Cancer Genome Atlas Network et almbox. . 2012. Comprehensive molecular portraits of human breast tumours. Nature, Vol. 490, 7418 (2012), 61--70."},{"key":"e_1_3_2_1_29_1","volume-title":"Carlo Sidore, and et al","author":"Olivieri Anna","year":"2017","unstructured":"Anna Olivieri , Carlo Sidore, and et al . . 2017 . Mitogenome diversity in Sardinians: a genetic window onto an island's past. Molecular biology and evolution Vol. 34 , 5 (2017), 1230--1239. Anna Olivieri, Carlo Sidore, and et al. . 2017. Mitogenome diversity in Sardinians: a genetic window onto an island's past. Molecular biology and evolution Vol. 34, 5 (2017), 1230--1239."},{"key":"e_1_3_2_1_30_1","volume-title":"mbox","author":"Pascal Paillier","year":"1999","unstructured":"Pascal Paillier et al mbox . . 1999 . Public-key cryptosystems based on composite degree residuosity classes Eurocrypt, Vol. Vol. 99 . Springer , 223--238. Pascal Paillier et almbox. . 1999. Public-key cryptosystems based on composite degree residuosity classes Eurocrypt, Vol. Vol. 99. Springer, 223--238."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ajhg.2015.09.010"},{"key":"e_1_3_2_1_32_1","volume-title":"When gene meets cloud: Enabling scalable and efficient range query on encrypted genomic data INFOCOM","author":"Sun Wenhai","year":"2017","unstructured":"Wenhai Sun , Ning Zhang , Wenjing Lou , and Y Thomas Hou . 2017. When gene meets cloud: Enabling scalable and efficient range query on encrypted genomic data INFOCOM 2017 . IEEE , 1--9. Wenhai Sun, Ning Zhang, Wenjing Lou, and Y Thomas Hou . 2017. When gene meets cloud: Enabling scalable and efficient range query on encrypted genomic data INFOCOM 2017. IEEE, 1--9."},{"volume-title":"2017 b. Privacy-preserving pattern matching over encrypted genetic data in cloud computing INFOCOM 2017-IEEE Conference on Computer Communications","author":"Wang Bing","key":"e_1_3_2_1_33_1","unstructured":"Bing Wang , Wei Song , Wenjing Lou , and Y Thomas Hou . 2017 b. Privacy-preserving pattern matching over encrypted genetic data in cloud computing INFOCOM 2017-IEEE Conference on Computer Communications , IEEE. IEEE , 1--9. Bing Wang, Wei Song, Wenjing Lou, and Y Thomas Hou . 2017 b. Privacy-preserving pattern matching over encrypted genetic data in cloud computing INFOCOM 2017-IEEE Conference on Computer Communications, IEEE. IEEE, 1--9."},{"key":"e_1_3_2_1_34_1","volume-title":"Dov Fox, Chao Jiang, Kristin Lauter, et almbox. . 2017 a. A community effort to protect genomic data sharing, collaboration and outsourcing. npj Genomic Medicine","author":"Wang Shuang","year":"2017","unstructured":"Shuang Wang , Xiaoqian Jiang , Haixu Tang , Xiaofeng Wang , Diyue Bu , Knox Carey , Stephanie OM Dyke , Dov Fox, Chao Jiang, Kristin Lauter, et almbox. . 2017 a. A community effort to protect genomic data sharing, collaboration and outsourcing. npj Genomic Medicine , Vol. 2 , 1 ( 2017 ), 33. Shuang Wang, Xiaoqian Jiang, Haixu Tang, Xiaofeng Wang, Diyue Bu, Knox Carey, Stephanie OM Dyke, Dov Fox, Chao Jiang, Kristin Lauter, et almbox. . 2017 a. A community effort to protect genomic data sharing, collaboration and outsourcing. npj Genomic Medicine, Vol. 2, 1 (2017), 33."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813725"},{"volume-title":"PPOPM: more efficient privacy preserving outsourced pattern matching European Symposium on Research in Computer Security","author":"Zhou Jun","key":"e_1_3_2_1_36_1","unstructured":"Jun Zhou , Zhenfu Cao , and Xiaolei Dong . 2016. PPOPM: more efficient privacy preserving outsourced pattern matching European Symposium on Research in Computer Security . Springer , 135--153. Jun Zhou, Zhenfu Cao, and Xiaolei Dong . 2016. PPOPM: more efficient privacy preserving outsourced pattern matching European Symposium on Research in Computer Security. Springer, 135--153."}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Incheon Republic of Korea","acronym":"ASIA CCS '18"},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196535","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196535","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:39Z","timestamp":1750208919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196535"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":36,"alternative-id":["10.1145\/3196494.3196535","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3196535","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}