{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T16:53:38Z","timestamp":1770224018102,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T00:00:00Z","timestamp":1515974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["16H02830"],"award-info":[{"award-number":["16H02830"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003382","name":"Core Research for Evolutional Science and Technology","doi-asserted-by":"publisher","award":["JPMJCR14D6"],"award-info":[{"award-number":["JPMJCR14D6"]}],"id":[{"id":"10.13039\/501100003382","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,1,15]]},"DOI":"10.1145\/3267323.3268952","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T13:23:10Z","timestamp":1539696190000},"page":"42-53","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Faster PCA and Linear Regression through Hypercubes in HElib"],"prefix":"10.1145","author":[{"given":"Deevashwer","family":"Rathee","sequence":"first","affiliation":[{"name":"Indian Institute of Technology (BHU) Varanasi, Varanasi, India"}]},{"given":"Pradeep Kumar","family":"Mishra","sequence":"additional","affiliation":[{"name":"Kyushu University, Fukuoka, Japan"}]},{"given":"Masaya","family":"Yasuda","sequence":"additional","affiliation":[{"name":"Kyushu University, Fukuoka, Japan"}]}],"member":"320","published-online":{"date-parts":[[2018,1,15]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_18"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23241"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"e_1_3_2_2_4_1","volume-title":"Advances in Cryptology -- CRYPTO","author":"Brakerski Zvika","year":"2011"},{"key":"e_1_3_2_2_5_1","volume-title":"Advances in Cryptology -- ASIACRYPT","author":"Cheon Jung Hee","year":"2017"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2483486"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1137\/0210049"},{"key":"e_1_3_2_2_8_1","unstructured":"Dua Dheeru and Efi Karra Taniskidou. 2017. UCI Machine Learning Repository. http:\/\/archive.ics.uci.edu\/ml  Dua Dheeru and Efi Karra Taniskidou. 2017. UCI Machine Learning Repository. http:\/\/archive.ics.uci.edu\/ml"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-8191(87)90060-3"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_49"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37682-5_1"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1137\/050643374"},{"key":"e_1_3_2_2_14_1","unstructured":"Shai Halevi and Victor Shoup. 2013. Design and implementation of a homomorphicencryption library. http:\/\/people.csail.mit.edu\/shaih\/pubs\/he-library.pdf  Shai Halevi and Victor Shoup. 2013. Design and implementation of a homomorphicencryption library. http:\/\/people.csail.mit.edu\/shaih\/pubs\/he-library.pdf"},{"key":"e_1_3_2_2_15_1","volume-title":"Advances in Cryptology -- CRYPTO","author":"Halevi Shai","year":"2014"},{"key":"e_1_3_2_2_16_1","unstructured":"Wenjie Lu Shohei Kawasaki and Jun Sakuma. 2016. Using Fully Homomorphic Encryption for Statistical Analysis of Categorical Ordinal and Numerical Data (This is the full version of the conference paper presented at NDSS 2017). IACR Cryptology ePrint Archive Report 2016\/1163 (2016). https:\/\/eprint.iacr.org\/2016\/ 1163  Wenjie Lu Shohei Kawasaki and Jun Sakuma. 2016. Using Fully Homomorphic Encryption for Statistical Analysis of Categorical Ordinal and Numerical Data (This is the full version of the conference paper presented at NDSS 2017). IACR Cryptology ePrint Archive Report 2016\/1163 (2016). https:\/\/eprint.iacr.org\/2016\/ 1163"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046682"},{"key":"e_1_3_2_2_18_1","volume-title":"Advances in Cryptology - EUROCRYPT '99","author":"Paillier Pascal"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13013-7_25"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-012-9720-4"},{"key":"e_1_3_2_2_22_1","unstructured":"David Wu and Jacob Haven. 2012. Using Homomorphic Encryption for Large Scale Statistical Analysis. https:\/\/crypto.stanford.edu\/~dwu4\/FHE-SI_Report.pdf  David Wu and Jacob Haven. 2012. Using Homomorphic Encryption for Large Scale Statistical Analysis. https:\/\/crypto.stanford.edu\/~dwu4\/FHE-SI_Report.pdf"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517488.2517497"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"crossref","unstructured":"Masaya Yasuda Takeshi Shimoyama Jun Kogure Kazuhiro Yokoyama and Takeshi Koshiba. 2015. Secure Statistical Analysis Using RLWE-Based Homomorphic Encryption. In Information Security and Privacy Ernest Foo and Douglas Stebila (Eds.). Springer International Publishing Cham 471--487.  Masaya Yasuda Takeshi Shimoyama Jun Kogure Kazuhiro Yokoyama and Takeshi Koshiba. 2015. Secure Statistical Analysis Using RLWE-Based Homomorphic Encryption. In Information Security and Privacy Ernest Foo and Douglas Stebila (Eds.). Springer International Publishing Cham 471--487.","DOI":"10.1007\/978-3-319-19962-7_27"}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","location":"Toronto Canada","acronym":"CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3267323.3268952","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3267323.3268952","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3267323.3268952","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:43Z","timestamp":1750208263000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3267323.3268952"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,15]]},"references-count":24,"alternative-id":["10.1145\/3267323.3268952","10.1145\/3267323"],"URL":"https:\/\/doi.org\/10.1145\/3267323.3268952","relation":{},"subject":[],"published":{"date-parts":[[2018,1,15]]},"assertion":[{"value":"2018-01-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}