{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T15:35:08Z","timestamp":1772292908536,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,1,30]],"date-time":"2019-01-30T00:00:00Z","timestamp":1548806400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,1,30]]},"DOI":"10.1145\/3289600.3290983","type":"proceedings-article","created":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T12:33:01Z","timestamp":1552307581000},"page":"204-212","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Enabling Privacy-Preserving Sharing of Genomic Data for GWASs in Decentralized Networks"],"prefix":"10.1145","author":[{"given":"Yanjun","family":"Zhang","sequence":"first","affiliation":[{"name":"University of Queensland, Brisbane, Australia"}]},{"given":"Xin","family":"Zhao","sequence":"additional","affiliation":[{"name":"University of Queensland, Brisbane, Australia"}]},{"given":"Xue","family":"Li","sequence":"additional","affiliation":[{"name":"University of Queensland, Brisbane, Australia"}]},{"given":"Mingyang","family":"Zhong","sequence":"additional","affiliation":[{"name":"University of Queensland, Brisbane, Australia"}]},{"given":"Caitlin","family":"Curtis","sequence":"additional","affiliation":[{"name":"University of Queensland, Brisbane, Australia"}]},{"given":"Chen","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Queensland, Brisbane, Australia"}]}],"member":"320","published-online":{"date-parts":[[2019,1,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1005140.1005147"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046785"},{"key":"e_1_3_2_1_3_1","volume-title":"Rmind: a tool for cryptographically secure statistical analysis","author":"Bogdanov Dan","year":"2016","unstructured":"Dan Bogdanov , Liina Kamm , Swen Laur , and Ville Sokk . 2016. Rmind: a tool for cryptographically secure statistical analysis . IEEE Transactions on Dependable and Secure Computing ( 2016 ). Dan Bogdanov, Liina Kamm, Swen Laur, and Ville Sokk. 2016. Rmind: a tool for cryptographically secure statistical analysis. IEEE Transactions on Dependable and Secure Computing (2016)."},{"key":"e_1_3_2_1_4_1","first-page":"1","article-title":"Fast variants of RSA","volume":"5","author":"Boneh Dan","year":"2002","unstructured":"Dan Boneh and Hovav Shacham . 2002 . Fast variants of RSA . CryptoBytes 5 , 1 (2002), 1 -- 9 . Dan Boneh and Hovav Shacham. 2002. Fast variants of RSA. CryptoBytes 5, 1 (2002), 1--9.","journal-title":"CryptoBytes"},{"key":"e_1_3_2_1_5_1","first-page":"203","article-title":"Privacy- Preserving Matching of DNA Profiles","volume":"2008","author":"Bruekers Fons","year":"2008","unstructured":"Fons Bruekers , Stefan Katzenbeisser , Klaus Kursawe , and Pim Tuyls . 2008 . Privacy- Preserving Matching of DNA Profiles . IACR Cryptology ePrint Archive 2008 (2008), 203 . Fons Bruekers, Stefan Katzenbeisser, Klaus Kursawe, and Pim Tuyls. 2008. Privacy- Preserving Matching of DNA Profiles. IACR Cryptology ePrint Archive 2008 (2008), 203.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_6_1","unstructured":"Yangyi Chen Bo Peng XiaoFeng Wang and Haixu Tang. 2012. Large-Scale Privacy-Preserving Mapping of Human Genomic Sequences on Hybrid Clouds.. In NDSS.  Yangyi Chen Bo Peng XiaoFeng Wang and Haixu Tang. 2012. Large-Scale Privacy-Preserving Mapping of Human Genomic Sequences on Hybrid Clouds.. In NDSS."},{"key":"e_1_3_2_1_7_1","unstructured":"1000 Genomes Project Consortium et al. 2015. A global reference for human genetic variation. Nature 526 7571 (2015) 68.  1000 Genomes Project Consortium et al. 2015. A global reference for human genetic variation. Nature 526 7571 (2015) 68."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Wellcome Trust Case Control Consortium et al. 2007. Genome-wide association study of 14 000 cases of seven common diseases and 3 000 shared controls. Nature 447 7145 (2007) 661.  Wellcome Trust Case Control Consortium et al. 2007. Genome-wide association study of 14 000 cases of seven common diseases and 3 000 shared controls. Nature 447 7145 (2007) 661.","DOI":"10.1038\/nature05911"},{"key":"e_1_3_2_1_9_1","volume-title":"Retrieved","author":"Curtis Caitlin","year":"2018","unstructured":"Caitlin Curtis and James Hereward . 2018 . DNA facial prediction could make protecting your privacy more difficult. (2018) . Retrieved May 06, 2018 from https:\/\/theconversation.com\/ dna-facial-prediction-could-make-protecting-your-privacy-more-difficult-94740 Caitlin Curtis and James Hereward. 2018. DNA facial prediction could make protecting your privacy more difficult. (2018). Retrieved May 06, 2018 from https:\/\/theconversation.com\/ dna-facial-prediction-could-make-protecting-your-privacy-more-difficult-94740"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_23"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381966.2381980"},{"key":"e_1_3_2_1_12_1","volume-title":"Encyclopedia of Cryptography and Security","author":"Dwork Cynthia","unstructured":"Cynthia Dwork . 2011. Differential privacy . In Encyclopedia of Cryptography and Security . Springer , 338--340. Cynthia Dwork. 2011. Differential privacy. In Encyclopedia of Cryptography and Security. Springer, 338--340."},{"key":"e_1_3_2_1_13_1","volume-title":"A fully homomorphic encryption scheme","author":"Gentry Craig","unstructured":"Craig Gentry and Dan Boneh . 2009. A fully homomorphic encryption scheme . Vol. 20 . Stanford University Stanford . Craig Gentry and Dan Boneh. 2009. A fully homomorphic encryption scheme. Vol. 20. Stanford University Stanford."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_10"},{"key":"e_1_3_2_1_15_1","volume-title":"On distinguishability criteria for estimating generative models. arXiv preprint arXiv:1412.6515","author":"Goodfellow Ian J","year":"2014","unstructured":"Ian J Goodfellow . 2014. On distinguishability criteria for estimating generative models. arXiv preprint arXiv:1412.6515 ( 2014 ). Ian J Goodfellow. 2014. On distinguishability criteria for estimating generative models. arXiv preprint arXiv:1412.6515 (2014)."},{"key":"e_1_3_2_1_16_1","volume-title":"Identifying personal genomes by surname inference. Science 339, 6117","author":"Gymrek Melissa","year":"2013","unstructured":"Melissa Gymrek , Amy L McGuire , David Golan , Eran Halperin , and Yaniv Erlich . 2013. Identifying personal genomes by surname inference. Science 339, 6117 ( 2013 ), 321--324. Melissa Gymrek, Amy L McGuire, David Golan, Eran Halperin, and Yaniv Erlich. 2013. Identifying personal genomes by surname inference. Science 339, 6117 (2013), 321--324."},{"key":"e_1_3_2_1_17_1","volume-title":"Multiobjective optimization in water resources systems: the surrogate worth trade-off method","author":"Haimes Yacov Y","unstructured":"Yacov Y Haimes , Warren A Hall , and Herbert T Freedman . 2011. Multiobjective optimization in water resources systems: the surrogate worth trade-off method . Vol. 3 . Elsevier . Yacov Y Haimes, Warren A Hall, and Herbert T Freedman. 2011. Multiobjective optimization in water resources systems: the surrogate worth trade-off method. Vol. 3. Elsevier."},{"key":"e_1_3_2_1_18_1","volume-title":"BBMRI-ERIC Directory: 515 biobanks with over 60 million biological samples. Biopreservation and biobanking 14, 6","author":"Holub Petr","year":"2016","unstructured":"Petr Holub , Morris Swertz , Robert Reihs , David van Enckevort , Heimo M\u00fcller , and Jan-Eric Litton . 2016. BBMRI-ERIC Directory: 515 biobanks with over 60 million biological samples. Biopreservation and biobanking 14, 6 ( 2016 ), 559--562. Petr Holub, Morris Swertz, Robert Reihs, David van Enckevort, Heimo M\u00fcller, and Jan-Eric Litton. 2016. BBMRI-ERIC Directory: 515 biobanks with over 60 million biological samples. Biopreservation and biobanking 14, 6 (2016), 559--562."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3162006"},{"key":"e_1_3_2_1_20_1","volume-title":"Deriving genomic diagnoses without revealing patient genomes. Science 357, 6352","author":"Jagadeesh Karthik A","year":"2017","unstructured":"Karthik A Jagadeesh , David J Wu , Johannes A Birgmeier , Dan Boneh , and Gill Bejerano . 2017. Deriving genomic diagnoses without revealing patient genomes. Science 357, 6352 ( 2017 ), 692--695. Karthik A Jagadeesh, David J Wu, Johannes A Birgmeier, Dan Boneh, and Gill Bejerano. 2017. Deriving genomic diagnoses without revealing patient genomes. Science 357, 6352 (2017), 692--695."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.34"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487687"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btt066"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1711125114"},{"key":"e_1_3_2_1_25_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system. (2008). Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008)."},{"key":"e_1_3_2_1_26_1","volume-title":"Retrieved","author":"Regalado Antonio","year":"2018","unstructured":"Antonio Regalado . 2018 . 2017 was the year consumer DNA testing blew up. (2018) . Retrieved May 06, 2018 from https:\/\/www.technologyreview.com\/s\/610233\/2017-was-the-year-consumer-dna-testing-blew-up\/ Antonio Regalado. 2018. 2017 was the year consumer DNA testing blew up. (2018). Retrieved May 06, 2018 from https:\/\/www.technologyreview.com\/s\/610233\/2017-was-the-year-consumer-dna-testing-blew-up\/"},{"key":"e_1_3_2_1_27_1","volume-title":"Noman Mohammed, Feng Chen, Shuang Wang, and Xiaoqian Jiang.","author":"Sadat Md Nazmus","year":"2017","unstructured":"Md Nazmus Sadat , Md Momin Al Aziz , Noman Mohammed, Feng Chen, Shuang Wang, and Xiaoqian Jiang. 2017 . SAFETY : Secure gwAs in Federated Environment Through a hYbrid solution with Intel SGX and Homomorphic Encryption . arXiv preprint arXiv:1703.02577 (2017). Md Nazmus Sadat, Md Momin Al Aziz, Noman Mohammed, Feng Chen, Shuang Wang, and Xiaoqian Jiang. 2017. SAFETY: Secure gwAs in Federated Environment Through a hYbrid solution with Intel SGX and Homomorphic Encryption. arXiv preprint arXiv:1703.02577 (2017)."},{"key":"e_1_3_2_1_28_1","volume-title":"Enabling privacypreserving GWASs in heterogeneous human populations. Cell systems 3, 1","author":"Simmons Sean","year":"2016","unstructured":"Sean Simmons , Cenk Sahinalp , and Bonnie Berger . 2016. Enabling privacypreserving GWASs in heterogeneous human populations. Cell systems 3, 1 ( 2016 ), 54--61. Sean Simmons, Cenk Sahinalp, and Bonnie Berger. 2016. Enabling privacypreserving GWASs in heterogeneous human populations. Cell systems 3, 1 (2016), 54--61."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Latanya Sweeney Akua Abu and Julia Winn. 2013. Identifying participants in the personal genome project by name. (2013).  Latanya Sweeney Akua Abu and Julia Winn. 2013. Identifying participants in the personal genome project by name. (2013).","DOI":"10.2139\/ssrn.2257732"},{"key":"e_1_3_2_1_30_1","volume-title":"Blockchain revolution: how the technology behind bitcoin is changing money, business, and the world","author":"Tapscott Don","unstructured":"Don Tapscott and Alex Tapscott . 2016. Blockchain revolution: how the technology behind bitcoin is changing money, business, and the world . Penguin . Don Tapscott and Alex Tapscott. 2016. Blockchain revolution: how the technology behind bitcoin is changing money, business, and the world. Penguin."},{"key":"e_1_3_2_1_31_1","first-page":"137","article-title":"Privacypreserving data sharing for genome-wide association studies","volume":"5","author":"Uhlerop Caroline","year":"2013","unstructured":"Caroline Uhlerop , Aleksandra Slavkovic , and Stephen E Fienberg . 2013 . Privacypreserving data sharing for genome-wide association studies . The Journal of privacy and confidentiality 5 , 1 (2013), 137 . Caroline Uhlerop, Aleksandra Slavkovic, and Stephen E Fienberg. 2013. Privacypreserving data sharing for genome-wide association studies. The Journal of privacy and confidentiality 5, 1 (2013), 137.","journal-title":"The Journal of privacy and confidentiality"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_2"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ajhg.2017.06.005"},{"key":"e_1_3_2_1_34_1","first-page":"211","article-title":"HEALER: Homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS","volume":"32","author":"Zhang Yuchen","year":"2015","unstructured":"ShuangWang, Yuchen Zhang , Wenrui Dai , Kristin Lauter , Miran Kim , Yuzhe Tang , Hongkai Xiong , and Xiaoqian Jiang . 2015 . HEALER: Homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS . Bioinformatics 32 , 2 (2015), 211 -- 218 . ShuangWang, Yuchen Zhang,Wenrui Dai, Kristin Lauter, Miran Kim, Yuzhe Tang, Hongkai Xiong, and Xiaoqian Jiang. 2015. HEALER: Homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS. Bioinformatics 32, 2 (2015), 211--218.","journal-title":"Bioinformatics"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/1382436.1382751"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2014.01.008"}],"event":{"name":"WSDM '19: The Twelfth ACM International Conference on Web Search and Data Mining","location":"Melbourne VIC Australia","acronym":"WSDM '19","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3289600.3290983","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3289600.3290983","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:21Z","timestamp":1750208541000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3289600.3290983"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,30]]},"references-count":36,"alternative-id":["10.1145\/3289600.3290983","10.1145\/3289600"],"URL":"https:\/\/doi.org\/10.1145\/3289600.3290983","relation":{},"subject":[],"published":{"date-parts":[[2019,1,30]]},"assertion":[{"value":"2019-01-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}