{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:09Z","timestamp":1750220709267,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T00:00:00Z","timestamp":1584316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,16]]},"DOI":"10.1145\/3374664.3375729","type":"proceedings-article","created":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T17:06:53Z","timestamp":1584119213000},"page":"329-340","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["PREDICT"],"prefix":"10.1145","author":[{"given":"Chibuike","family":"Ugwuoke","sequence":"first","affiliation":[{"name":"Delft University of Technology, Delft, Netherlands"}]},{"given":"Zekeriya","family":"Erkin","sequence":"additional","affiliation":[{"name":"Delft University of Technology, Delft, Netherlands"}]},{"given":"Marcel","family":"Reinders","sequence":"additional","affiliation":[{"name":"Delft University of Technology, Delft, Netherlands"}]},{"given":"Reginald","family":"Lagendijk","sequence":"additional","affiliation":[{"name":"Delft University of Technology, Delft, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2020,3,16]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/www.23andme.com\/en-eu\/ Online","author":"Me.","year":"2018","unstructured":"23andMe. 2018. 23andme. https:\/\/www.23andme.com\/en-eu\/ Online; accessed January, 2018."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214303"},{"key":"e_1_3_2_1_3_1","volume-title":"Amalio Telenti, and Jean-Pierre Hubaux.","author":"Ayday Erman","year":"2012","unstructured":"Erman Ayday, Mathias Humbert, Jacques Fellay, Mc Laren, Paul Jack, Jacques Rougemont, Jean Louis Raisaro, Amalio Telenti, and Jean-Pierre Hubaux. 2012. Protecting personal genome privacy: Solutions from information security . Technical Report. EPFL."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517843"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45239-0_4"},{"key":"e_1_3_2_1_6_1","volume-title":"Fundamentals of Fully Homomorphic Encryption - A Survey. Electronic Colloquium on Computational Complexity Rep. No. 125","author":"Brakerski Zvika","year":"2018","unstructured":"Zvika Brakerski. 2018. Fundamentals of Fully Homomorphic Encryption - A Survey. Electronic Colloquium on Computational Complexity Rep. No. 125 (2018)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1137\/120868669"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/874063.875553"},{"key":"e_1_3_2_1_10_1","volume-title":"Science","volume":"311","author":"Church George","year":"2006","unstructured":"George Church. 2006. The Race for the $1000 Genome. Science , Vol. 311 (2006)."},{"key":"e_1_3_2_1_11_1","volume-title":"Ivan Bjerre Damg\u00e5rd, et almbox","author":"Cramer Ronald","year":"2015","unstructured":"Ronald Cramer, Ivan Bjerre Damg\u00e5rd, et almbox. 2015. Secure multiparty computation .Cambridge University Press."},{"key":"e_1_3_2_1_12_1","volume-title":"14th Privacy Enhancing Technologies Symposium, Workshop on Genome Privacy (GenoPri'14)","author":"Danezis George","year":"2014","unstructured":"George Danezis and Emiliano De Cristofaro. 2014. Simpler protocols for privacy-preserving disease susceptibility testing. In 14th Privacy Enhancing Technologies Symposium, Workshop on Genome Privacy (GenoPri'14), Amsterdam ."},{"key":"e_1_3_2_1_13_1","first-page":"552","article-title":"Manual for using homomorphic encryption for bioinformatics","volume":"105","author":"Dowlin Nathan","year":"2017","unstructured":"Nathan Dowlin, Ran Gilad-Bachrach, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2017. Manual for using homomorphic encryption for bioinformatics. Proc. IEEE , Vol. 105, 3 (2017), 552--567.","journal-title":"Proc. IEEE"},{"key":"e_1_3_2_1_14_1","unstructured":"Wenliang Du and Mikhail J Atallah. [n. d.]. Protocols for secure remote database access with approximate matching. In E-Commerce Security and Privacy ."},{"key":"e_1_3_2_1_15_1","volume-title":"Drug giant Glaxo teams up with DNA testing company 23andMe. https:\/\/www.nbcnews.com\/health\/health-news\/drug-giant-glaxo-teams-dna-testing-company-23andme-n894531 Online","author":"Fox Maggie","year":"2018","unstructured":"Maggie Fox. July, 2018. Drug giant Glaxo teams up with DNA testing company 23andMe. https:\/\/www.nbcnews.com\/health\/health-news\/drug-giant-glaxo-teams-dna-testing-company-23andme-n894531 Online; accessed November, 2018."},{"volume-title":"A fully homomorphic encryption scheme","author":"Gentry Craig","key":"e_1_3_2_1_16_1","unstructured":"Craig Gentry and Dan Boneh. 2009. A fully homomorphic encryption scheme . Vol. 20. Stanford University Stanford."},{"key":"e_1_3_2_1_17_1","unstructured":"Damien Giry. December 2018. Cryptographic Key Length Recommendation. https:\/\/www.keylength.com\/en\/4\/ Online; accessed December 2018."},{"key":"e_1_3_2_1_18_1","volume-title":"Secure multi-party computation. Manuscript. Preliminary version","author":"Goldreich Oded","year":"1998","unstructured":"Oded Goldreich. 1998. Secure multi-party computation. Manuscript. Preliminary version (1998), 86--97."},{"key":"e_1_3_2_1_19_1","volume-title":"1st PETS Workshop on Genome Privacy (GenoPri)","author":"Hamacher Kay","year":"2014","unstructured":"Kay Hamacher. 2014. A Taxonomy of Genomic Privacy and Beyond. 1st PETS Workshop on Genome Privacy (GenoPri) (2014)."},{"volume-title":"https:\/\/www.helix.com Online","year":"2018","key":"e_1_3_2_1_20_1","unstructured":"Helix. 2018. Helix. https:\/\/www.helix.com Online; accessed January, 2018."},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the National Academy of Sciences","volume":"106","author":"Hindorff Lucia A","unstructured":"Lucia A Hindorff, Praveen Sethupathy, Heather A Junkins, Erin M Ramos, Jayashri P Mehta, Francis S Collins, and Teri A Manolio. [n. d.]. Potential etiologic and functional implications of genome-wide association loci for human diseases and traits. Proceedings of the National Academy of Sciences , Vol. 106, 23 ( [n. d.])."},{"key":"e_1_3_2_1_22_1","volume-title":"A community assessment of privacy preserving techniques for human genomes. BMC medical informatics and decision making","author":"Jiang Xiaoqian","year":"2014","unstructured":"Xiaoqian Jiang, Yongan Zhao, Xiaofeng Wang, Bradley Malin, Shuang Wang, Lucila Ohno-Machado, and Haixu Tang. 2014. A community assessment of privacy preserving techniques for human genomes. BMC medical informatics and decision making , Vol. 14, Suppl 1 (2014), S1."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMoa0706728"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2494198"},{"volume-title":"Tutorials on the Foundations of Cryptography","author":"Lindell Yehuda","key":"e_1_3_2_1_25_1","unstructured":"Yehuda Lindell. 2017. How To Simulate It--A Tutorial on the Simulation Proof Technique. In Tutorials on the Foundations of Cryptography. Springer, 277--346."},{"key":"e_1_3_2_1_26_1","volume-title":"1st PETS Workshop on Genome Privacy (GenoPri)","author":"Lukasz Olejnik","year":"2014","unstructured":"Olejnik Lukasz, Kutrowska Agnieszka, and Castelluccia Claude. 2014. I'm 2.8% Neanderthal. 1st PETS Workshop on Genome Privacy (GenoPri) (2014)."},{"key":"e_1_3_2_1_27_1","volume-title":"Manel Aouri, Margalida Rotger, Erman Ayday, Istv\u00e1n Bartha, Maria B Delgado, Yannick Vallet, Huldrych F G\u00fcnthard, Matthias Cavassini, et almbox.","author":"McLaren Paul J","year":"2016","unstructured":"Paul J McLaren, Jean Louis Raisaro, Manel Aouri, Margalida Rotger, Erman Ayday, Istv\u00e1n Bartha, Maria B Delgado, Yannick Vallet, Huldrych F G\u00fcnthard, Matthias Cavassini, et almbox. 2016. Privacy-preserving genomic testing in the clinic: a model using HIV treatment. Genetics in Medicine (2016)."},{"key":"e_1_3_2_1_29_1","volume-title":"Penny Soucy, Dylan Glubb, Asha Rostamianfar, et almbox.","author":"Michailidou Kyriaki","year":"2017","unstructured":"Kyriaki Michailidou, Sara Lindstr\u00f6m, Joe Dennis, Jonathan Beesley, Shirley Hui, Siddhartha Kar, Audrey Lemacc on, Penny Soucy, Dylan Glubb, Asha Rostamianfar, et almbox. 2017. Association analysis identifies 65 new breast cancer risk loci. Nature , Vol. 551, 7678 (2017), 92."},{"volume-title":"https:\/\/www.myheritage.nl Online","year":"2018","key":"e_1_3_2_1_30_1","unstructured":"MyHeritage. 2018. MyHeritage. https:\/\/www.myheritage.nl Online; accessed November, 2018."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2909827.2930791"},{"key":"e_1_3_2_1_32_1","volume-title":"https:\/\/ghr.nlm.nih.gov\/primer\/genomicresearch\/snp. https:\/\/ghr.nlm.nih.gov\/primer\/genomicresearch\/snp Online","author":"NLM.","year":"2018","unstructured":"NLM. 2018. https:\/\/ghr.nlm.nih.gov\/primer\/genomicresearch\/snp. https:\/\/ghr.nlm.nih.gov\/primer\/genomicresearch\/snp Online; accessed January, 2018."},{"key":"e_1_3_2_1_33_1","volume-title":"Gene Tests Are Quite Telling - Should You Get One? http:\/\/www.popsci.com\/i-tested-my-genes Online","author":"Ossola Alexandra","year":"2018","unstructured":"Alexandra Ossola. 2015. Gene Tests Are Quite Telling - Should You Get One? http:\/\/www.popsci.com\/i-tested-my-genes Online; accessed November, 2018."},{"volume-title":"Advances in cryptology?EUROCRYPT?99","author":"Paillier Pascal","key":"e_1_3_2_1_34_1","unstructured":"Pascal Paillier. 1999 a. Public-key cryptosystems based on composite degree residuosity classes. In Advances in cryptology?EUROCRYPT?99. Springer, 223--238."},{"key":"e_1_3_2_1_35_1","volume-title":"Advances in Cryptology - EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2--6","author":"Paillier Pascal","year":"1999","unstructured":"Pascal Paillier. 1999 b. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Advances in Cryptology - EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2--6, 1999, Proceeding. 223--238."},{"key":"e_1_3_2_1_36_1","volume-title":"What is consumer genetics? https:\/\/www.pged.org\/direct-to-consumer-genetic-testing\/\/ Online","author":"Ed.","year":"2018","unstructured":"pgEd. 2014. What is consumer genetics? https:\/\/www.pged.org\/direct-to-consumer-genetic-testing\/\/ Online; accessed November, 2018."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.19"},{"key":"e_1_3_2_1_38_1","volume-title":"23ANDME: BUILDING A GENETICALLY-SOUND COMPANY. https:\/\/iveybusinessreview.ca\/6346\/23andme-building-genetically-sound-company\/ Online","author":"Prashad Spencer","year":"2018","unstructured":"Spencer Prashad and Shan Srikanthan. April, 2018. 23ANDME: BUILDING A GENETICALLY-SOUND COMPANY. https:\/\/iveybusinessreview.ca\/6346\/23andme-building-genetically-sound-company\/ Online; accessed Nov., 2018."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1503\/cmaj.171151"},{"key":"e_1_3_2_1_40_1","unstructured":"Lewis Ricki. 2012. Direct-to-Consumer Genetic Testing: A New View. http:\/\/blogs.plos.org\/dnascience\/2012\/11\/08\/direct-to-consumer-genetic-testing-a-new-view\/."},{"volume-title":"d.]. On data banks and privacy homomorphisms. Foundations of secure computation","author":"Rivest Ronald L","key":"e_1_3_2_1_41_1","unstructured":"Ronald L Rivest, Len Adleman, and Michael L Dertouzos. [n. d.]. On data banks and privacy homomorphisms. Foundations of secure computation , Vol. 4, 11 ([n. d.])."},{"key":"e_1_3_2_1_42_1","volume-title":"Dov Greenbaum, Raymond K Auerbach, and Mark B Gerstein.","author":"Sboner Andrea","year":"2011","unstructured":"Andrea Sboner, Xinmeng Jasmine Mu, Dov Greenbaum, Raymond K Auerbach, and Mark B Gerstein. 2011. The real cost of sequencing: higher than you think! Genome biology , Vol. 12, 8 (2011), 125."},{"key":"e_1_3_2_1_43_1","volume-title":"Beyond the Hundred Dollar Genome--Drug Discovery Futures. Chemical biology & drug design","author":"Selwood David L","year":"2013","unstructured":"David L Selwood. 2013. Beyond the Hundred Dollar Genome--Drug Discovery Futures. Chemical biology & drug design , Vol. 81, 1 (2013), 1--4."},{"key":"e_1_3_2_1_44_1","volume-title":"Nature","volume":"550","author":"Shendure Jay","year":"2017","unstructured":"Jay Shendure, Shankar Balasubramanian, George M Church, Walter Gilbert, Jane Rogers, Jeffery A Schloss, and Robert H Waterston. 2017. DNA sequencing at 40: past, present and future. Nature , Vol. 550, 7676 (2017), 345."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ajhg.2015.09.010"},{"key":"e_1_3_2_1_46_1","volume-title":"Direct-to-consumer genetic testing: a comprehensive view. The Yale journal of biology and medicine","author":"Pascal Su.","year":"2013","unstructured":"Pascal Su. 2013. Direct-to-consumer genetic testing: a comprehensive view. The Yale journal of biology and medicine , Vol. 86, 3 (2013), 359."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-1809.2007.00406.x"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2017.8081350"},{"key":"e_1_3_2_1_49_1","volume-title":"Nelson LS Tang, and Weichuan Yu","author":"Wan Xiang","year":"2009","unstructured":"Xiang Wan, Can Yang, Qiang Yang, Hong Xue, Nelson LS Tang, and Weichuan Yu. 2009. MegaSNPHunter: a learning approach to detect disease predisposition SNPs and high level interactions in genome wide association study. BMC bioinformatics , Vol. 10, 1 (2009), 1."},{"key":"e_1_3_2_1_50_1","volume-title":"Polymorphic CYP genes and disease predisposition?what have the studies shown so far? Toxicology letters","author":"Watanabe Minro","year":"1998","unstructured":"Minro Watanabe. 1998. Polymorphic CYP genes and disease predisposition?what have the studies shown so far? Toxicology letters , Vol. 102 (1998), 167--171."},{"key":"e_1_3_2_1_51_1","volume-title":"DNA sequencing costs: data from the NHGRI Genome sequencing program (GSP)","author":"Wetterstrand Kris A","year":"2013","unstructured":"Kris A Wetterstrand. 2016. DNA sequencing costs: data from the NHGRI Genome sequencing program (GSP). 2013. URL http:\/\/www. genome. gov\/sequencingcosts (2016)."},{"key":"e_1_3_2_1_52_1","volume-title":"Biomedical databases: protecting privacy and promoting research. Trends in biotechnology","author":"Wylie Jean E","year":"2003","unstructured":"Jean E Wylie and Geraldine P Mineau. 2003. Biomedical databases: protecting privacy and promoting research. Trends in biotechnology , Vol. 21, 3 (2003), 113--116."}],"event":{"name":"CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"New Orleans LA USA","acronym":"CODASPY '20"},"container-title":["Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3375729","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3374664.3375729","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:08Z","timestamp":1750199588000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3375729"}},"subtitle":["Efficient Private Disease Susceptibility Testing in Direct-to-Consumer Model"],"short-title":[],"issued":{"date-parts":[[2020,3,16]]},"references-count":51,"alternative-id":["10.1145\/3374664.3375729","10.1145\/3374664"],"URL":"https:\/\/doi.org\/10.1145\/3374664.3375729","relation":{},"subject":[],"published":{"date-parts":[[2020,3,16]]},"assertion":[{"value":"2020-03-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}