{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:13Z","timestamp":1750220353540,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,20]],"date-time":"2021-08-20T00:00:00Z","timestamp":1629417600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"A*STAR Research Entities","award":["A19E3b0099"],"award-info":[{"award-number":["A19E3b0099"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,20]]},"DOI":"10.1145\/3484424.3484426","type":"proceedings-article","created":{"date-parts":[[2021,11,8]],"date-time":"2021-11-08T23:12:33Z","timestamp":1636413153000},"page":"9-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Genotype Imputation with Homomorphic Encryption"],"prefix":"10.1145","author":[{"given":"Fook Mun","family":"Chan","sequence":"first","affiliation":[{"name":"A*STAR, Singapore"}]},{"given":"Ahmad Qaisar Ahmad Al","family":"Badawi","sequence":"additional","affiliation":[{"name":"A*STAR, Singapore"}]},{"given":"Jun Jie","family":"Sim","sequence":"additional","affiliation":[{"name":"A*STAR, Singapore"}]},{"given":"Benjamin Hong Meng","family":"Tan","sequence":"additional","affiliation":[{"name":"A*STAR, Singapore"}]},{"given":"Foo Chuan","family":"Sheng","sequence":"additional","affiliation":[{"name":"A*STAR, Singapore"}]},{"given":"Khin Mi Mi","family":"Aung","sequence":"additional","affiliation":[{"name":"A*STAR, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2021,11,8]]},"reference":[{"volume-title":"FAQ for iDASH Privacy Protection competition. https:\/\/docs.google.com\/document\/d\/1bVkRyrYQFbhpJdIdBgb4vkOeXpv5h51dkQuqw-y3U-s\/edit Last Accessed","year":"2021","key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. FAQ for iDASH Privacy Protection competition. https:\/\/docs.google.com\/document\/d\/1bVkRyrYQFbhpJdIdBgb4vkOeXpv5h51dkQuqw-y3U-s\/edit Last Accessed 28 May 2021."},{"volume-title":"Privacy & Security Workshop 2019","year":"2019","key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. iDASH Privacy & Security Workshop 2019. http:\/\/www.humangenomeprivacy.org\/2019\/competition-tasks.html Last Accessed 28 May 2021."},{"volume-title":"Simple Encrypted Arithmetic Library (release 3.2.0). https:\/\/github.com\/Microsoft\/SEAL. Microsoft Research","year":"2019","key":"e_1_3_2_1_3_1","unstructured":"2019. Simple Encrypted Arithmetic Library (release 3.2.0). https:\/\/github.com\/Microsoft\/SEAL. Microsoft Research, Redmond, WA., Last Accessed 18 July 2019, commit e5fee8f."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1086\/321275"},{"key":"e_1_3_2_1_9_1","volume-title":"On Data Banks and Privacy Homomorphisms. Foundations of Secure Computation","author":"Rivest R\u00a0L","year":"1978","unstructured":"R\u00a0L Rivest, L Adleman, and M\u00a0L Dertouzos. 1978. On Data Banks and Privacy Homomorphisms. Foundations of Secure Computation, Academia Press (1978)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1086\/502802"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1038\/nrg2361"},{"key":"e_1_3_2_1_12_1","unstructured":"N.P. Smart and F. Vercauteren. 2011. Fully Homomorphic SIMD Operations. Cryptology ePrint Archive Report 2011\/133. https:\/\/eprint.iacr.org\/2011\/133."}],"event":{"name":"ICBIP '21: 2021 6th International Conference on Biomedical Signal and Image Processing","acronym":"ICBIP '21","location":"Suzhou China"},"container-title":["Proceedings of the 6th International Conference on Biomedical Signal and Image Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3484424.3484426","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3484424.3484426","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:14Z","timestamp":1750191434000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3484424.3484426"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,20]]},"references-count":10,"alternative-id":["10.1145\/3484424.3484426","10.1145\/3484424"],"URL":"https:\/\/doi.org\/10.1145\/3484424.3484426","relation":{},"subject":[],"published":{"date-parts":[[2021,8,20]]},"assertion":[{"value":"2021-11-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}