{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T14:45:04Z","timestamp":1774622704634,"version":"3.50.1"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"S5","license":[{"start":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T00:00:00Z","timestamp":1448928000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["BMC Med Inform Decis Mak"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1186\/1472-6947-15-s5-s1","type":"journal-article","created":{"date-parts":[[2015,12,22]],"date-time":"2015-12-22T05:04:13Z","timestamp":1450760653000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":45,"title":["Privacy-preserving genome-wide association studies on cloud environment using fully homomorphic encryption"],"prefix":"10.1186","volume":"15","author":[{"given":"Wen-Jie","family":"Lu","sequence":"first","affiliation":[]},{"given":"Yoshiji","family":"Yamada","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Sakuma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,21]]},"reference":[{"key":"925_CR1","volume-title":"A fully homomorphic encryption scheme","author":"C Gentry","year":"2009","unstructured":"Gentry C: A fully homomorphic encryption scheme. 2009, PhD thesis, Stanford University"},{"key":"925_CR2","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1145\/2090236.2090262","volume-title":"Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, ACM","author":"Z Brakerski","year":"2012","unstructured":"Brakerski Z, Gentry C, Vaikuntanathan V: (Leveled) fully homomorphic encryption without bootstrapping. Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, ACM. 2012, 309-325."},{"key":"925_CR3","first-page":"868","volume-title":"Advances in Cryptology-CRYPTO","author":"Z Brakerski","year":"2012","unstructured":"Brakerski Z: Fully homomorphic encryption without modulus switching from classical gapsvp. Advances in Cryptology-CRYPTO. 2012, 868-886."},{"key":"925_CR4","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.jbi.2014.04.003","volume":"50","author":"JW Bos","year":"2014","unstructured":"Bos JW, Lauter K, Naehrig M: Private predictive analysis on encrypted medical data. Journal of biomedical informatics. 2014, 50: 234-243.","journal-title":"Journal of biomedical informatics"},{"key":"925_CR5","first-page":"3","volume-title":"Progress in Cryptology-LATINCRYPT","author":"K Lauter","year":"2014","unstructured":"Lauter K, L\u00f3pez-Alt A, Naehrig M: Private computation on encrypted genomic data. Progress in Cryptology-LATINCRYPT. 2014, 3-27."},{"key":"925_CR6","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1002\/9783527633654","volume-title":"A Statistical Approach to Genetic Epidemiology: Concepts and Applications","author":"A Ziegler","year":"2010","unstructured":"Ziegler A, K\u00f6nig IR: A Statistical Approach to Genetic Epidemiology: Concepts and Applications. 2010, John Wiley & Sons, Berlin, 247-254. 2nd","edition":"2nd"},{"key":"925_CR7","first-page":"1","volume-title":"Proceedings of the 29th Annual International Conference on Theory and Applications of Cryptographic Techniques, Springer-Verlag","author":"V Lyubashevsky","year":"2010","unstructured":"Lyubashevsky V, Peikert C, Regev O: On ideal lattices and learning with errors over rings. Proceedings of the 29th Annual International Conference on Theory and Applications of Cryptographic Techniques, Springer-Verlag. 2010, 1-23."},{"key":"925_CR8","unstructured":"HELib. Accessed: 2014-12-10, [ http:\/\/shaih.github.io\/HElib\/index.html ]"},{"key":"925_CR9","first-page":"850","volume-title":"Advances in Cryptology-CRYPTO","author":"C Gentry","year":"2012","unstructured":"Gentry C, Halevi S, Smart N: Homomorphic evaluation of the AES circuit. Advances in Cryptology-CRYPTO. 2012, 850-867."},{"key":"925_CR10","first-page":"65","volume-title":"Proceedings of the 2013 ACM CCSW ACM","author":"M Yasuda","year":"2013","unstructured":"Yasuda M, Shimoyama T, Kogure J, Yokoyama K, Koshiba T: Secure pattern matching using somewhat homomorphic encryption. Proceedings of the 2013 ACM CCSW ACM. 2013, 65-76."},{"issue":"1","key":"925_CR11","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s10623-012-9720-4","volume":"71","author":"NP Smart","year":"2014","unstructured":"Smart NP, Vercauteren F: Fully homomorphic SIMD operations. Designs, codes and cryptography. 2014, 71 (1): 57-81.","journal-title":"Designs, codes and cryptography"},{"key":"925_CR12","volume-title":"Bioinformatics","author":"L Kamm","year":"2013","unstructured":"Kamm L, Bogdanov D, Laur S, Vilo J: A new way to protect privacy in large-scale genome-wide association studies. Bioinformatics. 2013"},{"key":"925_CR13","first-page":"3","volume-title":"IEEE Symposium on Security and Privacy Workshops, SPW 2015, San Jose, CA, USA, May 21-22, 2015","author":"W Lu","year":"2015","unstructured":"Lu W, Yamada Y, Sakuma J: Efficient secure outsourcing of genome-wide association studies. IEEE Symposium on Security and Privacy Workshops, SPW 2015, San Jose, CA, USA, May 21-22, 2015. 2015, 3-6."},{"key":"925_CR14","first-page":"1079","volume-title":"KDD '13, ACM, New York, NY, USA","author":"A Johnson","year":"2013","unstructured":"Johnson A, Shmatikov V: Privacy-preserving Data Exploration in Genome-wide Association Studies. KDD '13, ACM, New York, NY, USA. 2013, 1079-1087."}],"container-title":["BMC Medical Informatics and Decision Making"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1472-6947-15-S5-S1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1472-6947-15-S5-S1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1472-6947-15-S5-S1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T03:58:43Z","timestamp":1653883123000},"score":1,"resource":{"primary":{"URL":"https:\/\/bmcmedinformdecismak.biomedcentral.com\/articles\/10.1186\/1472-6947-15-S5-S1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":14,"journal-issue":{"issue":"S5","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["925"],"URL":"https:\/\/doi.org\/10.1186\/1472-6947-15-s5-s1","relation":{},"ISSN":["1472-6947"],"issn-type":[{"value":"1472-6947","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12]]},"assertion":[{"value":"21 December 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"S1"}}