{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:24:01Z","timestamp":1775067841878,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"S5","license":[{"start":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T00:00:00Z","timestamp":1448928000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["BMC Med Inform Decis Mak"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1186\/1472-6947-15-s5-s3","type":"journal-article","created":{"date-parts":[[2015,12,22]],"date-time":"2015-12-22T05:04:12Z","timestamp":1450760652000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":96,"title":["Private genome analysis through homomorphic encryption"],"prefix":"10.1186","volume":"15","author":[{"given":"Miran","family":"Kim","sequence":"first","affiliation":[]},{"given":"Kristin","family":"Lauter","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,21]]},"reference":[{"key":"927_CR1","unstructured":"Personal Genome Project. [ http:\/\/www.personalgenomes.org\/ ]"},{"key":"927_CR2","unstructured":"HapMap Project. [ http:\/\/hapmap.ncbi.nlm.nih.gov\/ ]"},{"key":"927_CR3","first-page":"1141","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security","author":"M Humbert","year":"2013","unstructured":"Humbert M, Ayday E, Hubaux J-P, Telenti A: Addressing the concerns of the lacks family: quantification of kin genomic privacy. Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 2013, 1141-1152."},{"issue":"6","key":"927_CR4","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1038\/nrg3723","volume":"15","author":"Y Erlich","year":"2014","unstructured":"Erlich Y, Narayanan A: Routes for breaching and protecting genetic privacy. Nature Reviews Genetics. 2014, 15 (6): 409-421.","journal-title":"Nature Reviews Genetics"},{"key":"927_CR5","unstructured":"Naveed M, Ayday E, Clayton EW, Fellay J, Gunter CA, Hubaux J-P, Malin BA, Wang X: Privacy in the Genomic Era. arXiv,abs\/1405.1891v3"},{"issue":"5","key":"927_CR6","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1109\/TITB.2007.908465","volume":"12","author":"M Kantarcioglu","year":"2008","unstructured":"Kantarcioglu M, Jiang W, Liu Y, Malin B: A cryptographic approach to securely share and query genomic sequences. IEEE Trans on Inf Technol Biomed. 2008, 12 (5): 606-617.","journal-title":"IEEE Trans on Inf Technol Biomed"},{"key":"927_CR7","doi-asserted-by":"crossref","first-page":"691","DOI":"10.1145\/2046707.2046785","volume-title":"Proceedings of the 18th ACM Conference on Computer and Communications Security","author":"P Baldi","year":"2011","unstructured":"Baldi P, Baronio R, Cristofaro ED: Countering GATTACA: efficient and secure testing of fully-sequenced human genomes. Proceedings of the 18th ACM Conference on Computer and Communications Security. 2011, 691-702."},{"key":"927_CR8","volume-title":"USENIX Workshop on Health Information Technologies","author":"E Ayday","year":"2013","unstructured":"Ayday E, Raisaro JL, McLaren PJ, Fellay J, Hubaux J-P: Privacy-preserving Computation of Disease Risk by Using Genomic, Clinical, and Environmental Data. USENIX Workshop on Health Information Technologies. 2013"},{"key":"927_CR9","first-page":"169","volume-title":"Proceedings of the 40th ACM Symposium on Theory of Computing","author":"C Gentry","year":"2009","unstructured":"Gentry C: Fully homomorphic encryption using ideal lattices. Proceedings of the 40th ACM Symposium on Theory of Computing. 2009, 169-178."},{"key":"927_CR10","first-page":"24","volume":"6110","author":"M van Dijk","year":"2010","unstructured":"van Dijk M, Gentry C, Halevi S, Vaikuntanathan V: Fully homomorphic encryption over the integers. Proceedings of Advances in Cryptology-Eurocrypt. 2010, 6110: 24-43.","journal-title":"Proceedings of Advances in Cryptology-Eurocrypt"},{"key":"927_CR11","first-page":"75","volume":"8042","author":"C Gentry","year":"2013","unstructured":"Gentry C, Sahai A, Waters B: Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based. Proceedings of Advances in Cryptology-Crypto. 2013, 8042: 75-92.","journal-title":"Proceedings of Advances in Cryptology-Crypto"},{"key":"927_CR12","first-page":"65","volume-title":"Proceedings of the","author":"M Yasuda","year":"2013","unstructured":"Yasuda M, Shimoyama T, Kogure J, Yokoyama K, Koshiba T: Secure pattern matching using somewhat homomorphic encryption. Proceedings of the. 2013, 65-76. ACM Cloud Computing Security Workshop"},{"key":"927_CR13","first-page":"113","volume-title":"Proceedings of the 18th ACM Conference on Cloud Computing Security","author":"K Lauter","year":"2011","unstructured":"Lauter K, Naehrig M, Vaikuntanathan V: Can homomorphic encryption be practical?. Proceedings of the 18th ACM Conference on Cloud Computing Security. 2011, 113-124."},{"key":"927_CR14","first-page":"1","volume":"7839","author":"T Graepel","year":"2012","unstructured":"Graepel T, Lauter K, Naehrig M: Ml confidential: Machine learning on encrypted data. Proceedings of Information Security and Cryptology-ICISC. 2012, 7839: 1-21.","journal-title":"Proceedings of Information Security and Cryptology-ICISC"},{"key":"927_CR15","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.jbi.2014.04.003","volume":"50","author":"JW Bos","year":"2014","unstructured":"Bos JW, Lauter K, Naehrig M: Private predictive analysis on encrypted medical data. Journal of Biomedical Informatics. 2014, 50: 234-243.","journal-title":"Journal of Biomedical Informatics"},{"key":"927_CR16","first-page":"3","volume":"8895","author":"K Lauter","year":"2014","unstructured":"Lauter K, L\u00f3pez-Alt A, Naehrig M: Private computation on encrypted genomic data. Proceedings of Progress in Cryptology - LATINCRYPT. 2014, 8895: 3-27.","journal-title":"Proceedings of Progress in Cryptology - LATINCRYPT"},{"key":"927_CR17","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/978-3-662-48051-9_15","volume-title":"Proceedings of Financial Cryptography and Data Security - FC International Workshop WAHC","author":"JH Cheon","year":"2015","unstructured":"Cheon JH, Kim M, Lauter K: Homomorphic computation of edit distance. Proceedings of Financial Cryptography and Data Security - FC International Workshop WAHC. Edited by: Brenner M, Christin N, Johnson B, Rohloff K. 2015, 8976: 194-212.","edition":"8976"},{"key":"927_CR18","first-page":"850","volume":"7417","author":"C Gentry","year":"2012","unstructured":"Gentry C, Halevi S, Smart N: Homomorphic evaluation of the AES circuit. Proceedings of Advances in Cryptology-Crypto. 2012, 7417: 850-867.","journal-title":"Proceedings of Advances in Cryptology-Crypto"},{"key":"927_CR19","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/978-3-642-45239-0_4","volume":"8308","author":"JW Bos","year":"2013","unstructured":"Bos JW, Lauter K, Loftus J, Naehrig M: Improved security for a ring-based fully homomorphic encryption scheme. Proceedings of Cryptography and Coding - 14th IMA International Conference. 2013, 8308: 45-64.","journal-title":"Proceedings of Cryptography and Coding - 14th IMA International Conference"},{"issue":"1","key":"927_CR20","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1145\/321796.321811","volume":"21","author":"RA Wagner","year":"1974","unstructured":"Wagner RA, Fischer MJ: The string to string correction problem. Journal of the ACM. 1974, 21 (1): 168-173.","journal-title":"Journal of the ACM"},{"key":"927_CR21","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1145\/2090236.2090262","volume-title":"Proceedings of the 3rd Innovations in Theoretical Computer Science Conference","author":"Z Brakerski","year":"2012","unstructured":"Brakerski Z, Gentry C, Vaikuntanathan V: (Leveled) fully homomorphic encryption without bootstrapping. Proceedings of the 3rd Innovations in Theoretical Computer Science Conference. 2012, 309-325."},{"key":"927_CR22","first-page":"868","volume":"7417","author":"Z Brakerski","year":"2012","unstructured":"Brakerski Z: Fully homomorphic encryption without modulus swithing from classical gapsvp. Proceedings of Advances in Cryptology-Crypto. 2012, 7417: 868-886.","journal-title":"Proceedings of Advances in Cryptology-Crypto"},{"key":"927_CR23","first-page":"1","volume":"6110","author":"V Lyubashevsky","year":"2010","unstructured":"Lyubashevsky V, Peikert C, Regev O: On ideal lattices and learning with errors over rings. Proceedings of Advances in Cryptology-Eurocrypt. 2010, 6110: 1-23.","journal-title":"Proceedings of Advances in Cryptology-Eurocrypt"},{"issue":"1","key":"927_CR24","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s10623-012-9720-4","volume":"71","author":"N Smart","year":"2014","unstructured":"Smart N, Vercauteren F: Fully homomorphic SIMD operations. Designs, Codes and Cryptography. 2014, 71 (1): 57-81.","journal-title":"Designs, Codes and Cryptography"},{"key":"927_CR25","first-page":"27","volume":"6632","author":"D Stehl\u00e9","year":"2011","unstructured":"Stehl\u00e9 D, Steinfeld R: Making NTRU as secure as worst-case problems over ideal lattices. Proceedings of Advances in Cryptology - EUROCRYPT. 2011, 6632: 27-47.","journal-title":"Proceedings of Advances in Cryptology - EUROCRYPT"},{"key":"927_CR26","first-page":"1219","volume-title":"Proceedings of the 40th ACM Symposium on Theory of Computing","author":"A L\u00f3pez-Alt","year":"2012","unstructured":"L\u00f3pez-Alt A, Tromer E, Vaikuntanathan V: On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. Proceedings of the 40th ACM Symposium on Theory of Computing. 2012, 1219-1234."},{"key":"927_CR27","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/978-3-662-48051-9_11","volume-title":"Proceedings of Financial Cryptography and Data Security - FC International Workshop WAHC","author":"JH Cheon","year":"2015","unstructured":"Cheon JH, Kim M, Kim M: Search-and-compute on encrypted data. Proceedings of Financial Cryptography and Data Security - FC International Workshop WAHC. Edited by: Brenner M, Christin N, Johnson B, Rohloff K. 2015, 8976: 142-159.","edition":"8976"},{"key":"927_CR28","volume-title":"Technical report, IBM","author":"S Halevi","year":"2013","unstructured":"Halevi S, Shoup V: Design and implementation of a homomorphic encryption library. Technical report, IBM. 2013"},{"key":"927_CR29","unstructured":"Shoup V: NTL: A Library for Doing Number Theory. [ http:\/\/www.shoup.net\/ntl ]"},{"key":"927_CR30","doi-asserted-by":"crossref","unstructured":"Bluestein LI: A Linear Filtering Approach to the Computation of Discrete Fourier Transform. IEEE Transactions on Audio and Electroacoustics. 18 (4): 451-455.","DOI":"10.1109\/TAU.1970.1162132"},{"issue":"2","key":"927_CR31","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/TASSP.1980.1163372","volume":"28","author":"HJ Nussbaumer","year":"1980","unstructured":"Nussbaumer HJ: Fast polynomial transform algorithms for digital convolution. IEEE Trans on Acoustics, Speech and Signal Proceesing. 1980, 28 (2): 205-215.","journal-title":"IEEE Trans on Acoustics, Speech and Signal Proceesing"},{"key":"927_CR32","first-page":"319","volume":"6558","author":"R Lindner","year":"2011","unstructured":"Lindner R, Peikert C: Better key sizes (and attacks) for lwe-based encryption. Proceedings of Topics in Cryptology-CT-RSA. 2011, 6558: 319-339.","journal-title":"Proceedings of Topics in Cryptology-CT-RSA"},{"key":"927_CR33","first-page":"318","volume":"8469","author":"T Lepoint","year":"2014","unstructured":"Lepoint T, Naehrig M: A comparison of the homomorphic encryption schemes fv and yashe. Proceedings of Progress in Cryptology-AFRICACRYPT. 2014, 8469: 318-335.","journal-title":"Proceedings of Progress in Cryptology-AFRICACRYPT"}],"container-title":["BMC Medical Informatics and Decision Making"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1472-6947-15-S5-S3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1472-6947-15-S5-S3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1472-6947-15-S5-S3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T03:59:00Z","timestamp":1653883140000},"score":1,"resource":{"primary":{"URL":"https:\/\/bmcmedinformdecismak.biomedcentral.com\/articles\/10.1186\/1472-6947-15-S5-S3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":33,"journal-issue":{"issue":"S5","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["927"],"URL":"https:\/\/doi.org\/10.1186\/1472-6947-15-s5-s3","relation":{},"ISSN":["1472-6947"],"issn-type":[{"value":"1472-6947","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12]]},"assertion":[{"value":"21 December 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"S3"}}