{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T19:25:11Z","timestamp":1774121111654,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"S5","license":[{"start":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T00:00:00Z","timestamp":1448928000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["BMC Med Inform Decis Mak"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1186\/1472-6947-15-s5-s5","type":"journal-article","created":{"date-parts":[[2015,12,22]],"date-time":"2015-12-22T05:04:11Z","timestamp":1450760651000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":45,"title":["FORESEE: Fully Outsourced secuRe gEnome Study basEd on homomorphic Encryption"],"prefix":"10.1186","volume":"15","author":[{"given":"Yuchen","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Wenrui","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Xiaoqian","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Hongkai","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Shuang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,21]]},"reference":[{"key":"929_CR1","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1038\/455047a","volume":"455","author":"D Howe","year":"2008","unstructured":"Howe D, Costanzo M, Fey P, Gojobori T, Hannick L, Hide W, Hill DP, Kania R, Schaeffer M, St Pierre S, Twigger S, White O, Rhee SY: Big data: The future of biocuration. Nature. 2008, 455: 47-50.","journal-title":"Nature"},{"key":"929_CR2","unstructured":"The NIST Definition of Cloud Computing. National Institute of Standards and Technology"},{"key":"929_CR3","unstructured":"NOTLODL15L086: Notice for Use of Cloud Computing Services for Storage and Analysis of ControlledLAccess Data Subject to the NIH Genomic Data Sharing (GDS) Policy. [http:\/\/grants.nih.gov\/grants\/guide\/noticeRfiles\/NOTRODR15-086.html]"},{"key":"929_CR4","doi-asserted-by":"publisher","first-page":"e1000167","DOI":"10.1371\/journal.pgen.1000167","volume":"4","author":"N Homer","year":"2008","unstructured":"Homer N, Szelinger S, Redman M, Duggan D, Tembe W, Muehling J, Pearson JV, Stephan DA, Nelson SF, Craig DW: Resolving individuals contributing trace amounts of DNA to highly complex mixtures using highLdensity SNP genotyping microarrays. PLoS Genet. 2008, 4: e1000167-","journal-title":"PLoS Genet"},{"key":"929_CR5","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1126\/science.1229566","volume":"339","author":"M Gymrek","year":"2013","unstructured":"Gymrek M, McGuire AL, Golan D, Halperin E, Erlich Y: Identifying personal genomes by surname inference. Science (80-). 2013, 339: 321-324.","journal-title":"Science (80-)"},{"key":"929_CR6","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1145\/1653662.1653726","volume-title":"Proceedings of the 16th ACM conference on Computer and communications security - CCS '09","author":"R Wang","year":"2009","unstructured":"Wang R, Li YF, Wang X, Tang H, Zhou X: Learning your identity and disease from research papers. Proceedings of the 16th ACM conference on Computer and communications security - CCS '09. 2009, New York, New York, USA: ACM Press, 534-44."},{"key":"929_CR7","volume-title":"Privacy and Security in the Genomic Era","author":"M Naveed","year":"2014","unstructured":"Naveed M, Ayday E, Clayton EW, Fellay J, Gunter CA, Hubaux JRP, Malin BA, Wang X: Privacy and Security in the Genomic Era. 2014"},{"issue":"Suppl 1","key":"929_CR8","doi-asserted-by":"publisher","first-page":"S2","DOI":"10.1186\/1472-6947-14-S1-S2","volume":"14","author":"S Wang","year":"2014","unstructured":"Wang S, Mohammed N, Chen R: Differentially private genome data dissemination through topLdown specialization. BMC Med Inform Decis Mak. 2014, 14 (Suppl 1): S2-","journal-title":"BMC Med Inform Decis Mak"},{"key":"929_CR9","doi-asserted-by":"publisher","first-page":"886","DOI":"10.1093\/bioinformatics\/btt066","volume":"29","author":"L Kamm","year":"2013","unstructured":"Kamm L, Bogdanov D, Laur S, Vilo J: A new way to protect privacy in largeLscale genomeLwide association studies. Bioinformatics. 2013, 29: 886-93.","journal-title":"Bioinformatics"},{"key":"929_CR10","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1109\/SKG.2010.19","volume-title":"2010 Sixth International Conference on Semantics, Knowledge and Grids. IEEE","author":"M Zhou","year":"2010","unstructured":"Zhou M, Zhang R, Xie W, Qian W, Zhou A: Security and Privacy in Cloud Computing: A Survey. 2010 Sixth International Conference on Semantics, Knowledge and Grids. IEEE. 2010, 105-112."},{"key":"929_CR11","first-page":"1","volume-title":"IEEE Conference on High Performance Extreme Computing (HPEC)","author":"W Wang","year":"2012","unstructured":"Wang W, Hu Y, Chen L: Accelerating fully homomorphic encryption using GPU. IEEE Conference on High Performance Extreme Computing (HPEC). 2012, 1-5."},{"key":"929_CR12","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1145\/1536414.1536440","volume-title":"Proceedings of the 41st annual ACM symposium on Symposium on theory of computing - STOC '09","author":"C Gentry","year":"2009","unstructured":"Gentry C: Fully homomorphic encryption using ideal lattices. Proceedings of the 41st annual ACM symposium on Symposium on theory of computing - STOC '09. 2009, New York, NY, USA: ACM Press, 169-178."},{"key":"929_CR13","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1145\/2090236.2090262","volume-title":"Proceedings of the 3rd Innovations in Theoretical Computer Science Conference on - ITCS '12","author":"Z Brakerski","year":"2012","unstructured":"Brakerski Z, Gentry C, Vaikuntanathan V: (Leveled) fully homomorphic encryption without bootstrapping. Proceedings of the 3rd Innovations in Theoretical Computer Science Conference on - ITCS '12. 2012, New York, NY, USA: ACM Press, 111: 309-325."},{"key":"929_CR14","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1137\/120868669","volume":"43","author":"Z Brakerski","year":"2011","unstructured":"Brakerski Z, Vaikuntanathan V: Efficient fully homomorphic encryption from (standard) LWE. SIAM J Comput. 2011, 43: 831-871.","journal-title":"SIAM J Comput"},{"key":"929_CR15","volume-title":"14th Privacy Enhancing Technologies Symposium, Workshop on Genome Privacy (GenoPri'14)","author":"K Lauter","year":"2014","unstructured":"Lauter K, L\u00f3pezRAlt A, Naehrig M: Private computation on encrypted genomic data. 14th Privacy Enhancing Technologies Symposium, Workshop on Genome Privacy (GenoPri'14). 2014, Amsterdam, The Netherlands"},{"key":"929_CR16","first-page":"1","volume-title":"Communications (COMM), 2014 10th International Conference on","author":"M Togan","year":"2014","unstructured":"Togan M, Plesca C: ComparisonLbased computations over fully homomorphic encrypted data. Communications (COMM), 2014 10th International Conference on. 2014, 1-6."},{"key":"929_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-37682-5_1","volume-title":"Information Security and Cryptology ICISC 2012","author":"T Graepel","year":"2013","unstructured":"Graepel T, Lauter K, Naehrig M: ML confidential: Machine learning on encrypted data. Information Security and Cryptology ICISC 2012. 2013, Springer, 1-21."},{"key":"929_CR18","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1145\/2046660.2046682","volume-title":"Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW '11","author":"M Naehrig","year":"2011","unstructured":"Naehrig M, Lauter K, Vaikuntanathan V: Can homomorphic encryption be practical?. Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW '11. 2011, New York, NY, USA: ACM Press, 113-"},{"key":"929_CR19","volume-title":"WAHC'15 - 3rd Workshop on Encrypted Computing and Applied Homomorphic Cryptography","author":"JH Cheon","year":"2015","unstructured":"Cheon JH, Kim M, Lauter K: Homomorphic Computation of Edit Distance. WAHC'15 - 3rd Workshop on Encrypted Computing and Applied Homomorphic Cryptography. 2015"},{"key":"929_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14303-8","volume-title":"Efficient Secure Two-Party Protocols","author":"C Hazay","year":"2010","unstructured":"Hazay C, Lindell Y: Efficient Secure Two-Party Protocols. 2010, Berlin, Heidelberg: Springer Berlin Heidelberg, Information Security and Cryptography"},{"key":"929_CR21","unstructured":"2015 iDASH Privacy and security Workshop. [http:\/\/www.humangenomeprivacy.org\/2015\/]"},{"key":"929_CR22","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.jbi.2014.04.003","volume":"50","author":"JW Bos","year":"2014","unstructured":"Bos JW, Lauter K, Naehrig M: Private predictive analysis on encrypted medical data. J Biomed Inform. 2014, 50: 234-243.","journal-title":"J Biomed Inform"},{"key":"929_CR23","unstructured":"[https:\/\/github.com\/shaih\/HElib]"},{"key":"929_CR24","volume-title":"Bioinformatics","author":"S Wang","year":"2015","unstructured":"Wang S, Zhang Y, Dai W, Lauter K, Kim M, Tang Y, Xiong H, Jiang X: HEALER: Homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS. Bioinformatics. 2015, [accepted]"},{"key":"929_CR25","volume-title":"Proceedings of the 5th Annual Translational Bioinformatics Conference Tokyo, Japan","author":"Y Zhang","year":"2015","unstructured":"Zhang Y, Dai W, Wang S, Kim M, Lauter K, Sakuma J, Xiong H, Jiang X: SECRET: Secure EditLdistance computation over homomoRphic Encrypted daTa. Proceedings of the 5th Annual Translational Bioinformatics Conference Tokyo, Japan. 2015, [accepted]"}],"container-title":["BMC Medical Informatics and Decision Making"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1472-6947-15-S5-S5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1472-6947-15-S5-S5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/1472-6947-15-S5-S5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,2]],"date-time":"2021-09-02T19:57:53Z","timestamp":1630612673000},"score":1,"resource":{"primary":{"URL":"https:\/\/bmcmedinformdecismak.biomedcentral.com\/articles\/10.1186\/1472-6947-15-S5-S5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":25,"journal-issue":{"issue":"S5","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["929"],"URL":"https:\/\/doi.org\/10.1186\/1472-6947-15-s5-s5","relation":{},"ISSN":["1472-6947"],"issn-type":[{"value":"1472-6947","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12]]},"assertion":[{"value":"21 December 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"S5"}}