{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T21:07:21Z","timestamp":1711487241587},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"S2","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["BMC Genomics"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1186\/s12864-019-5473-z","type":"journal-article","created":{"date-parts":[[2019,4,10]],"date-time":"2019-04-10T04:06:25Z","timestamp":1554869185000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A secure SNP panel scheme using homomorphically encrypted K-mers without SNP calling on the user side"],"prefix":"10.1186","volume":"20","author":[{"given":"Sungjoon","family":"Park","sequence":"first","affiliation":[]},{"given":"Minsu","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Seokjun","family":"Seo","sequence":"additional","affiliation":[]},{"given":"Seungwan","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Kyoohyung","family":"Han","sequence":"additional","affiliation":[]},{"given":"Keewoo","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jung Hee","family":"Cheon","sequence":"additional","affiliation":[]},{"given":"Sun","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,4]]},"reference":[{"issue":"7471","key":"5473_CR1","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1038\/nature12634","volume":"502","author":"C Kandoth","year":"2013","unstructured":"Kandoth C, McLellan MD, Vandin F, Ye K, Niu B, Lu C, et al. Mutational landscape and significance across 12 major cancer types. Nature. 2013; 502(7471):333.","journal-title":"Nature"},{"issue":"23","key":"5473_CR2","doi-asserted-by":"publisher","first-page":"2243","DOI":"10.1056\/NEJMsr1501341","volume":"372","author":"DF Easton","year":"2015","unstructured":"Easton DF, Pharoah PD, Antoniou AC, Tischkowitz M, Tavtigian SV, Nathanson KL, et al. Gene-panel sequencing and the prediction of breast-cancer risk. N Engl J Med. 2015; 372(23):2243\u201357.","journal-title":"N Engl J Med"},{"issue":"3","key":"5473_CR3","first-page":"489","volume":"26","author":"N Spataro","year":"2017","unstructured":"Spataro N, Rodr\u00edguez JA, Navarro A, Bosch E. Properties of human disease genes and the role of genes linked to Mendelian disorders in complex disease aetiology. Hum Mol Genet. 2017; 26(3):489\u2013500.","journal-title":"Hum Mol Genet"},{"key":"5473_CR4","unstructured":"ClinVar Database. Available from: https:\/\/www.ncbi.nlm.nih.gov\/clinvar\/ ."},{"issue":"38","key":"5473_CR5","doi-asserted-by":"publisher","first-page":"10166","DOI":"10.1073\/pnas.1711125114","volume":"114","author":"C Lippert","year":"2017","unstructured":"Lippert C, Sabatini R, Maher MC, Kang EY, Lee S, Arikan O, et al.Identification of individuals by trait prediction using whole-genome sequencing data. Proc Natl Acad Sci. 2017; 114(38):10166\u201371.","journal-title":"Proc Natl Acad Sci"},{"key":"5473_CR6","unstructured":"Gentry C, Boneh D. A fully homomorphic encryption scheme. vol. 20.Stanford University Stanford; 2009."},{"issue":"1","key":"5473_CR7","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/2767007","volume":"48","author":"M Naveed","year":"2015","unstructured":"Naveed M, Ayday E, Clayton EW, Fellay J, Gunter CA, Hubaux JP, et al.Privacy in the genomic era. ACM Comput Surv (CSUR). 2015; 48(1):6.","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"3","key":"5473_CR8","first-page":"552","volume":"105","author":"N Dowlin","year":"2017","unstructured":"Dowlin N, Gilad-Bachrach R, Laine K, Lauter K, Naehrig M, Wernsing J. Manual for using homomorphic encryption for bioinformatics. Proc IEEE. 2017; 105(3):552\u201367.","journal-title":"Proc IEEE"},{"issue":"8","key":"5473_CR9","doi-asserted-by":"publisher","first-page":"e1000167","DOI":"10.1371\/journal.pgen.1000167","volume":"4","author":"N Homer","year":"2008","unstructured":"Homer N, Szelinger S, Redman M, Duggan D, Tembe W, Muehling J, et al. Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays. PLoS Genet. 2008; 4(8):e1000167.","journal-title":"PLoS Genet"},{"key":"5473_CR10","doi-asserted-by":"crossref","unstructured":"Wang R, Li YF, Wang X, Tang H, Zhou X. Learning your identity and disease from research papers: information leaks in genome wide association study. In: Proceedings of the 16th ACM conference on Computer and communications security. ACM: 2009. p. 534\u2013544.","DOI":"10.1145\/1653662.1653726"},{"issue":"6117","key":"5473_CR11","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1126\/science.1229566","volume":"339","author":"M Gymrek","year":"2013","unstructured":"Gymrek M, McGuire AL, Golan D, Halperin E, Erlich Y. Identifying personal genomes by surname inference. Science. 2013; 339(6117):321\u20134.","journal-title":"Science"},{"issue":"5","key":"5473_CR12","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1016\/j.ajhg.2015.09.010","volume":"97","author":"SS Shringarpure","year":"2015","unstructured":"Shringarpure SS, Bustamante CD. Privacy risks from genomic data-sharing beacons. Am J Hum Genet. 2015; 97(5):631\u201346.","journal-title":"Am J Hum Genet"},{"issue":"2","key":"5473_CR13","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1515\/popets-2015-0020","volume":"2015","author":"M Humbert","year":"2015","unstructured":"Humbert M, Huguenin K, Hugonot J, Ayday E, Hubaux JP. De-anonymizing genomic databases using phenotypic traits. Proc Priv Enhancing Technol. 2015; 2015(2):99\u2013114.","journal-title":"Proc Priv Enhancing Technol"},{"issue":"1","key":"5473_CR14","first-page":"137","volume":"5","author":"C Uhlerop","year":"2013","unstructured":"Uhlerop C, Slavkovi\u0107 A, Fienberg SE. Privacy-preserving data sharing for genome-wide association studies. J Priv Confidentiality. 2013; 5(1):137.","journal-title":"J Priv Confidentiality"},{"key":"5473_CR15","doi-asserted-by":"crossref","unstructured":"Johnson A, Shmatikov V. Privacy-preserving data exploration in genome-wide association studies. In: Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM: 2013. p. 1079\u201387.","DOI":"10.1145\/2487575.2487687"},{"key":"5473_CR16","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.jbi.2014.01.008","volume":"50","author":"F Yu","year":"2014","unstructured":"Yu F, Fienberg SE, Slavkovi\u0107 AB, Uhler C. Scalable privacy-preserving data sharing methodology for genome-wide association studies. J Biomed Inform. 2014; 50:133\u201341.","journal-title":"J Biomed Inform"},{"key":"5473_CR17","doi-asserted-by":"crossref","unstructured":"Tram\u00e8r F, Huang Z, Hubaux JP, Ayday E. Differential privacy with bounded priors: reconciling utility and privacy in genome-wide association studies. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM: 2015. p. 1286\u201397.","DOI":"10.1145\/2810103.2813610"},{"issue":"9","key":"5473_CR18","doi-asserted-by":"publisher","first-page":"1293","DOI":"10.1093\/bioinformatics\/btw009","volume":"32","author":"S Simmons","year":"2016","unstructured":"Simmons S, Berger B. Realizing privacy preserving genome-wide association studies. Bioinformatics. 2016; 32(9):1293\u2013300.","journal-title":"Bioinformatics"},{"issue":"1","key":"5473_CR19","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1016\/j.cels.2016.04.013","volume":"3","author":"S Simmons","year":"2016","unstructured":"Simmons S, Sahinalp C, Berger B. Enabling privacy-preserving GWASs in heterogeneous human populations. Cell Syst. 2016; 3(1):54\u201361.","journal-title":"Cell Syst"},{"issue":"1","key":"5473_CR20","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1109\/TITB.2011.2171701","volume":"16","author":"M Canim","year":"2012","unstructured":"Canim M, Kantarcioglu M, Malin B. Secure management of biomedical data with cryptographic hardware. IEEE Trans Inf Technol Biomed. 2012; 16(1):166\u201375.","journal-title":"IEEE Trans Inf Technol Biomed"},{"issue":"7","key":"5473_CR21","doi-asserted-by":"publisher","first-page":"886","DOI":"10.1093\/bioinformatics\/btt066","volume":"29","author":"L Kamm","year":"2013","unstructured":"Kamm L, Bogdanov D, Laur S, Vilo J. A new way to protect privacy in large-scale genome-wide association studies. Bioinformatics. 2013; 29(7):886\u201393.","journal-title":"Bioinformatics"},{"issue":"23","key":"5473_CR22","doi-asserted-by":"publisher","first-page":"3334","DOI":"10.1093\/bioinformatics\/btu561","volume":"30","author":"W Xie","year":"2014","unstructured":"Xie W, Kantarcioglu M, Bush WS, Crawford D, Denny JC, Heatherly R, et al.SecureMA: protecting participant privacy in genetic association meta-analysis. Bioinformatics. 2014; 30(23):3334\u201341.","journal-title":"Bioinformatics"},{"key":"5473_CR23","doi-asserted-by":"crossref","unstructured":"Wang XS, Huang Y, Zhao Y, Tang H, Wang X, Bu D. Efficient genome-wide, privacy-preserving similar patient query based on private edit distance. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM: 2015. p. 492\u2013503.","DOI":"10.1145\/2810103.2813725"},{"key":"5473_CR24","doi-asserted-by":"crossref","unstructured":"Troncoso-Pastoriza JR, Katzenbeisser S, Celik M. Privacy preserving error resilient DNA searching through oblivious automata. In: Proceedings of the 14th ACM conference on Computer and communications security. ACM: 2007. p. 519\u201328.","DOI":"10.1145\/1315245.1315309"},{"issue":"5","key":"5473_CR25","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1109\/TITB.2007.908465","volume":"12","author":"M Kantarcioglu","year":"2008","unstructured":"Kantarcioglu M, Jiang W, Liu Y, Malin B. A cryptographic approach to securely share and query genomic sequences. IEEE Trans Inf Technol Biomed. 2008; 12(5):606\u201317.","journal-title":"IEEE Trans Inf Technol Biomed"},{"key":"5473_CR26","doi-asserted-by":"crossref","unstructured":"Ayday E, Raisaro JL, Hubaux JP, Rougemont J. Protecting and evaluating genomic privacy in medical tests and personalized medicine. In: Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society. ACM: 2013. p. 95\u2013106.","DOI":"10.1145\/2517840.2517843"},{"key":"5473_CR27","unstructured":"Ayday E, Raisaro JL, Laren M, Jack P, Fellay J, Hubaux JP. Privacy-preserving computation of disease risk by using genomic, clinical, and environmental data. In: Proceedings of USENIX Security Workshop on Health Information Technologies (HealthTech\u201913). USENIX Security: 2013."},{"key":"5473_CR28","doi-asserted-by":"crossref","unstructured":"Kim M, Lauter K. Private genome analysis through homomorphic encryption. In: BMC medical informatics and decision making. vol. 15. BioMed Central: 2015. p. S3.","DOI":"10.1186\/1472-6947-15-S5-S3"},{"key":"5473_CR29","doi-asserted-by":"crossref","unstructured":"Lu WJ, Yamada Y, Sakuma J. Privacy-preserving genome-wide association studies on cloud environment using fully homomorphic encryption. In: BMC medical informatics and decision making. vol. 15. BioMed Central: 2015. p. S1.","DOI":"10.1186\/1472-6947-15-S5-S1"},{"key":"5473_CR30","doi-asserted-by":"crossref","unstructured":"Zhang Y, Dai W, Jiang X, Xiong H, Wang S. Foresee: Fully outsourced secure genome study based on homomorphic encryption. In: BMC medical informatics and decision making, vol. 15. BioMed Central: 2015. p. S5.","DOI":"10.1186\/1472-6947-15-S5-S5"},{"issue":"2","key":"5473_CR31","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1093\/bioinformatics\/btv563","volume":"32","author":"S Wang","year":"2015","unstructured":"Wang S, Zhang Y, Dai W, Lauter K, Kim M, Tang Y, et al.HEALER: Homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS. Bioinformatics. 2015; 32(2):211\u20138.","journal-title":"Bioinformatics"},{"issue":"5","key":"5473_CR32","first-page":"1413","volume":"15","author":"JL Raisaro","year":"2018","unstructured":"Raisaro JL, Choi G, Pradervand S, Colsenet R, Jacquemont N, Rosat N, Mooser V, Hubaux J-P. Protecting privacy and security of genomic data in I2B2 with homomorphic encryption and differential privacy. IEEE\/ACM Trans Comput Biol Bioinforma. 2018; 15(5):1413\u201326.","journal-title":"IEEE\/ACM Trans Comput Biol Bioinforma"},{"issue":"6352","key":"5473_CR33","doi-asserted-by":"publisher","first-page":"692","DOI":"10.1126\/science.aam9710","volume":"357","author":"KA Jagadeesh","year":"2017","unstructured":"Jagadeesh KA, Wu DJ, Birgmeier JA, Boneh D, Bejerano G. Deriving genomic diagnoses without revealing patient genomes. Science. 2017; 357(6352):692\u20135.","journal-title":"Science"},{"issue":"3","key":"5473_CR34","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/s10109-017-0252-3","volume":"19","author":"GM Jacquez","year":"2017","unstructured":"Jacquez GM, Essex A, Curtis A, Kohler B, Sherman R, El Emam K, et al. Geospatial cryptography: enabling researchers to access private, spatially referenced, human subjects data for cancer control and prevention. J Geogr Syst. 2017; 19(3):197\u2013220.","journal-title":"J Geogr Syst"},{"issue":"5","key":"5473_CR35","doi-asserted-by":"publisher","first-page":"1466","DOI":"10.1109\/JBHI.2016.2625299","volume":"21","author":"R Ghasemi","year":"2017","unstructured":"Ghasemi R, Al Aziz MM, Mohammed N, Dehkordi MH, Jiang X. Private and efficient query processing on outsourced genomic databases. IEEE J Biomed Health Inform. 2017; 21(5):1466\u201372.","journal-title":"IEEE J Biomed Health Inform"},{"key":"5473_CR36","doi-asserted-by":"crossref","unstructured":"Cheng K, Hou Y, Wang L. Secure Similar Sequence Query on Outsourced Genomic Data. In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security. ACM: 2018. p. 237\u201351.","DOI":"10.1145\/3196494.3196535"},{"issue":"1","key":"5473_CR37","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1186\/s12920-016-0224-3","volume":"9","author":"H Tang","year":"2016","unstructured":"Tang H, Jiang X, Wang X, Wang S, Sofia H, Fox D, et al. Protecting genomic data analytics in the cloud: state of the art and opportunities. BMC Med Genom. 2016; 9(1):63.","journal-title":"BMC Med Genom"},{"issue":"6822","key":"5473_CR38","doi-asserted-by":"publisher","first-page":"860","DOI":"10.1038\/35057062","volume":"409","author":"IHGS Consortium","year":"2001","unstructured":"Consortium IHGS, et al. Initial sequencing and analysis of the human genome. Nature. 2001; 409(6822):860.","journal-title":"Nature"},{"issue":"D1","key":"5473_CR39","doi-asserted-by":"crossref","first-page":"D762","DOI":"10.1093\/nar\/gkx1020","volume":"46","author":"J Casper","year":"2017","unstructured":"Casper J, Zweig AS, Villarreal C, Tyner C, Speir ML, Rosenbloom KR, et al. The UCSC genome browser database: 2018 update. Nucleic Acids Res. 2017; 46(D1):D762\u2013D769.","journal-title":"Nucleic Acids Res"},{"issue":"7418","key":"5473_CR40","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1038\/nature11412","volume":"490","author":"CGA Network","year":"2012","unstructured":"Network CGA, et al. Comprehensive molecular portraits of human breast tumours. Nature. 2012; 490(7418):61.","journal-title":"Nature"},{"key":"5473_CR41","doi-asserted-by":"publisher","first-page":"15183","DOI":"10.1038\/ncomms15183","volume":"8","author":"B Milholland","year":"2017","unstructured":"Milholland B, Dong X, Zhang L, Hao X, Suh Y, Vijg J. Differences between germline and somatic mutation rates in humans and mice. Nat Commun. 2017; 8:15183.","journal-title":"Nat Commun"},{"issue":"7571","key":"5473_CR42","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1038\/nature15393","volume":"526","author":"GP Consortium","year":"2015","unstructured":"Consortium GP, et al. A global reference for human genetic variation. Nature. 2015; 526(7571):68.","journal-title":"Nature"}],"container-title":["BMC Genomics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s12864-019-5473-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s12864-019-5473-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s12864-019-5473-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T15:29:14Z","timestamp":1694791754000},"score":1,"resource":{"primary":{"URL":"https:\/\/bmcgenomics.biomedcentral.com\/articles\/10.1186\/s12864-019-5473-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":42,"journal-issue":{"issue":"S2","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["5473"],"URL":"https:\/\/doi.org\/10.1186\/s12864-019-5473-z","relation":{},"ISSN":["1471-2164"],"issn-type":[{"value":"1471-2164","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4]]},"assertion":[{"value":"4 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Not applicable.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"188"}}