{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T19:26:59Z","timestamp":1767986819407,"version":"3.49.0"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,9,7]],"date-time":"2019-09-07T00:00:00Z","timestamp":1567814400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2019,9,7]],"date-time":"2019-09-07T00:00:00Z","timestamp":1567814400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000070","name":"National Institute of Biomedical Imaging and Bioengineering","doi-asserted-by":"publisher","award":["U01EB023685"],"award-info":[{"award-number":["U01EB023685"]}],"id":[{"id":"10.13039\/100000070","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000038","name":"NSERC","doi-asserted-by":"crossref","award":["RGPIN-2015-04147"],"award-info":[{"award-number":["RGPIN-2015-04147"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100000002","name":"National Institutes of Health","doi-asserted-by":"publisher","award":["U01TR002062"],"award-info":[{"award-number":["U01TR002062"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010318","name":"University of Manitoba","doi-asserted-by":"crossref","award":["University Research Grants Program (URGP)"],"award-info":[{"award-number":["University Research Grants Program (URGP)"]}],"id":[{"id":"10.13039\/100010318","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["BMC Med Inform Decis Mak"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1186\/s12911-019-0867-z","type":"journal-article","created":{"date-parts":[[2019,9,7]],"date-time":"2019-09-07T08:03:07Z","timestamp":1567843387000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["A privacy-preserving distributed filtering framework for NLP artifacts"],"prefix":"10.1186","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1674-8764","authenticated-orcid":false,"given":"Md Nazmus","family":"Sadat","sequence":"first","affiliation":[]},{"given":"Md Momin Al","family":"Aziz","sequence":"additional","affiliation":[]},{"given":"Noman","family":"Mohammed","sequence":"additional","affiliation":[]},{"given":"Serguei","family":"Pakhomov","sequence":"additional","affiliation":[]},{"given":"Hongfang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiaoqian","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,7]]},"reference":[{"key":"867_CR1","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1016\/j.jbi.2009.08.007","volume":"42","author":"D Demner-Fushman","year":"2009","unstructured":"Demner-Fushman D, Chapman WW, McDonald CJ. What can natural language processing do for clinical decision support? J Biomed Inform. 2009;42:760\u201372.","journal-title":"J Biomed Inform"},{"key":"867_CR2","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1186\/1472-6947-8-32","volume":"8","author":"I Neamatullah","year":"2008","unstructured":"Neamatullah I, Douglass MM, Lehman L-WH, Reisner A, Villarroel M, Long WJ, et al. Automated de-identification of free-text medical records. BMC Med Inform Decis Mak. 2008;8:32.","journal-title":"BMC Med Inform Decis Mak."},{"key":"867_CR3","first-page":"341","volume":"2004","author":"M Douglass","year":"2004","unstructured":"Douglass M, Clifford GD, Reisner A, Moody GB, Mark RG. Computer-assisted de-identification of free text in the MIMIC II database. Comput Cardiol. 2004;2004:341\u20134.","journal-title":"Comput Cardiol"},{"key":"867_CR4","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1186\/1472-6947-6-12","volume":"6","author":"BA Beckwith","year":"2006","unstructured":"Beckwith BA, Mahaadevan R, Balis UJ, Kuo F. Development and evaluation of an open source software tool for deidentification of pathology reports. BMC Med Inform Decis Mak. 2006;6:12.","journal-title":"BMC Med Inform Decis Mak"},{"key":"867_CR5","doi-asserted-by":"crossref","first-page":"680","DOI":"10.5858\/2003-127-680-CMDS","volume":"127","author":"JJ Berman","year":"2003","unstructured":"Berman JJ. Concept-match medical data scrubbing. How pathology text can be used in research. Arch Pathol Lab Med. 2003;127:680\u20136.","journal-title":"Arch Pathol Lab Med"},{"key":"867_CR6","unstructured":"Finley GP, Pakhomov SVS, Melton GB. Automated De-Identification of Distributional Semantic Models: AMIA Annual Symposium; 2016."},{"key":"867_CR7","unstructured":"Sweeney L. Replacing personally-identifying information in medical records, the scrub system. Proc AMIA Annu Fall Symp. 1996:333\u20137."},{"key":"867_CR8","unstructured":"Sweeney L. Guaranteeing anonymity when sharing medical data, the Datafly system. Proc AMIA Annu Fall Symp. 1997:51\u20135."},{"key":"867_CR9","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1186\/1471-2288-10-70","volume":"10","author":"SM Meystre","year":"2010","unstructured":"Meystre SM, Friedlin FJ, South BR, Shen S, Samore MH. Automatic de-identification of textual documents in the electronic health record: a review of recent research. BMC Med Res Methodol. 2010;10:70.","journal-title":"BMC Med Res Methodol"},{"issue":"5","key":"867_CR10","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1197\/jamia.M2441","volume":"14","author":"G. Szarvas","year":"2007","unstructured":"Szarvas G, Farkas R, Busa-Fekete R. State-of-the-art anonymization of medical records using an iterative machine learning framework. J Am Med Inform Assoc. 2007;14:574\u2013580.","journal-title":"Journal of the American Medical Informatics Association"},{"key":"867_CR11","unstructured":"Guo Y, Gaizauskas R. Identifying personal health information using support vector machines. i2b2 workshop on \u0142dots. 2006; Available: ftp:\/\/ftp.dcs.shef.ac.uk\/home\/robertg\/papers\/amia06-deident.pdf"},{"key":"867_CR12","doi-asserted-by":"crossref","unstructured":"Gardner J, Xiong L. HIDE: An Integrated System for Health Information DE-identification: EDBT. IEEE; 2008. p. 254\u20139.","DOI":"10.1109\/CBMS.2008.129"},{"key":"867_CR13","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1197\/jamia.M2435","volume":"14","author":"B Wellner","year":"2007","unstructured":"Wellner B, Huyck M, Mardis S, Aberdeen J, Morgan A, Peshkin L, et al. Rapidly retargetable approaches to de-identification in medical records. J Am Med Inform Assoc. 2007;14:564\u201373.","journal-title":"J Am Med Inform Assoc"},{"key":"867_CR14","doi-asserted-by":"crossref","first-page":"596","DOI":"10.1093\/jamia\/ocw156","volume":"24","author":"F Dernoncourt","year":"2017","unstructured":"Dernoncourt F, Lee JY, Uzuner O, Szolovits P. De-identification of patient notes with recurrent neural networks. J Am Med Inform Assoc. 2017;24:596\u2013606.","journal-title":"J Am Med Inform Assoc"},{"key":"867_CR15","doi-asserted-by":"crossref","unstructured":"Li D, Rastegar-Mojarad M, Elayavilli RK, Wang Y, Mehrabi S, Yu Y, et al. A frequency-filtering strategy of obtaining PHI-free sentences from clinical data repository. Proceedings of the 6th ACM Conference on Bioinformatics, Computational Biology and Health Informatics. ACM; 2015. pp. 315\u2013324.","DOI":"10.1145\/2808719.2808752"},{"issue":"8","key":"867_CR16","doi-asserted-by":"publisher","first-page":"2517","DOI":"10.1007\/s00500-017-2506-x","volume":"22","author":"Xu An Wang","year":"2017","unstructured":"Wang XA, Xhafa F, Luo X, Zhang S, Ding Y. A privacy-preserving fuzzy interest matching protocol for friends finding in social networks. Soft Computing. 2018. pp. 2517\u20132526. doi: https:\/\/doi.org\/10.1007\/s00500-017-2506-x","journal-title":"Soft Computing"},{"key":"867_CR17","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134061","volume-title":"Fast Private Set Intersection from Homomorphic Encryption. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS \u201817","author":"H Chen","year":"2017","unstructured":"Chen H, Laine K, Rindal P. Fast Private Set Intersection from Homomorphic Encryption. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS \u201817; 2017. https:\/\/doi.org\/10.1145\/3133956.3134061 ."},{"key":"867_CR18","doi-asserted-by":"crossref","unstructured":"Kissner L, Song - Crypto D. Privacy-preserving set operations, vol. 2005: Springer; 2005. Available: http:\/\/link.springer.com\/content\/pdf\/10.1007\/11535218.pdf#page=251","DOI":"10.21236\/ADA457144"},{"key":"867_CR19","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/978-3-319-19962-7_24","volume-title":"Information Security and Privacy","author":"Rolf Egert","year":"2015","unstructured":"Egert R, Fischlin M, Gens D, Jacob S, Senker M, Tillmanns J. Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters. Information Security and Privacy. Springer, Cham; 2015. pp. 413\u2013430."},{"key":"867_CR20","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/s10916-016-0657-4","volume":"41","author":"A Miyaji","year":"2017","unstructured":"Miyaji A, Nakasho K, Nishida S. Privacy-Preserving Integration of Medical Data. J Med Syst. Springer US. 2017;41:37.","journal-title":"J Med Syst"},{"key":"867_CR21","first-page":"334","volume-title":"Privacy-preserving ridge regression on hundreds of millions of records. Security and Privacy (SP), 2013 IEEE Symposium on. IEEE","author":"V Nikolaenko","year":"2013","unstructured":"Nikolaenko V, Weinsberg U, Ioannidis S, Joye M, Boneh D, Taft N. Privacy-preserving ridge regression on hundreds of millions of records. Security and Privacy (SP), 2013 IEEE Symposium on. IEEE; 2013. p. 334\u201348."},{"issue":"1","key":"867_CR22","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/TCBB.2018.2829760","volume":"16","author":"Md Nazmus Sadat","year":"2019","unstructured":"Sadat MN, Aziz MMA, Mohammed N, Chen F, Jiang X, Wang S. SAFETY: secure gwAs in federated environment through a hYbrid solution. IEEE\/ACM Trans Comput Biol Bioinform. 2018. https:\/\/doi.org\/10.1109\/TCBB.2018.2829760 .","journal-title":"IEEE\/ACM Transactions on Computational Biology and Bioinformatics"},{"key":"867_CR23","first-page":"169","volume":"4","author":"RL Rivest","year":"1978","unstructured":"Rivest RL, Adleman L, Dertouzos ML. On data banks and privacy homomorphisms. Foundations of secure computation. 1978;4:169\u201380.","journal-title":"Foundations of secure computation"},{"key":"867_CR24","doi-asserted-by":"crossref","unstructured":"Paillier P. Public-key cryptosystems based on composite degree residuosity classes. Advances in cryptology\u2014EUROCRYPT\u201999. Springer; 1999. pp. 223\u2013238.","DOI":"10.1007\/3-540-48910-X_16"},{"key":"867_CR25","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory IEEE. 1985;31:469\u201372.","journal-title":"IEEE Trans Inf Theory IEEE"},{"key":"867_CR26","volume-title":"XPIR: Private information retrieval for everyone. on Privacy Enhancing","author":"CA Melchor","year":"2016","unstructured":"Melchor CA, Barrier J, Fousse L. XPIR: Private information retrieval for everyone. on Privacy Enhancing; 2016; Available: https:\/\/hal.archives-ouvertes.fr\/hal-01396142\/ . hal.archives-ouvertes.fr"},{"key":"867_CR27","unstructured":"Dowlin N, Gilad-Bachrach R, Laine K, Lauter K, Naehrig M, Wernsing J. Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy: International Conference on Machine Learning ICML; 2016. p. 201\u201310."},{"key":"867_CR28","doi-asserted-by":"crossref","unstructured":"Naehrig M, Lauter K, Vaikuntanathan V. Can homomorphic encryption be practical? Proceedings of the 3rd ACM workshop on Cloud computing security workshop: ACM; 2011. p. 113\u201324.","DOI":"10.1145\/2046660.2046682"},{"key":"867_CR29","doi-asserted-by":"crossref","unstructured":"Brakerski Z, Gentry C, Vaikuntanathan V. (Leveled) fully homomorphic encryption without bootstrapping. Proceedings of the 3rd Innovations in Theoretical Computer Science Conference on - ITCS \u201812. New York: ACM Press; 2012. pp. 309\u2013325.","DOI":"10.1145\/2090236.2090262"},{"key":"867_CR30","first-page":"144","volume":"2012","author":"J Fan","year":"2012","unstructured":"Fan J, Vercauteren F. Somewhat Practical Fully Homomorphic Encryption. IACR Cryptology ePrint Archive. 2012;2012:144.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"867_CR31","doi-asserted-by":"crossref","unstructured":"Bos JW, Lauter KE, Loftus J, Naehrig M. Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme: IMA Int Conf. Springer; 2013. p. 45\u201364.","DOI":"10.1007\/978-3-642-45239-0_4"},{"key":"867_CR32","unstructured":"Acar A, Aksu H, Selcuk Uluagac A, Conti M. A Survey on Homomorphic Encryption Schemes: Theory and Implementation. arXiv. 2017; Available: http:\/\/arxiv.org\/abs\/1704.03578 . Accessed 21 Jan 2018"},{"key":"867_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/4635715","volume":"2018","author":"Tan Ping Zhou","year":"2018","unstructured":"Zhou TP, Li NB, Yang XY, Lv LQ, Ding YT, Wang XA. Secure Testing for Genetic Diseases on Encrypted Genomes with Homomorphic Encryption Scheme Secur Commun Netw. 2018. pp. 1\u201312. doi: https:\/\/doi.org\/10.1155\/2018\/4635715","journal-title":"Security and Communication Networks"},{"key":"867_CR34","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s10623-012-9720-4","volume":"71","author":"NP Smart","year":"2014","unstructured":"Smart NP, Vercauteren F. Fully homomorphic SIMD operations. Des Codes Cryptogr Springer US. 2014;71:57\u201381.","journal-title":"Des Codes Cryptogr Springer US"},{"key":"867_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-36362-7_1","volume-title":"Packed Ciphertexts in LWE-Based Homomorphic Encryption. Public-Key Cryptography \u2013 PKC 2013","author":"Z Brakerski","year":"2013","unstructured":"Brakerski Z, Gentry C, Halevi S. Packed Ciphertexts in LWE-Based Homomorphic Encryption. Public-Key Cryptography \u2013 PKC 2013. Berlin: Springer; 2013. p. 1\u201313."},{"key":"867_CR36","doi-asserted-by":"crossref","unstructured":"Paar C, Pelzl J. Understanding Cryptography: A Textbook for Students and Practitioners: Springer Science & Business Media; 2009.","DOI":"10.1007\/978-3-642-04101-3"},{"key":"867_CR37","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1109\/TCSI.2014.2350431","volume":"62","author":"DD Chen","year":"2015","unstructured":"Chen DD, Mentens N, Vercauteren F, Roy SS, Cheung RCC, Pao D, et al. High-speed polynomial multiplication architecture for ring-LWE and SHE cryptosystems. IEEE Trans Circuits Syst I Regul Pap. 2015;62:157\u201366.","journal-title":"IEEE Trans Circuits Syst I Regul Pap"},{"key":"867_CR38","doi-asserted-by":"publisher","first-page":"160035","DOI":"10.1038\/sdata.2016.35","volume":"3","author":"AEW Johnson","year":"2016","unstructured":"Johnson AEW, Pollard TJ, Shen L, Lehman L-WH, Feng M, Ghassemi M, et al. MIMIC-III, a freely accessible critical care database. Sci Data. 2016;3:160035.","journal-title":"Sci Data"},{"key":"867_CR39","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/978-3-319-29485-8_20","volume-title":"NFLlib: NTT-Based Fast Lattice Library. Topics in Cryptology - CT-RSA 2016","author":"C Aguilar-Melchor","year":"2016","unstructured":"Aguilar-Melchor C, Barrier J, Guelton S, Guinet A, Killijian M-O, Lepoint T. NFLlib: NTT-Based Fast Lattice Library. Topics in Cryptology - CT-RSA 2016. Cham: Springer; 2016. p. 341\u201356."},{"key":"867_CR40","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/S1386-5056(02)00058-8","volume":"67","author":"M Volk","year":"2002","unstructured":"Volk M, Ripplinger B, Vintar S, Buitelaar P, Raileanu D, Sacaleanu B. Semantic annotation for concept-based cross-language medical information retrieval. Int J Med Inform. 2002;67:97\u2013112.","journal-title":"Int J Med Inform"},{"key":"867_CR41","doi-asserted-by":"crossref","unstructured":"Lindner R, Peikert C. Better key sizes (and attacks) for LWE-baAvailable:sed encryption. CT-RSA: Springer; 2011. http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19074-2.pdf#page=330","DOI":"10.1007\/978-3-642-19074-2_21"},{"key":"867_CR42","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1007\/978-3-540-45146-4_36","volume-title":"Making a Faster Cryptanalytic Time-Memory Trade-Off. Advances in Cryptology - CRYPTO 2003","author":"P Oechslin","year":"2003","unstructured":"Oechslin P. Making a Faster Cryptanalytic Time-Memory Trade-Off. Advances in Cryptology - CRYPTO 2003. Berlin: Springer; 2003. p. 617\u201330."},{"key":"867_CR43","first-page":"199","volume":"2004","author":"X Wang","year":"2004","unstructured":"Wang X, Feng D, Lai X, Yu H. Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD. IACR Cryptology ePrint Archive. 2004;2004:199.","journal-title":"IACR Cryptology ePrint Archive"}],"container-title":["BMC Medical Informatics and Decision Making"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s12911-019-0867-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s12911-019-0867-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s12911-019-0867-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T20:45:58Z","timestamp":1664311558000},"score":1,"resource":{"primary":{"URL":"https:\/\/bmcmedinformdecismak.biomedcentral.com\/articles\/10.1186\/s12911-019-0867-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,7]]},"references-count":43,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["867"],"URL":"https:\/\/doi.org\/10.1186\/s12911-019-0867-z","relation":{},"ISSN":["1472-6947"],"issn-type":[{"value":"1472-6947","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,7]]},"assertion":[{"value":"2 December 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 July 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 September 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Not applicable.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"183"}}