{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T21:02:28Z","timestamp":1725829348402},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662480502"},{"type":"electronic","value":"9783662480519"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-48051-9_15","type":"book-chapter","created":{"date-parts":[[2015,9,4]],"date-time":"2015-09-04T13:44:22Z","timestamp":1441374262000},"page":"194-212","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":79,"title":["Homomorphic Computation of Edit Distance"],"prefix":"10.1007","author":[{"given":"Jung Hee","family":"Cheon","sequence":"first","affiliation":[]},{"given":"Miran","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Kristin","family":"Lauter","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,5]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Atallah, M.J., Kerschbaum, F., Du, W.: Secure and private sequence comparisons. In: WPES, pp. 39\u201344 (2003)","DOI":"10.1145\/1005140.1005147"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Ayday, E., Hubaux, J.-P., Raisaro, J.L., Rougemont, J.: Protecting and evaluating genomic privacy in medical tests and personalized medicine. In: WPES, pp. 95\u2013106 (2013)","DOI":"10.1145\/2517840.2517843"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Brakerski, Z., Gentry, C., Vaikuntanathan, V.: (Leveled) fully homomorphic encryption without bootstrapping. In: Goldwasser, S. (ed.) ITCS, pp. 309\u2013325 (2012)","DOI":"10.1145\/2090236.2090262"},{"key":"15_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/978-3-642-38348-9_20","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2013","author":"JH Cheon","year":"2013","unstructured":"Cheon, J.H., Coron, J.-S., Kim, J., Lee, M.S., Lepoint, T., Tibouchi, M., Yun, A.: Batch fully homomorphic encryption over the integers. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 315\u2013335. Springer, Heidelberg (2013)"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Cristofaro, E.D., Faber, S., Tsudik, G.: Secure genomic testing with size- and position-hiding private substring matching. In: WPES, pp. 107\u2013117 (2013)","DOI":"10.1145\/2517840.2517849"},{"key":"15_CR6","unstructured":"The European Bioinformatics Institute. http:\/\/www.ebi.ac.uk"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Erlich, Y., Narayanan, A.: Routes for breaching and protecting genetic privacy (2013). arXiv:1310.3197","DOI":"10.1101\/000042"},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1007\/978-3-642-32009-5_49","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"C Gentry","year":"2012","unstructured":"Gentry, C., Halevi, S., Smart, N.P.: Homomorphic evaluation of the AES circuit. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 850\u2013867. Springer, Heidelberg (2012)"},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1126\/science.1229566","volume":"339","author":"M Gymrek","year":"2013","unstructured":"Gymrek, M., McGuire, A.L., Golan, D., Halperin, E., Erlich, Y.: Identifying personal genomes by surname inference. Science 339, 321\u2013324 (2013)","journal-title":"Science"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Humbert, M., Ayday, E., Hubaux, J.-P., Telenti, A.: Addressing the concerns of the lacks family: Quantification of kin genomic privacy. In: CCSW Secure Pattern Matching using Somewhat Homomorphic Encryption, pp. 1141\u20131152. ACM (2013)","DOI":"10.1145\/2508859.2516707"},{"key":"15_CR11","unstructured":"Huang, Y., Evans, D., Katz, J., Malka, L.: Faster secure two-party computation using garbled circuits. In: Proceedings of the 20th USENIX Security Symposium, pp. 35\u201350 (2011)"},{"key":"15_CR12","unstructured":"HapMap (2007). http:\/\/www.hapmap.org\/"},{"key":"15_CR13","unstructured":"Halev, S., Shoup, V.: Design and implementation of a homomorphic-encryption library. Technical report, IBM Technical report (2013)"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Jha, S., Kruger, L., Shmatikov, V.: Towards practical privacy for genomic computation. In: IEEE Symposium on Security and Privacy, pp. 216\u2013230 (2008)","DOI":"10.1109\/SP.2008.34"},{"issue":"5","key":"15_CR15","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1109\/TITB.2007.908465","volume":"12","author":"M Kantarcioglu","year":"2008","unstructured":"Kantarcioglu, M., Jiang, W., Liu, Y., Malin, B.: A cryptographic approach to securely share and query genomic sequences. IEEE Trans. Inf. Technol. Biomed. 12(5), 606\u2013617 (2008)","journal-title":"IEEE Trans. Inf. Technol. Biomed."},{"key":"15_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-10433-6_1","volume-title":"Cryptology and Network Security","author":"V Kolesnikov","year":"2009","unstructured":"Kolesnikov, V., Sadeghi, A.-R., Schneider, T.: Improved garbled circuit building blocks and applications to auctions and computing minima. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 1\u201320. Springer, Heidelberg (2009)"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Lauter, K., Naehrig, M., Vaikuntanathan, V.: Can homomorphic encryption be practical?. In: CCSW, pp. 113\u2013124. ACM (2011)","DOI":"10.1145\/2046660.2046682"},{"key":"15_CR18","unstructured":"Lindell, Y., Pinkas, B.: A proof of Yao\u2019s protocol for secure two-party computation (2004). http:\/\/eprint.iacr.org\/2004\/175"},{"key":"15_CR19","unstructured":"Malin, B., Sweeney, L.: Inferring genotype from clinical phenotype through a knowledge based algorithm. In: Pac. Symp. Biocomput. 41\u201352 (2002)"},{"issue":"3","key":"15_CR20","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1016\/j.jbi.2004.04.005","volume":"37","author":"B Malin","year":"2004","unstructured":"Malin, B., Sweeney, L.: How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems. J. Biomed. Inform. 37(3), 571\u2013588 (2004)","journal-title":"J. Biomed. Inform."},{"key":"15_CR21","unstructured":"Personal Genome Project. http:\/\/www.personalgenomes.org\/community.html"},{"key":"15_CR22","unstructured":"Shoup, V.: NTL: a library for doing number theory (2009). http:\/\/www.shoup.net\/ntl"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Sweeney, L., Abu, A., Winn, J.: Identifying Participants in the Personal Genome Project by Name. In: Harvard University. Data Privacy Lab. White Paper 1021\u20131 (2013)","DOI":"10.2139\/ssrn.2257732"},{"key":"15_CR24","unstructured":"Stranger Visions (2012). http:\/\/deweyhagborg.com\/strangervisions"},{"issue":"1","key":"15_CR25","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1145\/321796.321811","volume":"21","author":"RA Wagner","year":"1974","unstructured":"Wagner, R.A., Fischer, M.J.: The string to string correction problem. J. ACM 21(1), 168\u2013173 (1974)","journal-title":"J. ACM"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Yao, A.: How to generate and exchange secrets. In: Ostrovsky, R. (ed.) FOCS, pp. 162\u2013167 (1986)","DOI":"10.1109\/SFCS.1986.25"},{"key":"15_CR27","doi-asserted-by":"crossref","unstructured":"Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K., Koshiba, T.: Secure pattern matching using somewhat homomorphic encryption. In: CCSW, pp. 65\u201376. ACM (2013)","DOI":"10.1145\/2517488.2517497"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-48051-9_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T12:47:12Z","timestamp":1674910032000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-48051-9_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662480502","9783662480519"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-48051-9_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"5 September 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}