{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T01:33:56Z","timestamp":1725672836802},"publisher-location":"New York, New York, USA","reference-count":23,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2016,7,11]],"date-time":"2016-07-11T00:00:00Z","timestamp":1468195200000},"content-version":"vor","delay-in-days":192,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["RGPIN-2015-04147"],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1145\/2938503.2938507","type":"proceedings-article","created":{"date-parts":[[2016,9,12]],"date-time":"2016-09-12T13:33:45Z","timestamp":1473687225000},"page":"278-283","source":"Crossref","is-referenced-by-count":9,"title":["Secure and Efficient Multiparty Computation on Genomic Data"],"prefix":"10.1145","author":[{"given":"Md Momin","family":"Al Aziz","sequence":"first","affiliation":[{"name":"Computer Science, University of Manitoba"}]},{"given":"Mohammad Z.","family":"Hasan","sequence":"additional","affiliation":[{"name":"Computer Science, University of Manitoba"}]},{"given":"Noman","family":"Mohammed","sequence":"additional","affiliation":[{"name":"Computer Science, University of Manitoba"}]},{"given":"Dima","family":"Alhadidi","sequence":"additional","affiliation":[{"name":"College of Technological, Innovation, Zayed University"}]}],"member":"320","reference":[{"key":"key-10.1145\/2938503.2938507-1","unstructured":"M. Akgün, A. O. Bayrak, B. Ozer, and M. Ş. Sağιroğlu. Privacy preserving processing of genomic data: A survey. Journal of biomedical informatics, 56:103--111, 2015."},{"key":"key-10.1145\/2938503.2938507-2","doi-asserted-by":"crossref","unstructured":"S. Barouti, D. Alhadidi, and M. Debbabi. Symmetrically-private database search in cloud computing. In 2013 IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom), volume 1, pages 671--678, Dec 2013.","DOI":"10.1109\/CloudCom.2013.95"},{"key":"key-10.1145\/2938503.2938507-3","doi-asserted-by":"crossref","unstructured":"A. Boldyreva, N. Chenette, Y. Lee, and A. OâĂŹneill. Order-preserving symmetric encryption. In Advances in Cryptology-EUROCRYPT 2009, pages 224--241. Springer, 2009.","DOI":"10.1007\/978-3-642-01001-9_13"},{"key":"key-10.1145\/2938503.2938507-4","doi-asserted-by":"crossref","unstructured":"D. Boneh, K. Lewi, M. Raykova, A. Sahai, M. Zhandry, and J. Zimmerman. Semantically secure order-revealing encryption: Multi-input functional encryption without obfuscation. In Advances in Cryptology-EUROCRYPT 2015, pages 563--594. Springer, 2015.","DOI":"10.1007\/978-3-662-46803-6_19"},{"key":"key-10.1145\/2938503.2938507-5","doi-asserted-by":"crossref","unstructured":"J. W. Bos, K. Lauter, and M. Naehrig. Private predictive analysis on encrypted medical data. Journal of biomedical informatics, 50:234--243, 2014.","DOI":"10.1016\/j.jbi.2014.04.003"},{"key":"key-10.1145\/2938503.2938507-6","doi-asserted-by":"crossref","unstructured":"C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In Theory of cryptography, pages 265--284. Springer, 2006.","DOI":"10.1007\/11681878_14"},{"key":"key-10.1145\/2938503.2938507-7","doi-asserted-by":"crossref","unstructured":"Y. Erlich, J. B. Williams, D. Glazer, K. Yocum, N. Farahany, M. Olson, A. Narayanan, L. D. Stein, J. A. Witkowski, and R. C. Kain. Redefining genomic privacy: Trust and empowerment. 12(11):e1001983, 11 2014.","DOI":"10.1371\/journal.pbio.1001983"},{"key":"key-10.1145\/2938503.2938507-8","doi-asserted-by":"crossref","unstructured":"C. Gentry et al. Fully homomorphic encryption using ideal lattices. In STOC, volume 9, pages 169--178, 2009.","DOI":"10.1145\/1536414.1536440"},{"key":"key-10.1145\/2938503.2938507-9","doi-asserted-by":"crossref","unstructured":"F. Kerschbaum. Frequency-hiding order-preserving encryption. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pages 656--667. ACM, 2015.","DOI":"10.1145\/2810103.2813629"},{"key":"key-10.1145\/2938503.2938507-10","doi-asserted-by":"crossref","unstructured":"F. Kerschbaum and A. Schröpfer. Optimal average-complexity ideal-security order-preserving encryption. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pages 275--286. ACM, 2014.","DOI":"10.1145\/2660267.2660277"},{"key":"key-10.1145\/2938503.2938507-11","unstructured":"M. Lichman. UCI machine learning repository, 2013."},{"key":"key-10.1145\/2938503.2938507-12","doi-asserted-by":"crossref","unstructured":"D. Liu and S. Wang. Programmable order-preserving secure index for encrypted database query. In IEEE 5th International Conference on Cloud Computing (CLOUD), pages 502--509. IEEE, 2012.","DOI":"10.1109\/CLOUD.2012.65"},{"key":"key-10.1145\/2938503.2938507-13","doi-asserted-by":"crossref","unstructured":"D. Liu and S. Wang. Nonlinear order preserving index for encrypted database query in service cloud environments. Concurrency and Computation: Practice and Experience, 25(13):1967--1984, 2013.","DOI":"10.1002\/cpe.2992"},{"key":"key-10.1145\/2938503.2938507-14","doi-asserted-by":"crossref","unstructured":"M. Naor and M. Yung. Public-key cryptosystems provably secure against chosen ciphertext attacks. In Proceedings of the twenty-second annual ACM symposium on Theory of computing, pages 427--437. ACM, 1990.","DOI":"10.1145\/100216.100273"},{"key":"key-10.1145\/2938503.2938507-15","doi-asserted-by":"crossref","unstructured":"M. Naveed, E. Ayday, E. W. Clayton, J. Fellay, C. A. Gunter, J.-P. Hubaux, B. A. Malin, and X. Wang. Privacy in the genomic era. ACM Computing Surveys (CSUR), 48(1):6, 2015.","DOI":"10.1145\/2767007"},{"key":"key-10.1145\/2938503.2938507-16","doi-asserted-by":"crossref","unstructured":"P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Advances in cryptology, EUROCRYPTâĂŹ99, pages 223--238. Springer, 1999.","DOI":"10.1007\/3-540-48910-X_16"},{"key":"key-10.1145\/2938503.2938507-17","doi-asserted-by":"crossref","unstructured":"R. A. Popa, F. H. Li, and N. Zeldovich. An ideal-security protocol for order-preserving encoding. In Security and Privacy (SP), 2013 IEEE Symposium on, pages 463--477. IEEE, 2013.","DOI":"10.1109\/SP.2013.38"},{"key":"key-10.1145\/2938503.2938507-18","doi-asserted-by":"crossref","unstructured":"O. Regev. On lattices, learning with errors, random linear codes, and cryptography. Journal of the ACM (JACM), 56(6):34, 2009.","DOI":"10.1145\/1568318.1568324"},{"key":"key-10.1145\/2938503.2938507-19","unstructured":"R. L. Rivest, L. Adleman, and M. L. Dertouzos. On data banks and privacy homomorphisms. Foundations of secure computation, 4(11):169--180, 1978."},{"key":"key-10.1145\/2938503.2938507-20","unstructured":"S. Wang, Y. Zhang, W. Dai, K. Lauter, M. Kim, Y. Tang, H. Xiong, and X. Jiang. Healer: Homomorphic computation of exact logistic regression for secure rare disease variants analysis in gwas. Bioinformatics, 32(2):211--218, 2016."},{"key":"key-10.1145\/2938503.2938507-21","doi-asserted-by":"crossref","unstructured":"X. S. Wang, Y. Huang, Y. Zhao, H. Tang, X. Wang, and D. Bu. Efficient genome-wide, privacy-preserving similar patient query based on private edit distance. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pages 492--503. ACM, 2015.","DOI":"10.1145\/2810103.2813725"},{"key":"key-10.1145\/2938503.2938507-22","doi-asserted-by":"crossref","unstructured":"W. Xie, M. Kantarcioglu, W. S. Bush, D. Crawford, J. C. Denny, R. Heatherly, and B. A. Malin. Securema: protecting participant privacy in genetic association meta-analysis. Bioinformatics, page btu561, 2014.","DOI":"10.1093\/bioinformatics\/btu561"},{"key":"key-10.1145\/2938503.2938507-23","doi-asserted-by":"crossref","unstructured":"Y. Zhang, W. Dai, X. Jiang, H. Xiong, and S. Wang. Foresee: Fully outsourced secure genome study based on homomorphic encryption. BMC medical informatics and decision making, 15(Suppl 5):S5, 2015.","DOI":"10.1186\/1472-6947-15-S5-S5"}],"event":{"number":"20","sponsor":["Keio University"],"acronym":"IDEAS '16","name":"the 20th International Database Engineering & Applications Symposium","start":{"date-parts":[[2016,7,11]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2016,7,13]]}},"container-title":["Proceedings of the 20th International Database Engineering & Applications Symposium on - IDEAS '16"],"original-title":[],"link":[{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=2938507&ftid=1786969&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T11:32:10Z","timestamp":1568374330000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=2938503.2938507"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1145\/2938503.2938507","relation":{},"subject":[],"published":{"date-parts":[[2016]]}}}