{"id":"https://openalex.org/W2605042026","doi":"https://doi.org/10.1109/tdsc.2017.2690422","title":"Cryptographic Solutions for Credibility and Liability Issues of Genomic Data","display_name":"Cryptographic Solutions for Credibility and Liability Issues of Genomic Data","publication_year":2017,"publication_date":"2017-04-03","ids":{"openalex":"https://openalex.org/W2605042026","doi":"https://doi.org/10.1109/tdsc.2017.2690422","mag":"2605042026"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2017.2690422","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2017.2690422","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.1109/TDSC.2017.2690422","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028326739","display_name":"Erman Ayday","orcid":"https://orcid.org/0000-0003-3383-1081"},"institutions":[{"id":"https://openalex.org/I168864056","display_name":"Bilkent University","ror":"https://ror.org/02vh8a032","country_code":"TR","type":"education","lineage":["https://openalex.org/I168864056"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Erman Ayday","raw_affiliation_strings":["Computer Engineering Department, Bilkent University, Ankara, Turkey"],"affiliations":[{"raw_affiliation_string":"Computer Engineering Department, Bilkent University, Ankara, Turkey","institution_ids":["https://openalex.org/I168864056"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077863367","display_name":"Qiang Tang","orcid":"https://orcid.org/0000-0002-6153-4255"},"institutions":[{"id":"https://openalex.org/I4210112527","display_name":"Luxembourg Institute of Science and Technology","ror":"https://ror.org/01t178j62","country_code":"LU","type":"education","lineage":["https://openalex.org/I4210112527"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Qiang Tang","raw_affiliation_strings":["Luxembourg Institute of Science and Technology, Esch-sur-Alzette, Luxembourg"],"affiliations":[{"raw_affiliation_string":"Luxembourg Institute of Science and Technology, Esch-sur-Alzette, Luxembourg","institution_ids":["https://openalex.org/I4210112527"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103075625","display_name":"Arif Y\u0131lmaz","orcid":"https://orcid.org/0000-0001-6619-1469"},"institutions":[{"id":"https://openalex.org/I168864056","display_name":"Bilkent University","ror":"https://ror.org/02vh8a032","country_code":"TR","type":"education","lineage":["https://openalex.org/I168864056"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Arif Yilmaz","raw_affiliation_strings":["Computer Engineering Department, Bilkent University, Ankara, Turkey"],"affiliations":[{"raw_affiliation_string":"Computer Engineering Department, Bilkent University, Ankara, Turkey","institution_ids":["https://openalex.org/I168864056"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5028326739"],"corresponding_institution_ids":["https://openalex.org/I168864056"],"apc_list":null,"apc_paid":null,"fwci":0.2077,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.61870982,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"16","issue":"1","first_page":"33","last_page":"43"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9882000088691711,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11287","display_name":"Cancer Genomics and Diagnostics","score":0.961899995803833,"subfield":{"id":"https://openalex.org/subfields/1306","display_name":"Cancer Research"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.705898642539978},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.6539051532745361},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5448044538497925},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5437435507774353},{"id":"https://openalex.org/keywords/credibility","display_name":"Credibility","score":0.5229683518409729},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.4485182762145996},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.44227537512779236},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.43013590574264526},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.41068288683891296},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.3978084325790405},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3246266841888428},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.16457641124725342},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.09744828939437866},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.095583975315094},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.09529536962509155},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.08843943476676941}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.705898642539978},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.6539051532745361},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5448044538497925},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5437435507774353},{"id":"https://openalex.org/C2780224610","wikidata":"https://www.wikidata.org/wiki/Q1530061","display_name":"Credibility","level":2,"score":0.5229683518409729},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.4485182762145996},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.44227537512779236},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.43013590574264526},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.41068288683891296},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.3978084325790405},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3246266841888428},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.16457641124725342},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.09744828939437866},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.095583975315094},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.09529536962509155},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.08843943476676941},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tdsc.2017.2690422","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2017.2690422","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},{"id":"pmh:oai:repository.bilkent.edu.tr:11693/49249","is_oa":false,"landing_page_url":"http://hdl.handle.net/11693/49249","pdf_url":null,"source":{"id":"https://openalex.org/S4306400079","display_name":"Bilkent University Institutional Repository (Bilkent University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I168864056","host_organization_name":"Bilkent University","host_organization_lineage":["https://openalex.org/I168864056"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"Article"},{"id":"pmh:oai:zenodo.org:1405687","is_oa":true,"landing_page_url":"https://doi.org/10.1109/TDSC.2017.2690422","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"pmh:oai:zenodo.org:1405687","is_oa":true,"landing_page_url":"https://doi.org/10.1109/TDSC.2017.2690422","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7294648298","display_name":null,"funder_award_id":"115E766","funder_id":"https://openalex.org/F4320322626","funder_display_name":"T\u00fcrkiye Bilimsel ve Teknolojik Ara\u015ft\u0131rma Kurumu"}],"funders":[{"id":"https://openalex.org/F4320321038","display_name":"Fonds National de la Recherche Luxembourg","ror":"https://ror.org/039z13y21"},{"id":"https://openalex.org/F4320322626","display_name":"T\u00fcrkiye Bilimsel ve Teknolojik Ara\u015ft\u0131rma Kurumu","ror":"https://ror.org/04w9kkr77"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1582659671","https://openalex.org/W1714926069","https://openalex.org/W1994954046","https://openalex.org/W1996360405","https://openalex.org/W2002458933","https://openalex.org/W2040228409","https://openalex.org/W2045970339","https://openalex.org/W2076000582","https://openalex.org/W2087135382","https://openalex.org/W2098622176","https://openalex.org/W2124398102","https://openalex.org/W2133711597","https://openalex.org/W2147412664","https://openalex.org/W2151785200","https://openalex.org/W2168610667","https://openalex.org/W2248342664","https://openalex.org/W2403663234","https://openalex.org/W2497843319","https://openalex.org/W4232836212","https://openalex.org/W4245640217","https://openalex.org/W6634947410","https://openalex.org/W6637566185","https://openalex.org/W6681997733","https://openalex.org/W6682238872","https://openalex.org/W6691095328"],"related_works":["https://openalex.org/W2388687352","https://openalex.org/W2370187191","https://openalex.org/W2369854048","https://openalex.org/W2374291020","https://openalex.org/W2355907197","https://openalex.org/W3171042291","https://openalex.org/W2390961115","https://openalex.org/W2388138913","https://openalex.org/W1990162851","https://openalex.org/W2385288613"],"abstract_inverted_index":{"In":[0,26],"this":[1,27,100],"work,":[2],"we":[3],"consider":[4],"a":[5,23,59],"scenario":[6],"that":[7,37,96,113],"includes":[8],"an":[9],"individual":[10,49,55,89,150],"sharing":[11],"his":[12,19,64,76,81,86],"genomic":[13,20,39],"data":[14,40,65,82,122],"(or":[15,41],"results":[16],"obtained":[17],"from":[18],"data)":[21],"with":[22,63],"service":[24,31,69,94],"provider.":[25],"scenario,":[28],"(i)":[29],"the":[30,47,54,68,88,93,115,118,121,124,127,130,135,143,149,153],"provider":[32,70,95],"wants":[33,56,90],"to":[34,46,57,73,91,123,133,141],"make":[35],"sure":[36],"received":[38],"results)":[42],"in":[43],"fact":[44],"belongs":[45],"corresponding":[48],"(and":[50],"computed":[51],"correctly),":[52],"(ii)":[53],"provide":[58],"digital":[60],"consent":[61,125,145],"along":[62],"specifying":[66],"whether":[67],"is":[71,83,97],"allowed":[72],"further":[74],"share":[75],"data,":[77,136],"and":[78,110,126,146],"(iii)":[79],"if":[80],"shared":[84],"without":[85],"consent,":[87],"determine":[92],"responsible":[98],"for":[99],"leakage.":[101],"We":[102],"propose":[103],"two":[104],"schemes":[105],"based":[106],"on":[107],"homomorphic":[108],"signature":[109,112],"aggregate":[111],"links":[114],"information":[116],"about":[117],"legitimacy":[119],"of":[120,129,148],"phenotype":[128,147],"individual.":[131],"Thus,":[132],"verify":[134],"each":[137],"party":[138],"also":[139],"needs":[140],"use":[142],"correct":[144],"who":[151],"owns":[152],"data.":[154]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
