{"id":"https://openalex.org/W4212819271","doi":"https://doi.org/10.1109/tdsc.2022.3152498","title":"Maliciously Secure and Efficient Large-Scale Genome-Wide Association Study With Multi-Party Computation","display_name":"Maliciously Secure and Efficient Large-Scale Genome-Wide Association Study With Multi-Party Computation","publication_year":2022,"publication_date":"2022-02-18","ids":{"openalex":"https://openalex.org/W4212819271","doi":"https://doi.org/10.1109/tdsc.2022.3152498"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2022.3152498","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2022.3152498","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050569097","display_name":"Caiqin Dong","orcid":"https://orcid.org/0000-0003-0165-7058"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Caiqin Dong","raw_affiliation_strings":["College of Cyber Security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangzhou, China","Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China"],"raw_orcid":"https://orcid.org/0000-0003-0165-7058","affiliations":[{"raw_affiliation_string":"College of Cyber Security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangzhou, China","institution_ids":[]},{"raw_affiliation_string":"Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082041657","display_name":"Jian Weng","orcid":null},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Weng","raw_affiliation_strings":["College of Cyber Security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangzhou, China","Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China"],"raw_orcid":"https://orcid.org/0000-0003-4067-8230","affiliations":[{"raw_affiliation_string":"College of Cyber Security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangzhou, China","institution_ids":[]},{"raw_affiliation_string":"Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000372510","display_name":"Jia-Nan Liu","orcid":"https://orcid.org/0000-0003-3140-2320"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jia-Nan Liu","raw_affiliation_strings":["College of Cyber Security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangzhou, China","Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China"],"raw_orcid":"https://orcid.org/0000-0003-3140-2320","affiliations":[{"raw_affiliation_string":"College of Cyber Security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangzhou, China","institution_ids":[]},{"raw_affiliation_string":"Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025910280","display_name":"Anjia Yang","orcid":"https://orcid.org/0000-0002-7958-6571"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Anjia Yang","raw_affiliation_strings":["College of Cyber Security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangzhou, China","Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-7958-6571","affiliations":[{"raw_affiliation_string":"College of Cyber Security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangzhou, China","institution_ids":[]},{"raw_affiliation_string":"Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062494507","display_name":"Zhiquan Liu","orcid":"https://orcid.org/0000-0002-3934-2177"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiquan Liu","raw_affiliation_strings":["College of Cyber Security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangzhou, China","Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-3934-2177","affiliations":[{"raw_affiliation_string":"College of Cyber Security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangzhou, China","institution_ids":[]},{"raw_affiliation_string":"Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091387165","display_name":"Yaxi Yang","orcid":"https://orcid.org/0000-0002-5934-0267"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yaxi Yang","raw_affiliation_strings":["College of Cyber Security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangzhou, China","Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Cyber Security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangzhou, China","institution_ids":[]},{"raw_affiliation_string":"Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012016098","display_name":"Jianfeng Ma","orcid":"https://orcid.org/0000-0003-4251-1143"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianfeng Ma","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi&#x0027;an, China"],"raw_orcid":"https://orcid.org/0000-0003-4251-1143","affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5050569097"],"corresponding_institution_ids":["https://openalex.org/I159948400"],"apc_list":null,"apc_paid":null,"fwci":2.2197,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.89224736,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"20","issue":"2","first_page":"1243","last_page":"1257"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9581999778747559,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8066399693489075},{"id":"https://openalex.org/keywords/genome-wide-association-study","display_name":"Genome-wide association study","score":0.5761505365371704},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.5236301422119141},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5126075148582458},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5067375302314758},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.33720993995666504},{"id":"https://openalex.org/keywords/single-nucleotide-polymorphism","display_name":"Single-nucleotide polymorphism","score":0.29097849130630493},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2105330228805542},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.0669284462928772}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8066399693489075},{"id":"https://openalex.org/C106208931","wikidata":"https://www.wikidata.org/wiki/Q1098876","display_name":"Genome-wide association study","level":5,"score":0.5761505365371704},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.5236301422119141},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5126075148582458},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5067375302314758},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.33720993995666504},{"id":"https://openalex.org/C153209595","wikidata":"https://www.wikidata.org/wiki/Q501128","display_name":"Single-nucleotide polymorphism","level":4,"score":0.29097849130630493},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2105330228805542},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0669284462928772},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C135763542","wikidata":"https://www.wikidata.org/wiki/Q106016","display_name":"Genotype","level":3,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2022.3152498","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2022.3152498","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1427926582","display_name":null,"funder_award_id":"U1736203","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2156776252","display_name":null,"funder_award_id":"61902067","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4360914524","display_name":null,"funder_award_id":"62102166","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4940029293","display_name":null,"funder_award_id":"62072215","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6220089879","display_name":null,"funder_award_id":"61825203","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W44936433","https://openalex.org/W1873763122","https://openalex.org/W1878939331","https://openalex.org/W1969009977","https://openalex.org/W2024622963","https://openalex.org/W2025143098","https://openalex.org/W2028260332","https://openalex.org/W2031533839","https://openalex.org/W2050886653","https://openalex.org/W2082624086","https://openalex.org/W2093460657","https://openalex.org/W2132172731","https://openalex.org/W2134783591","https://openalex.org/W2161459805","https://openalex.org/W2198130350","https://openalex.org/W2201294065","https://openalex.org/W2211774783","https://openalex.org/W2218239923","https://openalex.org/W2218329981","https://openalex.org/W2304501949","https://openalex.org/W2536058570","https://openalex.org/W2614104334","https://openalex.org/W2704367133","https://openalex.org/W2739131133","https://openalex.org/W2765200655","https://openalex.org/W2800679800","https://openalex.org/W2802045099","https://openalex.org/W2804382710","https://openalex.org/W2895782209","https://openalex.org/W2896684650","https://openalex.org/W2915050524","https://openalex.org/W3010061636","https://openalex.org/W3013692727","https://openalex.org/W3024430195","https://openalex.org/W3141585064","https://openalex.org/W3195593967","https://openalex.org/W6690672677"],"related_works":["https://openalex.org/W1864400744","https://openalex.org/W4390666975","https://openalex.org/W2736520836","https://openalex.org/W3093265873","https://openalex.org/W3209211130","https://openalex.org/W2971313479","https://openalex.org/W1966248182","https://openalex.org/W2116256947","https://openalex.org/W2128541119","https://openalex.org/W2267449998"],"abstract_inverted_index":{"Genome-Wide":[0],"Association":[1],"Study":[2],"(GWAS)":[3],"aims":[4],"at":[5],"detecting":[6],"the":[7,42,48,97,122,139,162,177,186,195],"association":[8],"between":[9],"diseases":[10],"and":[11,18,64,91,116,130,174],"Single-Nucleotide":[12],"Polymorphisms":[13],"(SNPs)":[14],"with":[15,146],"statistical":[16],"techniques":[17],"has":[19],"great":[20],"potential":[21],"for":[22],"disease":[23],"diagnosis.":[24],"To":[25],"obtain":[26],"high-quality":[27],"results,":[28],"GWAS":[29,45,66,141,165],"requires":[30],"large-scale":[31],"genomic":[32,51],"data":[33,52],"containing":[34],"individuals\u2019":[35],"privacy":[36,49],"information.":[37],"Thus,":[38],"how":[39],"to":[40,95,113,126,143],"improve":[41,117],"efficiency":[43],"of":[44,50,77,101,172,182],"while":[46],"protecting":[47],"becomes":[53],"a":[54,62,75,107],"critical":[55],"challenge.":[56],"In":[57,104],"this":[58],"paper,":[59],"we":[60,73,137],"propose":[61],"secure":[63,70,102,129,164],"efficient":[65],"scheme.":[67],"By":[68],"using":[69,167],"three-party":[71],"computation,":[72],"present":[74],"series":[76],"protocols,":[78,106],"i.e.,":[79],"Secure":[80,83,87,92],"Quality":[81],"Control,":[82],"Principle":[84],"Component":[85],"Analysis,":[86],"Cochran-Armitage":[88],"trend":[89],"test,":[90],"Logistic":[93],"Regression,":[94],"cover":[96],"most":[98],"significant":[99],"procedures":[100],"GWAS.":[103],"these":[105],"new":[108],"comparison":[109,124],"protocol":[110,125],"is":[111,189],"designed":[112],"reduce":[114],"communication":[115,175],"efficiency.":[118],"Furthermore,":[119],"by":[120],"extending":[121],"above":[123],"be":[127],"maliciously":[128],"utilizing":[131],"other":[132],"technologies,":[133],"e.g.,":[134],"consistency":[135],"check,":[136],"extend":[138],"whole":[140],"scheme":[142,166,184],"malicious":[144,187],"security":[145],"rationally":[147],"additional":[148],"overhead.":[149],"Experimental":[150],"results":[151],"demonstrate":[152],"that":[153,193],"our":[154,183],"protocols":[155],"achieve":[156],"about":[157],"33%":[158],"performance":[159],"improvement":[160],"than":[161,192],"state-of-art":[163],"two-party":[168],"computation":[169],"in":[170,176,185,194],"terms":[171],"runtime":[173],"semi-honest":[178,196],"setting.":[179,197],"The":[180],"cost":[181],"setting":[188],"around":[190],"1.5X":[191]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2}],"updated_date":"2026-04-24T08:23:43.765630","created_date":"2025-10-10T00:00:00"}
